Re: [Gen-art] Gen-ART Last Call review of draft-ietf-l3sm-l3vpn-service-model-16

Brian E Carpenter <brian.e.carpenter@gmail.com> Fri, 07 October 2016 20:03 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E81491296C6; Fri, 7 Oct 2016 13:03:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0-UtZJesHu3o; Fri, 7 Oct 2016 13:03:22 -0700 (PDT)
Received: from mail-pf0-x232.google.com (mail-pf0-x232.google.com [IPv6:2607:f8b0:400e:c00::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B5B512955F; Fri, 7 Oct 2016 13:03:22 -0700 (PDT)
Received: by mail-pf0-x232.google.com with SMTP id i85so27961481pfa.3; Fri, 07 Oct 2016 13:03:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:to:references:from:organization:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding; bh=fEVeHdL+ELh0xIAWbccY5EWnDv0XcJ1x3Q2fGlby5hg=; b=yG7/RdayWrNyBZRYz/wc9mks1XKFjfF6LJ4HGyFkP7ovLhH+tIez25bKDrp2D/JuLK n0sDTkWMQP162NaFxVN0GzlYuTUnl5a5DspSvQlV4BUhfIXDEj5fwOitc8NndprmkFdH K0vJKKwqo+bmZZ8wcvZyLR9FFnMMh9epfPgXWikaWKAmnH49nZ9/gXY9regbzKYxMZX8 aY1Xl7vlYMDYVza9oMoDoWpBvyqqnpNvuLpz0eLWDmdW04Z+DRSfgVTCOqDoj/3I4Tra c9zCsyAQVwDfySsra3e4LANzUKAFLzID5nOMYyDtaXVEqsFCEjW7Y51Yvn+HOn+6VjhJ 09ag==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:subject:to:references:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-transfer-encoding; bh=fEVeHdL+ELh0xIAWbccY5EWnDv0XcJ1x3Q2fGlby5hg=; b=LJKnDBjJzdwvclkYYtgIOFtMomtPiHxqhidGlJFb6KtsyNN1KbLetKjKBZvzN3uyFB zUlJTi4rENngYT5ML2Ikr8D3osHosK+ZYGhKr4qMRyoJp4edabjInzQSmpehB9CfcvDL 15M6rH9BWTqnTKTbgzYrc2aGI+I7HwOFoEbxBwTKa3gVlyprDu+JDufZglzKQY/00XlA X83KRAbexnTvJi5Hnql/u2HIuKHaDmrq5KQeARpwOW4K66TjwpqSahi1FvZO1Qgv6VDJ J5kdxi9euXj0NLSkewJdhK2wsRNgKtyEP6Gi/oo9GcbPmAIURNs4cnsiouZ3UDonnedx QuaA==
X-Gm-Message-State: AA6/9RlYAwq2gmVv3DVqieILFdLS8d5v+rFS2pBk2cAFADas1nZAAgZeUtU3DTdd1ibZLg==
X-Received: by 10.98.22.73 with SMTP id 70mr29862718pfw.36.1475870602049; Fri, 07 Oct 2016 13:03:22 -0700 (PDT)
Received: from ?IPv6:2406:e007:642f:1:28cc:dc4c:9703:6781? ([2406:e007:642f:1:28cc:dc4c:9703:6781]) by smtp.gmail.com with ESMTPSA id xn11sm33030100pac.38.2016.10.07.13.03.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 07 Oct 2016 13:03:21 -0700 (PDT)
To: Benoit Claise <bclaise@cisco.com>, stephane.litkowski@orange.com, "draft-ietf-l3sm-l3vpn-service-model.all@ietf.org" <draft-ietf-l3sm-l3vpn-service-model.all@ietf.org>, General Area Review Team <gen-art@ietf.org>, "l3sm@ietf.org" <l3sm@ietf.org>
References: <434b44e6-7168-81ce-beed-cc435d56e516@gmail.com> <29695_1475743607_57F60F77_29695_1285_2_9E32478DFA9976438E7A22F69B08FF921BDB44F5@OPEXCLILMA4.corporate.adroot.infra.ftgroup> <370b441b-6584-e4e3-837d-7c61cccdb4a3@gmail.com> <11008_1475826418_57F752F2_11008_4_1_9E32478DFA9976438E7A22F69B08FF921BDBB5F3@OPEXCLILMA4.corporate.adroot.infra.ftgroup> <9bb38119-f067-01d1-d925-f1a12afb3589@cisco.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
Message-ID: <2deec4fe-6f36-c8e2-bd23-c0599cdfafb9@gmail.com>
Date: Sat, 08 Oct 2016 09:03:27 +1300
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
In-Reply-To: <9bb38119-f067-01d1-d925-f1a12afb3589@cisco.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/djHuHLrmh_UvbE6rM8MaecQsyIg>
Subject: Re: [Gen-art] Gen-ART Last Call review of draft-ietf-l3sm-l3vpn-service-model-16
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Oct 2016 20:03:25 -0000

