Re: [Int-area] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London

Greg Mirsky <gregimirsky@gmail.com> Thu, 19 April 2018 16:31 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 233CB12DA28; Thu, 19 Apr 2018 09:31:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level:
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KJcJuJNxH0z4; Thu, 19 Apr 2018 09:31:02 -0700 (PDT)
Received: from mail-lf0-x234.google.com (mail-lf0-x234.google.com [IPv6:2a00:1450:4010:c07::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0BDEF12DA4F; Thu, 19 Apr 2018 09:31:02 -0700 (PDT)
Received: by mail-lf0-x234.google.com with SMTP id x130-v6so1047960lff.9; Thu, 19 Apr 2018 09:31:01 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=PXxDqdkMEO81504Z0o2gv7fJaO1X6Dsm2ZmgojdsdgY=; b=UqMDMfzaAq3x4/uFAmXQoxSZu5jwlbQZrNZOANbXkuwdgiXIR37jPITU6SXDXTE/5B 5DkkHnbzaDU59OkcMHvc9+dh0NU4IsWPCrqpX8PFcqzNN/Ab3WYRs3l3IUv7GC7bWH9v qj1AmVcFRVVMzckZdukjZ2THGKIyuRqnr7+rWTPJZV9Imo2ffpbGHU1PbmZDmUVVr74B mKEduKvCjsBW0halpw22TTnNOKVMH1aU2qdSv8P/ld+P86c3mpBK6nv1HA7ZRiE4//CQ lcHXPg15wuFdFGXblvvWhAgNNN8hlu1+HfLfaQzbN4reegn9VXre+tIQC+V6ZG1xXb/B BF4A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=PXxDqdkMEO81504Z0o2gv7fJaO1X6Dsm2ZmgojdsdgY=; b=Emlz+7+bUkdyMH5G597pfDFcbT3z5SOOhiiESxXB++IlM5qckZKgL+ZdD3eRi3oUsJ oHoX2N+7M8dNj0S58gt/mCcBqnKa6d9EOt0CcuKFq+k+6IBsFS04gIaOf5VnARCLwpgf RBJvEHNxi5WRB/mBsit4yyPz879CcQg0TVIoU0Q46vtQg7oKAruTkhqaYl1nJlo0piD/ bkyTLHJ2eO5m+/KvmZCK2o3kK8Vfx7mYNo/7ej1OvbdAttXw6U/iZE/YDQ8S7C8XE2md sed23TnzTqlwxdy3UsMxl+5M00qt6ofVV5g///3PITdMnPTXzXU04WylWhFF51AD3U8f 88Fw==
X-Gm-Message-State: ALQs6tAfPbkaZ7XE7+bCzSfvawZIsybGEP1cyDxolJa+eqJIpIpM8269 s2ag/ImveH99L5NRYrXyx6kEdeGVf/yINewYPHo=
X-Google-Smtp-Source: AIpwx49aasDDIQJqsm3jdNOhld8KDkeSrPWRwe8Xx9ciJvnzDUS1xeoaN2k7GUT86LSu0VvgMvibtIAMwERHRjJMFO8=
X-Received: by 10.46.156.81 with SMTP id t17mr4990143ljj.58.1524155460180; Thu, 19 Apr 2018 09:31:00 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.46.73.66 with HTTP; Thu, 19 Apr 2018 09:30:59 -0700 (PDT)
In-Reply-To: <CAPOJaHwZau-+jRRqK99dtTrw0t7E4gZRL_wM4ks9OWJ-YC1dpg@mail.gmail.com>
References: <ff0c9182d1f14ec48b352e41fedaf58e@XCH-RCD-008.cisco.com> <CA+RyBmUNHcQZtTGJj67V=DqPkwV6GXWDUQJGjwT7ODEFg_QQFA@mail.gmail.com> <f48b40357e644666bdd5c51c63118f80@XCH-RCD-008.cisco.com> <CAPOJaHwZau-+jRRqK99dtTrw0t7E4gZRL_wM4ks9OWJ-YC1dpg@mail.gmail.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Thu, 19 Apr 2018 09:30:59 -0700
Message-ID: <CA+RyBmUFvgYhkFYv4J1G6ujiuB=Nt6+E35hp1m87f7Q=4tQkyQ@mail.gmail.com>
To: John Lemon <john.lemon@broadcom.com>
Cc: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>, NVO3 <nvo3@ietf.org>, "int-area@ietf.org" <int-area@ietf.org>, Service Function Chaining IETF list <sfc@ietf.org>, IETF IPPM WG <ippm@ietf.org>
Content-Type: multipart/alternative; boundary="f4f5e80ee2f8c96174056a361897"
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/7KaRD7nTgTVYQKX0HN6-nL1vhWc>
Subject: Re: [Int-area] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Apr 2018 16:31:10 -0000

