RE: Opsdir telechat review of draft-ietf-nvo3-hpvr2nve-cp-req-15

"Black, David" <David.Black@dell.com> Mon, 19 February 2018 15:21 UTC

Return-Path: <David.Black@dell.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 40C9A120721; Mon, 19 Feb 2018 07:21:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.021
X-Spam-Level:
X-Spam-Status: No, score=-2.021 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=dell.com header.b=bsH6jBgW; dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=emc.com header.b=wqlDzqCc
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r3qYkV9J-wOe; Mon, 19 Feb 2018 07:20:59 -0800 (PST)
Received: from esa6.dell-outbound.iphmx.com (esa6.dell-outbound.iphmx.com [68.232.149.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E95E3124BAC; Mon, 19 Feb 2018 07:20:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=dell.com; i=@dell.com; q=dns/txt; s=smtpout; t=1519053659; x=1550589659; h=from:cc:to:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=sNhjlLY0fj7NG3yYvnJ4qzW97pUllVjg4UbAjL3BnLM=; b=bsH6jBgWnzi9xdqmE1elH7s7tZQ0rxZ2cH4Rl403tHVicBTC/reXUMiN iexPZo/6Dg2oaSAZ1PspQTUP/2pShKcj407WaB9I+qLKtXgCP7tBBR4N/ HtoXIAn0vgM8449FrzIYt8NRajKapusFiPKocYc5sXvjDPl6prCKbvewX c=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A2HEAAAY6opahz+a6ERcHAEBAQQBAQoBAYJ8gSmBACgKg12KJY4DggKBF5ZJgVNDCoIBgzoCGoJBVBgBAgEBAQEBAQIBAhABAQEKCwkIKC+COCIRSyEGMgEBAQEBAQEBAQEBAQEBAQEBARcCPRMCGAEBAQMBIxEMHxoBBAcEAgEIDgMEAQEDAgYdAwICAjAUAQgIAgQBCQkIihIIAbFkgieDEoVlghMBAQEBAQEBAQEBAQEBAQEBAQEBFwiBD4N8gTZygViBZ4MuhSWDFTGCNIpriWKPbQMGApgoikKHZZdyAgQCBAUCGoE8H3mBEnBPgkOCVBAMggZ4jR+BGQEBAQ
X-IPAS-Result: A2HEAAAY6opahz+a6ERcHAEBAQQBAQoBAYJ8gSmBACgKg12KJY4DggKBF5ZJgVNDCoIBgzoCGoJBVBgBAgEBAQEBAQIBAhABAQEKCwkIKC+COCIRSyEGMgEBAQEBAQEBAQEBAQEBAQEBARcCPRMCGAEBAQMBIxEMHxoBBAcEAgEIDgMEAQEDAgYdAwICAjAUAQgIAgQBCQkIihIIAbFkgieDEoVlghMBAQEBAQEBAQEBAQEBAQEBAQEBFwiBD4N8gTZygViBZ4MuhSWDFTGCNIpriWKPbQMGApgoikKHZZdyAgQCBAUCGoE8H3mBEnBPgkOCVBAMggZ4jR+BGQEBAQ
Received: from esa3.dell-outbound2.iphmx.com ([68.232.154.63]) by esa6.dell-outbound.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Feb 2018 09:20:57 -0600
From: "Black, David" <David.Black@dell.com>
Cc: "nvo3@ietf.org" <nvo3@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "draft-ietf-nvo3-hpvr2nve-cp-req.all@ietf.org" <draft-ietf-nvo3-hpvr2nve-cp-req.all@ietf.org>, "Black, David" <David.Black@dell.com>
Received: from mailuogwhop.emc.com ([168.159.213.141]) by esa3.dell-outbound2.iphmx.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Feb 2018 21:12:03 +0600
Received: from maildlpprd02.lss.emc.com (maildlpprd02.lss.emc.com [10.253.24.34]) by mailuogwprd03.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id w1JFKqtk022791 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 19 Feb 2018 10:20:56 -0500
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd03.lss.emc.com w1JFKqtk022791
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1519053656; bh=q+PFqlPBeBcjsN0iFjPVJZ/4Da8=; h=From:To:CC:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:Content-Transfer-Encoding:MIME-Version; b=wqlDzqCccPCTMGSP2jH40f6s4nc8RjYHpx+xydgCLb3LG7CLkHJN8RoSEvBo06O/P EQBVqYbt5FpNmkHwoU7LyZt6BXPpNPIrWvdiq8wsDpvPNN7rE1pAHVr0vfABLLpQXp ncye7ApTaapFxBcJJASGPvaaXyVqFrJwFGrnUnkQ=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd03.lss.emc.com w1JFKqtk022791
Received: from mailusrhubprd54.lss.emc.com (mailusrhubprd54.lss.emc.com [10.106.48.19]) by maildlpprd02.lss.emc.com (RSA Interceptor); Mon, 19 Feb 2018 10:20:31 -0500
Received: from MXHUB311.corp.emc.com (MXHUB311.corp.emc.com [10.146.3.89]) by mailusrhubprd54.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id w1JFKbbq025601 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=FAIL); Mon, 19 Feb 2018 10:20:39 -0500
Received: from MX307CL04.corp.emc.com ([fe80::849f:5da2:11b:4385]) by MXHUB311.corp.emc.com ([10.146.3.89]) with mapi id 14.03.0352.000; Mon, 19 Feb 2018 10:20:37 -0500
To: Scott Bradner <sob@sobco.com>, "ops-dir@ietf.org" <ops-dir@ietf.org>
Subject: RE: Opsdir telechat review of draft-ietf-nvo3-hpvr2nve-cp-req-15
Thread-Topic: Opsdir telechat review of draft-ietf-nvo3-hpvr2nve-cp-req-15
Thread-Index: AQHTqFaNykNW9l59VkWZ52tOejm4cqOr0tZg
Date: Mon, 19 Feb 2018 15:20:36 +0000
Message-ID: <CE03DB3D7B45C245BCA0D2432779493630012690@MX307CL04.corp.emc.com>
References: <151891677004.27852.3686643983045825567@ietfa.amsl.com>
In-Reply-To: <151891677004.27852.3686643983045825567@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.238.44.138]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd54.lss.emc.com
X-RSA-Classifications: public
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/bxhLlXYPTB1Em3dK5xR3u_kRaic>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Feb 2018 15:21:07 -0000

