Re: [Int-dir] Éric Vyncke's No Objection on draft-ietf-sfc-oam-framework-13: (with COMMENT)
"Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com> Wed, 13 May 2020 21:01 UTC
Return-Path: <naikumar@cisco.com>
X-Original-To: int-dir@ietfa.amsl.com
Delivered-To: int-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AB823A091D; Wed, 13 May 2020 14:01:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=NAo9QbQt; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=lW55qTUD
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id of2jNynnplVV; Wed, 13 May 2020 14:01:14 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EDAD83A091A; Wed, 13 May 2020 14:01:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14476; q=dns/txt; s=iport; t=1589403673; x=1590613273; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=EevsQtadJFLGQ2rKXSTGd40YqxbS4MBJkfTChTAakgo=; b=NAo9QbQtd+Uk8MkWA1aBTHrNQJkLis5nVKFI/BwWQHEyBiwMwgDktCw5 FRUfik6DkkAoJVyU1ZrxReTZZ4cnDBXqGG7AUXIj/o9MvZ/LT1rSJHcFi ljGtxM/T6G2iu83NEzQFDqmwzGCWSs54TJAsxppEW8vXottHfEBV8v5tk 4=;
IronPort-PHdr: 9a23:dIqOMxz62rbX1fnXCy+N+z0EezQntrPoPwUc9psgjfdUf7+++4j5ZRWDt/5sl1TOG47c7qEMh+nXtvXmXmoNqdaEvWsZeZNBHxkClY0NngMmDcLEbC+zLPPjYyEgWsgXUlhj8iKwMFNeH4D1YFiB6nG35CQZTxP4Mwc9L+/pG4nU2sKw0e36+5DabwhSwjSnZrYnJxStpgKXvc4T0oY=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AJCACwX7xe/4sNJK1mHQEBAQEJARIBBQUBQIFHgVQkLQdvWC8sCoQbg0YDjRiYXIFCgRADVAsBAQEMAQElCAIEAQGERAIXgXckOBMCAwEBCwEBBQEBAQIBBQRthVYMhXICAQMSEREMAQE3AQ8CAQgSCAImAgICMBUCAwsCBAENBRsHgwQBgksDLgEOA6ZpAoE5iGF2gTKDAQEBBYEyARNBgz8Ygg4DBoEOKoJjiV8aggCBEScMEIFPfj6CZwIBAgGBLAELBwEHITECglozgi2OPhIGgkcBPKEoCoJNiB2LR4RQHYJdiGyFAogIhHaDc4w5iV+TWQIEAgQFAg4BAQWBaSJmWBEHcBUaISoBgj5QGA2QQDiDOoUUhUJ0AjUCBgEHAQEDCQF7jAOBNQGBDwEB
X-IronPort-AV: E=Sophos;i="5.73,389,1583193600"; d="scan'208";a="770110186"
Received: from alln-core-6.cisco.com ([173.36.13.139]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 13 May 2020 21:00:49 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by alln-core-6.cisco.com (8.15.2/8.15.2) with ESMTPS id 04DL0nFA025244 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 13 May 2020 21:00:49 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 13 May 2020 16:00:49 -0500
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 13 May 2020 16:00:48 -0500
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Wed, 13 May 2020 16:00:48 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=loVGzyS7X9nYw469zS4NHDfdBfx8Qi3nHh6/DY46Kztr7gGd9FZh0v5xZ7qv3FOETFkwpZKInXDcAy5JJk8GTuCj2u/2R+Pw4QrC4IEhDlmjUUIYktjb28FRxPrg6fVra2F5ZrwtQu8noPhIMAgkNFF04/VSB8XQ2FbmxgQgJ95sTLBdwNsa/dOxIVVUMLC0jDmexUEf84de0we8ke+N+bSTRYGL0HEPueUYk5Bkrw4xziP5gm8HHBAU9WDsvcfFDr2/hZk8jRsnWQaiU2/czbUeRTdbi50Zv6LNraJNG3hH8OtCboagBChigdPXzNc1Rk+MOw5nGweSVRuwsx1pEg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EevsQtadJFLGQ2rKXSTGd40YqxbS4MBJkfTChTAakgo=; b=XnBzCfsI3hB296qa1sjLnw40KOOjBlyBOBmP3e75bs+mToB2/AVq8K3CWaDVU+eZ3ipKDGZOE56YVSnI80CZZBRSM4rWAHoptqLnqVtWa/n4JH22wY1ghWq6BuJCiVU7A/wf4FzR+C5SHG0R5Rdnt19eRS2qDKfvdFXaquW6jR2SaA+h0imCsx6n8BVy9cKOVsHnKpBpdUQ9rkUMrb1Wy2jeDU970ltiSr5GiRwi2lEzEDEVKF8rXAk6FGTCebP5whWhJV23RzlmkfX8dF+bqy24x8OIu5VqEZSngLXdpvyUDoWIQFXuXl5OEO/BMBlI74CygCobgJnPj3LTAgm+Sg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EevsQtadJFLGQ2rKXSTGd40YqxbS4MBJkfTChTAakgo=; b=lW55qTUDERwCzSdnJxyYVSypkgtelKR/9jJ6b4PZibjrEQ3DhCpJGIrfeJY2DsYASoJRRN7chfoHwdI5PCGs+XGiVQjrrOsrYtzDt5teFygGhL8dwad/VHLDAMd7eEJVyfprksaBQDwvIq/iyM83LDgJv4xm/Fkwvwl+DLCCHY8=
Received: from BN6PR11MB4068.namprd11.prod.outlook.com (2603:10b6:405:7c::31) by BN6PR11MB0034.namprd11.prod.outlook.com (2603:10b6:405:6b::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.24; Wed, 13 May 2020 21:00:47 +0000
Received: from BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::6d40:9e8a:252a:4f34]) by BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::6d40:9e8a:252a:4f34%3]) with mapi id 15.20.3000.016; Wed, 13 May 2020 21:00:47 +0000
From: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