Hi John,
I don't argue with the importance of interoperable implementations (though
early implementations accept the risk of non-compliance with the final
specification, for example, SFC NSH). At the same time, I don't think that
mere fact of existing implementation should cancel discussion of technical
characteristics of the proposed approaches to hybrid OAM.

Regards,
Greg

On Thu, Apr 19, 2018 at 9:09 AM, John Lemon <john.lemon@broadcom.com> wrote:

> I never saw a response to the request for a pointer to an OOAM
> implementation, so I assume none exist.
>
> I've seen several good arguments for why the existing IOAM implementation,
> for which several implementations exist, meets the needs for IOAM.
>
> I think it is time to put to bed the request to examine merging OOAM and
> IOAM. Let's move forward with IOAM and not hold it up.
>
> Respectfully, John
>
>
> On Thu, Apr 12, 2018 at 11:06 AM, Frank Brockners (fbrockne) <
> fbrockne@cisco.com> wrote:
>
>> Hi Greg,
>>
>>
>>
>> thanks – and it seems that we’re on the same page with regards to
>> efficiency (4 bytes of non-required overhead) and maturity (or lack of) of
>> OOAM.
>>
>>
>>
>> On the IOAM implementation: There are several implementations of IOAM.
>> Some of which have recently been worked on and shown at an IETF hackathon,
>> see https://datatracker.ietf.org/meeting/100/materials/slides-10
>> 0-hackathon-sessa-in-situ-oam-ioam - where we’ve shown IPv6 and
>> VXLAN-GPE with IOAM – on FD.io/VPP as well as on Barefoot Tofino. You
>> probably also remember the Netronome/Broadcom demo -
>> https://www.youtube.com/watch?v=j9FbD4a3F4E .
>>
>> Below you seem to be specifically referring to the IOAM open source
>> implementation in FD.io/VPP: There are protocol encapsulations for
>> VXLAN-GPE, NSH, and IPv6 implemented in FD.io/VPP. The current code uses
>> the “next header approach” for VXLAN-GPE and it leverages MD-Type 2 for
>> NSH. As you’re well aware, there the discussion in SFC whether to use
>> MD-Type 2 or next header encapsulating IOAM data in NSH isn’t yet settled,
>> hence we’ll refrain from updating the code until SFC WG has come to a
>> conclusion.
>>
>>
>>
>> Could you provide a pointer to an OOAM implementation?
>>
>>
>>
>> Thanks,
>>
>> Frank
>>
>>
>>
>> *From:* Greg Mirsky <gregimirsky@gmail.com>
>> *Sent:* Donnerstag, 12. April 2018 18:54
>> *To:* Frank Brockners (fbrockne) <fbrockne@cisco.com>
>> *Cc:* IETF IPPM WG <ippm@ietf.org>; NVO3 <nvo3@ietf.org>; Service
>> Function Chaining IETF list <sfc@ietf.org>; int-area@ietf.org
>> *Subject:* Re: [ippm] encapsulation of IOAM data in various protocols -
>> follow up from WG discussion in London
>>
>>
>>
>> Hi Frank,
>>
>> thank you for sharing your points. Please find my notes in-line and
>> tagged GIM>>. I believe that this is very much relevant to work of other
>> working groups that directly work on the overlay encapsulations in the
>> center of the discussion and hence I've added them to the list. Hope we'll
>> have more opinions to reach the conclusion that is acceptable to all.
>>
>>
>>
>> Regards,
>>
>> Greg
>>
>>
>>
>> On Wed, Apr 11, 2018 at 12:02 PM, Frank Brockners (fbrockne) <
>> fbrockne@cisco.com> wrote:
>>
>> Back at the IPPM meeting in London, we discussed several drafts dealing
>> with the encapsulation of IOAM data in various protocols
>> (draft-brockners-ippm-ioam-vxlan-gpe-00, draft-brockners-ippm-ioam-geneve-00,
>> draft-weis-ippm-ioam-gre-00). One discussion topic that we decided to take
>> to the list was the question on whether draft-ooamdt-rtgwg-ooam-header
>> could be leveraged.  After carefully considering