Just front-posting for this point:

> Indeed, we should pay attention that this Service YANG model doesn't 
> turn into a full device configuration model.

Understood. I guess my concern is that people may make false assumptions
from the service model about what it implies for configuration. Thus
"NAT" might falsely imply "NAT66", and no doubt there are other examples.

I will think about this before replying to Stephane again.

Regards
   Brian

On 07/10/2016 22:14, Benoit Claise wrote:
> Hi Brian, all,
> 
> [including the L3SM mailing list]
> 
> It will be a very useful addition to add a few words about : "We did not 
> wanted to add all the possible options, but the most current ones. New 
> scenarios can always been added through augmentations.", as mentioned by 
> Stephane.
> 
> In terms of QoS, I believe that this service model already contains too 
> much details already
> As I wrote in my AD review, 
> https://mailarchive.ietf.org/arch/msg/l3sm/0JUa85ioK_mtw2GtRM_FKP53guQ:
> 
>     . QoS Classification
>     I see match statements like in the ACL YANG model in NETMOD, I see QoS
>     parameters, and I wonder if it makes sense to have so many details in a
>     service model. Are you really sure that you don't have too much in that
>     area? Don't you need just need a very generic mechanism such as the
>     tc-latency, tc-jitter, tc-bandwidth, tc-path-diversity, and
>     tc-site-diversity for gold, silver and bronze?
> 
> Indeed, we should pay attention that this Service YANG model doesn't 
> turn into a full device configuration model.
>  From the charter:
> 
>     It needs to be clearly understood that this L3VPN service model is
>     not an L3VPN configuration model. That is, it does not provide
>     details for configuring network elements or protocols. Instead it
>     contains the characteristics of the service, as discussed between
>     the operators and their customers. A separate process is responsible
>     for mapping this service model onto the protocols and network
>     elements depending on how the network operator chooses to realise
>     the service.
> 
> We should focus on the most common options, from an operator point of 
> view. Otherwise, we could be adding features forever.
> IMO, it's time to declare victory on this service YANG model.
> 
> Regards, Benoit
>> Hi Brian,
>>
>> More inline.
>>
>> Brgds,
>>
>> -----Original Message-----
>> From: Brian E Carpenter [mailto:brian.e.carpenter@gmail.com]
>> Sent: Thursday, October 06, 2016 21:58
>> To: LITKOWSKI Stephane OBS/OINIS; draft-ietf-l3sm-l3vpn-service-model.all@ietf.org; General Area Review Team
>> Subject: Re: Gen-ART Last Call review of draft-ietf-l3sm-l3vpn-service-model-16
>>
>> Stephane,
>>
>> Thanks for the response and the proposed updates. Some follow-up on a few points:
>>
>> On 06/10/2016 21:46, stephane.litkowski@orange.com wrote:
>> ...
>>>> 5.3.2.2.1.  IP addressing
>>> ...
>>>>     o  slaac : enables stateless address autoconfiguration ([RFC4862]).
>>>>       This is applicable only for IPv6.
>>> You can't stop there. Within SLAAC, privacy addresses (RFC4941) may or may not be allowed by an operator, and opaque addresses (RFC7217) may be required. So two more Boolean properties are needed.
>>>
>>> Also, DHCPv6, SLAAC and static addresses may coexist; they are not mutually exclusive. I'm not sure if your model allows that.
>>>
>>> [SLI] We did not wanted to add all the possible options, but the most current ones. New scenarios can always been added through augmentations.
>> OK. I think a general note in the Introduction saying that would be very useful.
>>
>> [SLI2] I added a note in a new "feature and augmentation" paragraph that I already created to accommodate another comment.
>>
>>>
>>>> 5.12.2.1.  QoS classification
>>> This is too simple. At least, it needs to be able to handle a port range, not just a single port number.
>>>