To: "Eric Vyncke (evyncke)" <evyncke@cisco.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-sfc-oam-framework@ietf.org" <draft-ietf-sfc-oam-framework@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Tal Mizrahi <tal.mizrahi.phd@gmail.com>, "cjbc@it.uc3m.es" <cjbc@it.uc3m.es>, "int-dir@ietf.org" <int-dir@ietf.org>
Thread-Topic: Éric Vyncke's No Objection on draft-ietf-sfc-oam-framework-13: (with COMMENT)
Thread-Index: AQHWI6FJ9zTDA56WOkCEPXJ4twd//6imSNQA
Date: Wed, 13 May 2020 21:00:47 +0000
Message-ID: <F82415AC-3212-4133-B974-BFF190217F71@cisco.com>
References: <158876786144.22272.6483455621584357748@ietfa.amsl.com>
In-Reply-To: <158876786144.22272.6483455621584357748@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.35.20030802
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [173.38.117.76]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7951c617-3d1d-4a45-cc78-08d7f780b5aa
x-ms-traffictypediagnostic: BN6PR11MB0034:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <BN6PR11MB003413BFBD9DFC958BCCBAC7C6BF0@BN6PR11MB0034.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0402872DA1
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN6PR11MB4068.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(136003)(39860400002)(396003)(346002)(366004)(376002)(33430700001)(2906002)(71200400001)(4326008)(316002)(66574014)(36756003)(33440700001)(110136005)(5660300002)(54906003)(966005)(66446008)(224303003)(6506007)(91956017)(33656002)(76116006)(6486002)(186003)(86362001)(64756008)(66556008)(478600001)(66476007)(8936002)(2616005)(6512007)(26005)(66946007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <AEA42A101D1CFB4BB3D03FCD720430D6@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 7951c617-3d1d-4a45-cc78-08d7f780b5aa
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 May 2020 21:00:47.0799 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: uYcAocxeOn1soHrR1tx99JjP4xa4cVImIwBlcdsfj6HjzYwnXKXXjZCwGUffGp/EUMXYbh7saVKb+Y6Z6i+fTA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB0034
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.12, xch-aln-002.cisco.com
X-Outbound-Node: alln-core-6.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-dir/wje2K0pY3SObZY6odQEv_hy6D1M>
Subject: Re: [Int-dir] Éric Vyncke's No Objection on draft-ietf-sfc-oam-framework-13: (with COMMENT)
X-BeenThere: int-dir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This list is for discussion between the members of the Internet Area directorate." <int-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-dir>, <mailto:int-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-dir/>
List-Post: <mailto:int-dir@ietf.org>
List-Help: <mailto:int-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-dir>, <mailto:int-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 May 2020 21:01:17 -0000
Hi Eric, Thank you for the great comments. Please see inline.. On 5/6/20, 8:24 AM, "Éric Vyncke via Datatracker" <noreply@ietf.org> wrote: Éric Vyncke has entered the following ballot position for draft-ietf-sfc-oam-framework-13: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html for more information about IESG DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/ ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- Thank you for the work put into this document. The document is easy to read; BTW, I found that its content is more about the justifications / requirements for an OAM system and tools descriptions than about for a framework description. <Nagendra> As you might have noticed, this document does not attempt to list a set of requirements. Instead, it proposes a structured layer and positions different SFC OAM components and explain the OAM functionalities of such components and thereby making it easier for the solution documents to address the same. Accordingly, we believe this fit as a framework document (. The core of the document appears to be section 6: this should probably be reflected in the abstract and introduction <Nagendra> Section 6 is about the candidate SFC OAM tools. But the other sections are equally important to better understand the