>> draft-ooamdt-rtgwg-ooam-header, I came to the conclusion that the “OOAM
>> header” does not meet the needs of IOAM:
>>
>> * Efficiency: IOAM adds data to live user traffic. As such, an
>> encapsulation needs to be as efficient as possible. The “OOAM header” is 8
>> bytes long. The approach for IOAM data encapsulation in the above mentioned
>> drafts only requires 4 bytes. Using the OOAM header approach would add an
>> unnecessary overhead of 4 bytes – which is significant.
>>
>> GIM>> The difference in four octets is because OOAM Header:
>>
>>    - provides more flexibility, e.g. Flags field and Reserved fields;
>>    - supports larger OAM packets than iOAM header;
>>    - is future proof by supporting versioning (Version field).
>>
>> * Maturity: IOAM has several implementations, which were also shown at
>> recent IETF hackathons – and we’re expecting additional implementations to
>> be publicized soon. Interoperable implementations need timely
>> specifications. Despite the question being asked, the recent thread on OOAM
>> in the NVO3 list hasn’t revealed any implementation of the OOAM header. In
>> addition, the thread revealed that several fundamental questions about the
>> OOAM header are still open, such as whether or how active OAM mechanisms
>> within protocols such as Geneve would apply to the OOAM header. This
>> ultimately means that we won’t get to a timely specification.
>>
>> GIM>> May I ask which encapsulations supported by the implementations you
>> refer to. Until very recently all iOAM proposals were to use meta-data TLV
>> in, e.g. Geneve and NSH. And if these or some of these implementations
>> already updated to the newly proposed iOAM shim, I don't see problem in
>> making them use OOAM Header. Would you agree?
>>
>>
>>
>> * Scope: It isn’t entirely clear to which protocols the OOAM header would
>> ultimately apply to. The way the OOAM header is defined, OOAM uses a 8-bit
>> field for “Next Prot”, the next protocol. Some protocols that IOAM data
>> needs to be encapsulated into use 16-bits for their next protocol code
>> points. See e.g. the GRE encapsulation – as specified in
>> draft-weis-ippm-ioam-gre-00.
>>
>> GIM>> The first paragraph of the Introduction section states:
>>
>>    New protocols that support overlay networks like VxLAN-GPE
>>
>>    [I-D.ietf-nvo3-vxlan-gpe], GUE [I-D.ietf-nvo3-gue], Geneve
>>
>>    [I-D.ietf-nvo3-geneve], BIER [I-D.ietf-bier-mpls-encapsulation], and
>>
>>    NSH [I-D.ietf-sfc-nsh] support multi-protocol payload, e.g.
>>
>>    Ethernet, IPv4/IPv6, and recognize Operations, Administration, and
>>
>>    Maintenance (OAM) as one of distinct types.  That ensures that
>>
>>    Overlay OAM (OOAM)packets are sharing fate with Overlay data packet
>>
>>    traversing the underlay.
>>
>> I'm updating the OOAM Header draft and along with cleaning nits will
>> update reference to GUE. I think that the list and the statemnt are quite
>> clear in identifying the scope of networks that may benefit from using not
>> only common OOAM Header but common OOAM mechanisms, e.g. Echo
>> Request/Reply
>> <https://tools.ietf.org/html/draft-ooamdt-rtgwg-demand-cc-cv-03>.
>>
>>
>>
>> With the above in mind, I’d suggest that the WG moves forward with
>> specific definitions for encapsulating IOAM data into protocols – per the
>> above mentioned drafts.
>>
>>
>>
>> Regards, Frank
>>
>>
>> _______________________________________________
>> ippm mailing list
>> ippm@ietf.org
>> https://www.ietf.org/mailman/listinfo/ippm
>>
>>
>>
>> _______________________________________________
>> ippm mailing list
>> ippm@ietf.org
>> https://www.ietf.org/mailman/listinfo/ippm
>>
>>
>