Re: [Int-dir] Intdir telechat review of draft-ietf-sfc-multi-layer-oam-26
CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es> Thu, 06 July 2023 07:37 UTC
Return-Path: <cjbc@it.uc3m.es>
X-Original-To: int-dir@ietfa.amsl.com
Delivered-To: int-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A0E05C14CEFC for <int-dir@ietfa.amsl.com>; Thu, 6 Jul 2023 00:37:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.752
X-Spam-Level:
X-Spam-Status: No, score=-0.752 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, NORMAL_HTTP_TO_IP=0.001, NUMERIC_HTTP_ADDR=1.242, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=it.uc3m.es
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j4BM3Y7Zjn-G for <int-dir@ietfa.amsl.com>; Thu, 6 Jul 2023 00:37:03 -0700 (PDT)
Received: from mail-lj1-x233.google.com (mail-lj1-x233.google.com [IPv6:2a00:1450:4864:20::233]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87864C1522CD for <int-dir@ietf.org>; Thu, 6 Jul 2023 00:37:03 -0700 (PDT)
Received: by mail-lj1-x233.google.com with SMTP id 38308e7fff4ca-2b6f9edac8dso4442231fa.3 for <int-dir@ietf.org>; Thu, 06 Jul 2023 00:37:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=it.uc3m.es; s=google; t=1688629021; x=1691221021; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=NcCGFhCzEiwQzuovPsbBvfz6a5u64D8sk5Biw/++rYM=; b=IXlcG+a9EjydnUI8OoPh1D9OzsR+2lVWq2Nc5eyfNymrzNswFiIGQjTm2P9rw7E2DX 0NwHQcQLKw/yob2/hVZuEpnX4s6RZo21zIJJasZsSU2Pab14J/TihBS0b3+uzYWi8dWu WqRtoEVF3/9/MQ9CW3zQDS1ypCENEiSzNCoogBItMr23HtVliibWc7JKmk/c0ohtcQ9d M8LCOgFyvKJqihkL7slKU+PmKddZXddLD5abXhB2b5IDWawCUUM9XVakGD/XJU3+dOsJ PtYZsO0MTQm7/jCNhnacMyOmtI/HUfFjmLx6G7VQ8jsqafWOh5MeOudFh9Toc7YzQqDc NnYQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1688629021; x=1691221021; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=NcCGFhCzEiwQzuovPsbBvfz6a5u64D8sk5Biw/++rYM=; b=jlMqwMLl9Ngh1gX1RFxgiiKpkv7QM6MBSOQ9vb1UXgAde5v7Um0P/6xWBhXmI6c71a mxcWLVp6kTbCBc5Vb6DzUpCbiWB4A7ix/JvXpy/4trAqxHZmQ6hEec8ZcQyuAzK3NMH+ dcf7H2760FqH8yhpKDkkzhlnOB1oVJuvkS4HoaSv6GykDRT0UBUDDh7/7P/p2xNSpaGD 8drqrMoT0gC9wT2BbmUZ8gP/udfWmU4eozQ3fVzNtqVae9pyQXhLEJC5E/ejddv6iWNG A029afT1QzgWzKdoQCtY+IBGz1vCLlzIEY2CK9ldIGhLMOyn8nY2qFsxlWSHeHQzxEHZ 2tgQ==
X-Gm-Message-State: ABy/qLbhDhe3borwbkA0fNmG8SEiyjdLae8wRpAhzapjaXW4L0dI4dnw KYIgPq6G7i1eHPbk5v3D2QUeoT/Tc0uMTdhoL/FQ1Q==
X-Google-Smtp-Source: APBJJlEos+b88K2aEBSDYVLdcxErkHwgrxkLGgpOidZIvsa60OJKkFiz9pBAZkGP87PhSvFwN3fBDAM6fk3O6QpHZgw=
X-Received: by 2002:a2e:9909:0:b0:2b6:eefc:3e4f with SMTP id v9-20020a2e9909000000b002b6eefc3e4fmr731590lji.21.1688629020893; Thu, 06 Jul 2023 00:37:00 -0700 (PDT)
MIME-Version: 1.0
References: <168797548322.12935.4716326698012525020@ietfa.amsl.com> <CA+RyBmVokUfEopvvYjyGQF_cWHM+g8RseTpNvsCzR_227zx47g@mail.gmail.com>
In-Reply-To: <CA+RyBmVokUfEopvvYjyGQF_cWHM+g8RseTpNvsCzR_227zx47g@mail.gmail.com>
From: CARLOS JESUS BERNARDOS CANO <cjbc@it.uc3m.es>
Date: Thu, 06 Jul 2023 09:36:44 +0200
Message-ID: <CALypLp_O9c3_Wcn=9RhR-vSnsdEAqXdidfe3Xy4FpU6iBiEfGg@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: int-dir@ietf.org, draft-ietf-sfc-multi-layer-oam.all@ietf.org, last-call@ietf.org, sfc@ietf.org
Content-Type: multipart/alternative; boundary="000000000000f2f21605ffcc9467"
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-dir/4jtEBLq8ebP1rgCLT2hP3xgt7qo>
Subject: Re: [Int-dir] Intdir telechat review of draft-ietf-sfc-multi-layer-oam-26
X-BeenThere: int-dir@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This list is for discussion between the members of the Internet Area directorate." <int-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-dir>, <mailto:int-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-dir/>
List-Post: <mailto:int-dir@ietf.org>
List-Help: <mailto:int-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-dir>, <mailto:int-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jul 2023 07:37:07 -0000