overall context, different components followed by the toolset availability and the gaps. The Introduction section explains this for ease of reading. Please address the comments raised in the Internet directorate review by Carlos Bernardos: https://mailarchive.ietf.org/arch/msg/int-dir/TgQulH7hytGPNxdAPWcSgkTx1IM <Nagendra> Thank you for forwarding the comments from Carlos. We addressed the same and included the modification in the document. Please find below a couple on non-blocking COMMENTs. I would really appreciate a reply to all these COMMENTs. I hope that this helps to improve the document, Regards, -éric == COMMENTS == I would not refer to BCP 14 (RFC 8174) as this is an architectural/framework document (informational) and not a protocol specification. <Nagendra> We got similar comments from other reviewers as well. We removed this section and updated by avoiding the use of normative statements. It seems that most of the described tools are about synthetic traffic. Is there any other means to do OAM in SFC (not that I have any suggestion...)?. <Nagendra> We briefly explained the applicability of In-Situ OAM in section 6.4.3. The overlay header (such as NSH) can carry iOAM data fields. The solution documents can detail the specifics of what data to collect or how to use it. -- Section 1 -- About "to be applied to packets and/or frames", for me packets are layer-3 PDUs and frames are layer-2 PDUs. While I am not familiar with SFC, I could envision SFC being applied to transport or application layers PDUs. So, why restricting the use of this document to layers 2 and 3 only ? <Nagendra> Good point. I think we can modify the same as below: OLD: applied to packets and/or frames selected as a result NEW: applied to any traffic selected as a result.. -- Section 2 -- Is there a reason why all 'virtual links' are not mentioned in this section? I.e., SR-IOv network, tun/tap, ... <Nagendra> I think it is very much possible. Does the below text looks better? OLD: o The link layer, which is tightly coupled with the physical technology used. Ethernet is a popular choice for this layer, but other alternatives are deployed (e.g. POS, DWDM). The same or distinct link layer technologies may be used in each leg shown in Figure 1. NEW: o The link layer, which is tightly coupled with the physical layer technology used. Ethernet is a popular choice for this layer, but other alternatives are deployed (e.g. POS, DWDM). In a virtual environment, virtualized I/O technologies such as SR-IOV or similar are applicable for this layer. The same or distinct link layer technologies may be used in each leg shown in Figure 1. Similar question about why limiting the example of VM and not including containers ? <Nagendra> We changed virtual machines as virtual entities so that it is not limited to VMs. Below is the modified text: OLD: In Figure 1, the service layer element such as classifier and SF are depicted as virtual machines that are interconnected using an overlay network. The underlay network may comprise of multiple intermediate nodes but not shown in the figure that provides underlay connectivity between the service layer elements. While Figure 1 depicts an example where SFs are enabled as virtual entities, the SFC architecture does not make any assumptions on how the SFC data plane elements are deployed. The SFC architecture is flexible and accommodates physical or virtual entity deployment. SFC OAM accounts for this flexibility and accordingly it is applicable whether SFC data plane elements are deployed directly on physical hardware, as one or more Virtual Machines, or any combination thereof. NEW: In Figure 1, the service layer element such as classifier and SF are depicted as virtual entities that are interconnected using an overlay network. The underlay network may comprise of multiple intermediate nodes but not shown in the figure that provides underlay connectivity between the service layer elements. While Figure 1 depicts an example where SFs are enabled as virtual entities, the SFC architecture does not make any assumptions