Scott,

Thanks for the review ... comments inline.

Thanks, --David

> -----Original Message-----
> From: Scott Bradner [mailto:sob@sobco.com]
> Sent: Saturday, February 17, 2018 8:20 PM
> To: ops-dir@ietf.org
> Cc: nvo3@ietf.org; ietf@ietf.org; draft-ietf-nvo3-hpvr2nve-cp-
> req.all@ietf.org
> Subject: Opsdir telechat review of draft-ietf-nvo3-hpvr2nve-cp-req-15
> 
> Reviewer: Scott Bradner
> Review result: Has Nits
> 
> This is an OPS-DIR review of Split Network Virtualization Edge (Split-NVE)
> Control Plane Requirements (draft-ietf-nvo3-hpvr2nve-cp-req-15) This ID
> describes the requirements that should be met by the technology defined in
> one
> or more technical specifications to implement, in this case, control plane
> protocols for use in a split network virtualization system, and thus, by
> definition, can not have any direct impacts on the operation of networks.
> Technology specification(s) that meet these requirements might have such
> impacts. That said, some notes ---- section 1 .1 says The key words "MUST",
> "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT",
> "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as
> described in RFC 2119 [RFC2119] and RFC 8174 [RFC8174].
> 
> but RFC 8174 says the text should read as follows if the authors are following
> the guidance in RFC 8174
> 
> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
> "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
> document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when,
> and only when, they appear in all capitals, as shown here.
> 
> if the authors are not following that guidance  I would think that the original
> RFC 2119 wording should be used

The intent is to follow RFC 8174, where only upper case denotes an actual requirement,
in part because this document is providing requirements input to IEEE 802.

> ----
> the 3rd pp of section 2.2 says "
> The migrating VM should not be in Running state at the same time on the source
> hypervisor and destination hypervisor during migration
> 
> the pp goes on to say that it could happen

Not exactly ... Migration state occurs between the Running and Shutdown states
in both directions as described in the first paragraph of that section:

   The VM state on source hypervisor 1
   transits from Running to Migrating and then to Shutdown [RFC7666].
   The VM state on destination hypervisor 2 transits from Shutdown to
   Migrating and then Running.
 
> I may be missing something but this puzzles me a bit - I would think that the
> state of the results of the operation of the VM (e.g. database updates) would
> be indeterminable if both VMs are running at the same time without some sort of
> lockout -maybe this should be MUST NOT?

In practice, there is a lockout, but it only involves the hypervisors.  Both VMs are
in Migrating state during the transfer of execution from one host to another.
One of the benefits of this is that it reduces the number of entities that have to
participate in the transfer of control, as the states visible through the interface
change before and after transfer of execution, but not during that transfer.

Stating that both states are Migrating during transfer of execution could help
clarify this, and see below on removal of upper case RFC 2119 keywords from
all of section 3.
 
>  ----
> the 4th pp in section 3.1 states that "the external NVE MUST be notified ...
> when it no longer requires connection" - what happens if the software on the
> device needing the connection hangs - how is the notification done?

Something else has to decide that the device is dead and take action - that's
outside the scope of the protocol described here because another entity is
involved.  A sentence to note this need to clean up failed devices would make
sense to add.

> ---
> section 3 of the ID contains some things that appear to be requirements (i.e.,
> include MUST etc) and some things that appear to be descriptive - without
> calling out the actual requirements as is done in section 4 it will be hard for
> the technology specification developers to know what requirements they
> need to
> meet -if section 4 is a comprehensive list of requirements then it would seem
> to be a good idea to avoid 2119 type capitalization in section 3 - if not I
> would expect missed requiements

That sounds like the right approach, as the introductory text to Section 3
has this to say:

   The following subsections show illustrative examples of the state
   transitions of an external NVE which are relevant to Hypervisor-to-
   NVE Signaling protocol functionality. It should be noted this is not
   prescriptive text for the full state machine.