Hi Greg, Apologies for my belated reply. Thanks for the updates. They work for me. Thanks, Carlos On Thu, Jun 29, 2023 at 1:56 AM Greg Mirsky <gregimirsky@gmail.com> wrote: > Hi Carlos, > thank you for your thoughtful comments and helpful suggestions. Please > find my notes below tagged by GIM>>, > I wincluded updates in the new working version. Please take a look into > attached diff that highlights all the updates discussed below. > > Regards, > Greg > > On Wed, Jun 28, 2023 at 11:04 AM Carlos Bernardos via Datatracker < > noreply@ietf.org> wrote: > >> Reviewer: Carlos Bernardos >> Review result: Ready with Issues >> >> I am an assigned INT directorate reviewer for >> draft-ietf-sfc-multi-layer-oam. >> These comments were written primarily for the benefit of the Internet Area >> Directors. Document editors and shepherd(s) should treat these comments >> just >> like they would treat comments from any other IETF contributors and >> resolve >> them along with any other Last Call comments that have been received. For >> more >> details on the INT Directorate, see >> https://datatracker.ietf.org/group/intdir/about/ >> <https://datatracker.ietf.org/group/intdir/about/>. >> >> Based on my review, if I was on the IESG I would ballot this document as >> NO >> OBJECTION. >> >> The following are other issues I found with this document that SHOULD be >> corrected before publication, including also minor issues (typos, >> misspelling, >> minor text improvements): >> >> Section 2.2: >> I’d add references to the documents where the acronyms are >> defined/introduced. >> > GIM>> I agree that that could be helpful to a reader but, as I understand > it, we expect that the reader is already familiar with the terminology > through reading documents that define architecture, and applicable > solutions for the particular problem area. > >> >> Section 3: >> “Segment SFC OAM” is not introduced/defined before in the document and I >> think >> it’d be good to do it. >> > GIM>> Would the following update make the interpretation of Segment SFC > OAM clearer: > OLD TEXT: > Segment SFC OAM is between two elements that are part of the > same SFP. > NEW TEXT: > The scope of Segment SFC OAM is between two elements that > are part of the same SFP. > >> >> “For example, in the E2E FM SFC OAM case, the egress, SFF3, in the >> example in >> Figure 1, could be the entity that detects the SFP's failure by >> monitoring a >> flow of periodic test packets” —> this can be rewritten, to avoid >> repetitive >> use of “example” >> > GIM>> Thank you for pointing this out. Would the following update improve > it: > For example, > in the E2E FM SFC OAM case, the egress, SFF3 (Figure 1) could be the > entity that detects the SFP's failure by monitoring a flow of > periodic test packets. > >> >> “*REQ#8: Can be addressed by an extension of the SFC Echo Request/ Reply >> described in this document adding proxy capability“ —> I find this not >> easy to >> parse (it refers to a way to satisfy a previously enumerated requirement, >> but >> it is written differently to the other ones). Besides, it mentions “proxy >> capability” and this is not mentioned using these words anywhere else in >> the >> document. >> > GIM>> Indeed, that is an awkward sentence. Would the following re-wording > help: > REQ#8: Can be addressed by adding the proxying capability to the > SFC Echo Request/Reply described in this document. [RFC7555] > describes an example of a proxy function for an Echo Request. > Specification of proxy function for SFC Echo Request is outside > the scope of this document. > >> >> Section 4: >> It mentions message and packet. I guess both terms are used to refer to >> the >> same thing, but I’d just use one term. >> > GIM>> It seems like both terms are equally used in the document - message > (60) vs. packet (56). I hope that it can be left for the RFC Editor > consideration. WDYT? > >> >> Section 5: >> I’d probably explicitely add over which protocols an “Active SFC OAM >> Header” >> can be transported. >> > GIM>> To ensure that an SFC active OAM packet traverses the same path, > i.e., SFFs and network that interconnect them, the SFC OAM packet, > including the Active SFC OAM Header, MUST be transported over the same > protocols as an SFC data packet. One example is SFC NSH. > >> >> Any requirement