on how the SFC data plane elements are deployed. The SFC architecture is flexible and accommodates physical or virtual entity deployment. SFC OAM accounts for this flexibility and accordingly it is applicable whether SFC data plane elements are deployed directly on physical hardware, as one or more Virtual entities, or any combination thereof. -- Section 3 -- The word "performance" is often used in the document but it is not described in depth though: is it about the SF CPU/memory or 'client traffic' latency & throughput ? Section 4 partially addresses my question but not completely; also, adding forward pointers to section 4 would be nice. <Nagendra> SFC being unidirectional, one-way delay measurement and packet loss was emphasized in section 4.4. We added the pointer as below: OLD: The second SFC OAM requirement for the SF component is to allow an SFC-aware network device to check the performance metrics such as loss and delay induced by a specific SF for processing legitimate traffic. The performance can be a passive measurement by using live traffic or can be active measurement by using synthetic probe packets. NEW: The second SFC OAM requirement for the SF component is to allow an SFC-aware network device to check the performance metrics such as loss and delay induced by a specific SF for processing legitimate traffic. The performance can be a passive measurement by using live traffic or can be active measurement by using synthetic probe packets. More details about this OAM function is explained in Section 4.4. -- Section 4.3 -- Please bear with my ignorance of SFC world... but, if a SF is doing proxying / rewriting the application message, how useful is an end-to-end PMTUd check? As there are two stitched TCP connections ? <Nagendra> Path MTU discovery is one of the connectivity functions and the above-mentioned scenario appears to be one possible case. Accordingly, I think this should be addressed in the respective solution document. The overall assumption of this section is that all SF are pure layer-3, leaving the IP header intact so that ECMP & TTL checks can be done. Is it always the case ? <Nagendra> Not necessarily. The TTL handling mentioned in this document is about the TTL in the NSH/Overlay header. The traffic encapsulated by the overlay header can be L2 or L3. Section 5.2 addresses the above points, but, I suggest that section 4.3 to be restricted to ' link-layer OAM' <Nagendra> The NSH TTL field can be controlled to terminate the probe on any service layer element. So I think it is not limited to link-layer. -- Section 6.4.1 -- "TTL field in NSH header to 63", not familiar with NSH, but, if there is a TTL field in NSH, then it could be useful to point to the RFC & section describing it. Esp in a section whose title is "ICMP" (referring obviously to the IP header). <Nagendra> Make sense. Please see below for the modified text: OLD: can set the TTL field in NSH header to 63... NEW: can set the TTL field in NSH header [RFC8300] to 63... -- Section 8 -- In this security section, I wonder whether the trace tool deserves a paragraph or two as if trusted while being forgeable/spoofed, then operators could trust a SFC which is "owned" and not reliable (i.e., with a bypass of some security SF). Trusting the security AD to raise a DISCUSS if they think it is a DISCUSS. <Nagendra> The section in ver-13 was updated based on the comments from SecDir review. Please feel free to share any text suggestions if you think the can be improved further. == NITS == -- section 6.3 -- Is it really required to re-specify the use of bit O in NSH ? <Nagendra> I think we can leave it as it doesn’t appear to vitiate the meaning of the sentence (. -- Section 6.4.1 -- Sigh... using the IPv4 terminology of TTL... <Nagendra> The TTL discussed in this section is the field in the NSH header. Once again, thanks a lot for the great comments. Thanks, Nagendra
- [Int-dir] Éric Vyncke's No Objection on draft-iet… Éric Vyncke via Datatracker
- Re: [Int-dir] Éric Vyncke's No Objection on draft… Nagendra Kumar Nainar (naikumar)