>>> [SLI] What we need to identify is a particular application running on a specific port, we are not defining a router configuration framework here.
>> No, but there are applications that run on multiple ports and it's a bit clumsy to require a separate classifier for each port.
>>
>> [SLI2] I'm adding it.
>>
>>>
>>>> 5.12.2.2.  QoS profile
>>> rate-limit, priority-level, and guaranteed-bw-percent may be OK for MPLS, but they do not capture the needed parameters for differentiated services. I could write an essay here, but I think the best starting point is draft-ietf-tsvwg-diffserv-intercon.
>>> [SLI] Again, we captured the most used parameters by service providers. The goal is not to provide all. But If you see a specific parameter that is widely used and not implemented here, feel free to point it.
>> Diffserv DSCP values are widely used. I suggested diffserv-intercon because it proposes a specific subset useful at network boundaries, but there is also RFC 5127 and related work for WebRTC (https://tools.ietf.org/html/draft-ietf-tsvwg-rtcweb-qos).
>>
>> [SLI2] The current model supports classification based on generic DSCP values. Isn't it enough ?
>> We can define DiffServ class matching as well with enumerations if really necessary, but I'm now wondering if we can not reuse any existing generic packet matching model instead of recreating it (as ours becomes bigger and bigger), the issue I see is that it would come from a device configuration model.
> 
>>   
>>
>>
>>> Also, I don't understand how you can separate this issue from Section 5.13.2. Transport constraints, where you do discuss parameters relevant to diffserv. The whole point about diffserv-intercon is to quantify and standardise the constraints at interconnections.
>>> [SLI] We discussed this point when we designed the model, and it was simpler to express the transport constraint at vpn level than trying to implement them per site. That's why it was decoupled.
>> OK, but you still need a rich set of QoS parameters at that level, and shouldn't it be the same set?
>>
>> [SLI2] Some of them are equivalent for example low latency/jitter, some are different as for diversity.
>> I understand your comment, but I think we need a larger discussion on this topic and this may imply a full remodeling of this part. Let me post a thread on L3SM list.
>>
>>
>>> I recommend having TSVWG review sections 5.12 and 5.13.
>>>
>>>
>>> Minor Issues:
>>> -------------
>>>
>>>> 5.2.2.  Cloud access
>>> ...
>>>>    If NAT is required to access to the cloud, the nat-enabled leaf MUST
>>>>    be set to true.
>>> ...
>>> Although NAT is mentioned, I saw no support for NPTv6 (RFC6296). I also saw no mention of private or shared address space (RFC1918, RFC4193 or RFC6598).
>>>
>>> [SLI] NAT is a generic term, it only mentions that address translation is needed but does not tell what technology will be used. Nothing prevents SP to implement NPTv6.
>> No, but the IETF strongly recommends against NAT66, while having specs for NAT44, NAT64 and NPTv6.
>> Hiding these distinctions under the buzzword "NAT" is misleading.
>>
>> [SLI2] That was done for simplification purpose, could you list the different options that you would like to see in this model ? To be honest, I'm not fully aware of all the necessary combinations, so help would be required.
>>
>>
>>> The non working point is that the customer-nat-address is an IPv4 type which is a mistake ... it could be IPv6 also.
>> But it's not a NAT address, it's an NPTv6 prefix. A different animal.
>>
>> ...
>>
>> Regards
>>      Brian
>>
>> _________________________________________________________________________________________________________________________
>>
>> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>>
>> This message and its attachments may contain confidential or privileged information that may be protected by law;
>> they should not be distributed, used or copied without authorisation.
>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>> Thank you.
>>
> 
>