Re: [Int-dir] Intdir telechat review of draft-ietf-ippm-stamp-on-lag-05

Tianran Zhou <zhoutianran@huawei.com> Wed, 06 December 2023 05:40 UTC

Return-Path: <zhoutianran@huawei.com>
X-Original-To: int-dir@ietfa.amsl.com
Delivered-To: int-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AED86C09036E; Tue, 5 Dec 2023 21:40:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.905
X-Spam-Level:
X-Spam-Status: No, score=-6.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VlblGJTPdQWK; Tue, 5 Dec 2023 21:40:17 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A6C57C14CF17; Tue, 5 Dec 2023 21:40:17 -0800 (PST)
Received: from mail.maildlp.com (unknown [172.18.186.31]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4SlR1z0srGz6K5wt; Wed, 6 Dec 2023 13:35:19 +0800 (CST)
Received: from lhrpeml500005.china.huawei.com (unknown [7.191.163.240]) by mail.maildlp.com (Postfix) with ESMTPS id C1A33140C9C; Wed, 6 Dec 2023 13:40:14 +0800 (CST)
Received: from kwepemd100004.china.huawei.com (7.221.188.31) by lhrpeml500005.china.huawei.com (7.191.163.240) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Wed, 6 Dec 2023 05:40:14 +0000
Received: from kwepemd100004.china.huawei.com (7.221.188.31) by kwepemd100004.china.huawei.com (7.221.188.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.28; Wed, 6 Dec 2023 13:40:12 +0800
Received: from kwepemd100004.china.huawei.com ([7.221.188.31]) by kwepemd100004.china.huawei.com ([7.221.188.31]) with mapi id 15.02.1258.028; Wed, 6 Dec 2023 13:40:12 +0800
From: Tianran Zhou <zhoutianran@huawei.com>
To: Antoine Fressancourt <antoine@aft.network>, "int-dir@ietf.org" <int-dir@ietf.org>
CC: "draft-ietf-ippm-stamp-on-lag.all@ietf.org" <draft-ietf-ippm-stamp-on-lag.all@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>
Thread-Topic: Intdir telechat review of draft-ietf-ippm-stamp-on-lag-05
Thread-Index: AQHaHH509s8x/DVUr06UJ5BG0ymv2bCbjJkw
Date: Wed, 06 Dec 2023 05:40:12 +0000
Message-ID: <273ddd04dc054bb79128adaa40ac57c9@huawei.com>
References: <170057322328.20750.12102143094570459370@ietfa.amsl.com>
In-Reply-To: <170057322328.20750.12102143094570459370@ietfa.amsl.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.112.40.118]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-dir/QDCFV0AqXH68o9MfftMnZQSwuzU>
Subject: Re: [Int-dir] Intdir telechat review of draft-ietf-ippm-stamp-on-lag-05
X-BeenThere: int-dir@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "This list is for discussion between the members of the Internet Area directorate." <int-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-dir>, <mailto:int-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-dir/>
List-Post: <mailto:int-dir@ietf.org>
List-Help: <mailto:int-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-dir>, <mailto:int-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Dec 2023 05:40:21 -0000

Hi Antonie,

Thanks very much for your detailed review and your comments.
Please see in line.

Best,
Tianran

-----Original Message-----
From: Antoine Fressancourt via Datatracker [mailto:noreply@ietf.org] 
Sent: Tuesday, November 21, 2023 9:27 PM
To: int-dir@ietf.org
Cc: draft-ietf-ippm-stamp-on-lag.all@ietf.org; ippm@ietf.org; last-call@ietf.org
Subject: Intdir telechat review of draft-ietf-ippm-stamp-on-lag-05

Reviewer: Antoine Fressancourt
Review result: Ready with Issues

I am an assigned INT directorate reviewer for draft-ietf-ippm-stamp-on-lag-05.txt. These comments were written primarily for the benefit of the Internet Area Directors. Document editors and shepherd(s) should treat these comments just like they would treat comments from any other IETF contributors and resolve them along with any other Last Call comments that have been received. For more details on the INT Directorate, see https://datatracker.ietf.org/group/intdir/about/
<https://datatracker.ietf.org/group/intdir/about/>.

Based on my review, if I was on the IESG I would ballot this document as DISCUSS.

* I have the following DISCUSS/ABSTAIN level issues:

** In Section 3.2, the behavior of the Session-Sender and of the Session-Reflector regarding the value of the Reflector Micro-session ID field is problematic. Indeed, the 3rd paragraph of Section 3.2 states that the Session-Sender MUST set the Reflector Micro-session ID field if he knows it, or set it to ZERO otherwise. Yet, the conditions in which this field is supposed to be known are unclear, and the last sentence of the paragraph states that how the Reflector is supposed to know this ID is outside the document's scope. As a potential implementer of this protocol, I find this description puzzling, and let me wonder when the Session-Reflector is supposed to know this ID. The 5th paragraph of Section 3.2 mentions that the Session-Reflector MUST check the value of the Reflector Micro-session ID if it is not set to ZERO, but is rather unclear about what is the benefits one can take out of this verification. 

ZTR> In the document, "The Reflector member link identifier can be obtained from pre-configuration or learned from data plane (e.g., the reflected test packet).", this gives example to get the Reflector member link identifier. And I would like rephrase the following text as "This document does not specify the way to obtain the Reflector member link identifier."

This use and management of the Reflector Micro-session ID is even more confusing when reading the last sentence of Section 3.2 which mentions that any procedure with regards to the Micro-session ID is stateless.

ZTR> In RFC8762, the state is mainly about counter. That means the reflector need to manage/change the counter state based on the packet received. However in this case Micro-session ID is always there without a state change. So I think there is no state management, hence stateless.

The document should either mention the benefit that can be taken from having the Session-Sender set the proper value for the Reflector Micro-session ID and give some more details about how and when the Session-Sender are supposed to learn about this ID, or be more relaxed with regards to the value of this field. Besides, given that, to the best of my knowledge, RFC 8972 does not give any constraint about the length of STAMP optionnal TLVs (even if the examples given in RFC 8972 are all aligned to 4 bytes...), I wonder what is the benefit from keeping the Reflector Micro-session ID in the TLV, so the overall Micro-session ID TLV could be 6 bytes long.

ZTR> The value of setting Reflector Micro-session ID at the Session-Sender is to do the member link validation. In the document, " When the micro STAMP Session-Reflector receives a test packet, if the Reflector Micro-session ID is not zero, the micro STAMP Session-Reflector MUST use the Reflector member link identifier to check whether it is associated with the micro STAMP session. If the validation fails, the test packet MUST be discarded." 

* The following are other issues I found with this document that SHOULD be corrected before publication:

** In Section 2, in the 4th paragraph, it is stated that "each micro STAMP session MUST be assigned with a unique SSID", yet, if I read correctly, in RFC
8972 this MUST is a MAY (3rd paragraph in Section 3 of RFC 8972: "A STAMP Session-Sender MAY generate a locally unique STAMP session Identifier (SSID)."). This should be either harmonized or, if there is a reason for requiring a MUST here, it should be clearly stated.

ZTR> Yes. And together with some other suggestions on validation check, we would like to remove this paragraph. 

* The following are minor issues (typos, misspelling, minor text improvements) with the document:

** In Section 1, the document should include a clear reference to OWAMP and TWAMP to help the reader refer to the document describing those protocols.

ZTR> Yes. I will add the reference in the next version.