on the length/alignment of the SFC Active OAM Control >> Packet? >> > GIM>> I cannot think of any such requirement. > >> >> Section 6.3.1: >> Should the title of this be “Source ID TLV”? Same applies to the caption >> of >> Figure 5. I find a bit misleading using “Source TLV” and “Source ID TLV” >> and >> “SFC Source TLV”. >> > GIM>> Thank you for catching this inconsistency in terminology. I changed > everything to Source ID TLV. > >> >> I find the first paragraph of this section a bit too convoluted, because >> it >> describes which destination IP and UDP to use, while these fields are in >> the >> TLV message described after this paragraph. >> > GIM>> I reworked it. Would the new version be clearer? > Because the NSH does not identify the ingress > node that generated the Echo Request, information that sufficiently > identifies the source MUST be included in the message so that the IP > destination address and destination UDP port number for IP/UDP > encapsulation of the SFC Echo Reply could be derived. > >> >> When describing the “IP address” field it says that the value of the >> field MUST >> be used as the destination IP address. But this is not said when >> describing the >> “Port Number” field. I’d do the same for consistency. >> > GIM>> Agree. Done. > >> >> Section 6.4: >> When the document says “the control plane is triggered”, does this mean >> when an >> SFC Echo Reply is triggered? It is not 100% clear what is referred here. >> > GIM>> You are correct. We describe conditions that cause punting SFC Echo > Request out from the data plane for processing in the node's control plane. > I re-worded it as follows: > Punting a received SFC Echo Request to the control plane for > validation and processing is triggered by one of the following packet > processing exceptions: NSH TTL expiration, NSH Service Index (SI) > expiration, or the receiver is the terminal SFF for an SFP. > >> >> Again “Source TLV” should be checked for consistency and use whatever >> term is >> finally used. >> > GIM>> Changed to "Source ID TLV" > >> >> Section 6.5.3: >> Minor: any recommendation on how many past SFC Echo Requests to keep to >> match >> agains Echo Replies received? >> > GIM>> An interesting question, thank you. AFAIK, the echo request has a > timer that would expire if no matching echo reply is received. Thus, only > one outstanding echo request is allowed. > >> >> Section 6.6.1: >> “Must to include” —> “MUST include” >> > GIM>> Thank you for catching this. > >> >> “SF Information Sub-TLV: The sub-TLV is as defined in Figure 10.” >> —> I’d use “Section 6.6.2” instead of “Figure 10”. >> > > GIM>> Agreed. > >> >> Section 6.6.2: >> Any alignment considerations for the “SF Identifier” field? >> > GIM>> Good question, thank you. It appears that implicitly we expect that > an IP address will be used as an SF ID. Could there be other types of > identification? What do you think? > >> >> Sections 6.6.3.1 and 6.6.3.2: >> Though I understand that there is a semantic difference, should we use >> the same >> nomenclature in Figure 11 and Figure 12 regarding “CVRep1(SF1,SF2)” and >> “CVRep1({SF1a,SF1b})”. >> > GIM>> Changed to only round brackets. > >> >> Section 7: >> “To protect against unauthorized sources trying to obtain information >> about the >> overlay and/or underlay, an implementation MAY check that the source of >> the >> Echo Request is indeed part of the SFP.” —> I personally find this MAY >> weird. >> Either it is left to the implementation how to check if the source of the >> Echo >> Request is authorized (independently of whether is part of the SFP or >> not) or >> I’d change this to be a SHOULD or a MUST if the sender has to be part of >> the >> SFP. >> > GIM>> Thank you for pointing this out. I agree that 'MAY' is too weak. > Changed to MUST. >
- [Int-dir] Intdir telechat review of draft-ietf-sf… Carlos Bernardos via Datatracker
- Re: [Int-dir] Intdir telechat review of draft-iet… Greg Mirsky
- Re: [Int-dir] [Last-Call] Intdir telechat review … Eric Vyncke (evyncke)
- Re: [Int-dir] Intdir telechat review of draft-iet… CARLOS JESUS BERNARDOS CANO