[Ippm-ioam-ix-dt] IOAM Meeting Minutes - February 3rd, 2021
Tal Mizrahi <tal.mizrahi.phd@gmail.com> Wed, 03 February 2021 07:53 UTC
Return-Path: <tal.mizrahi.phd@gmail.com>
X-Original-To: ippm-ioam-ix-dt@ietfa.amsl.com
Delivered-To: ippm-ioam-ix-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14D3D3A155C for <ippm-ioam-ix-dt@ietfa.amsl.com>; Tue, 2 Feb 2021 23:53:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vOUAY0T9MyeB for <ippm-ioam-ix-dt@ietfa.amsl.com>; Tue, 2 Feb 2021 23:53:11 -0800 (PST)
Received: from mail-wr1-x42e.google.com (mail-wr1-x42e.google.com [IPv6:2a00:1450:4864:20::42e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 424223A155D for <ippm-ioam-ix-dt@ietf.org>; Tue, 2 Feb 2021 23:53:11 -0800 (PST)
Received: by mail-wr1-x42e.google.com with SMTP id q7so23014683wre.13 for <ippm-ioam-ix-dt@ietf.org>; Tue, 02 Feb 2021 23:53:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=N0pN9lXoZqpmuMeCiss9hYi5TMPUGMzSUIPoKSRPc3Y=; b=WLXQB/k9W398Jotcocd11+uuvA17dKbyw52IS6AMNWqN5BWmrdiQwWWDR0prlhYePo BvR49pVd4pVntBGJ0Q9D6jS0bqO5m7NfGrBf7ERd32YjnimFwnjfRnsnhol/ctiRh0yG Nmx9GRsmzi48P8Y03tSyBx5RQYIdSC0gfJjVYtDBf4rjUs7ykAEs/PhVKq+OdSCjGBWj +cffJ/tI0jJii0hHy+4YOFy9B86YMJiJ3hOXPn1C2uMs47WprgNa8rwoLVhiW0b1tmb/ 4I09ktKkD8z24gERc03kDcV16ziUuyRhrRoAB9szIhNDROb9sAl8xbCYB530nmLuO2Er urDA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=N0pN9lXoZqpmuMeCiss9hYi5TMPUGMzSUIPoKSRPc3Y=; b=ANcWgYump4UajqNfWAJj4C6ieSJr+O1ETtwaLZltjv9NJ9x2VPZH0LtEM71aaAXsK7 PU3bljTtPCD3WytelYZ+iHzaN0JlpfqFjuaT0X8AY0TzoZ+xf1cIzUTITNbGHSs0Asgg r91DJJMPlBj25Egc98eSF0UQ1ktIpa+4UEttS5viJc/ogEMrPRr2qoTqdMiF5StZaP+z ffPxIUvfkBZHe+sBcqv9Xem1ztspxG46bki9M9dl/+x5RTm9Q+t9btbdA/6VgJLh1Cc7 nFOopfGDrK9ZUqP0jlmtDi24Lc5FHnxXoiMQv0aiJqWoAXu9WFOuiT1hd/vrUY7extMJ UNxQ==
X-Gm-Message-State: AOAM531W8MhegiHFLth9TwO4yKi4VcB5xphiRLNgk/CkUGI7pa2a2M6H XVSX4WEELGedouaRKFWyAqs5GTNwV7c0XX/ZixbFT0IEmnQTBw==
X-Google-Smtp-Source: ABdhPJzXSaoDTJ5yZyMHQm6hTA41BkE6Cm/kXMhBT88+CAe9yeCTA63xvjrrhKyS1+FXozaOjlzBBGtulRZwRfrsr8c=
X-Received: by 2002:a5d:69ce:: with SMTP id s14mr1916893wrw.206.1612338789083; Tue, 02 Feb 2021 23:53:09 -0800 (PST)
MIME-Version: 1.0
From: Tal Mizrahi <tal.mizrahi.phd@gmail.com>
Date: Wed, 03 Feb 2021 09:52:56 +0200
Message-ID: <CABUE3XkK1kBu9V4mqBr6Q_W3V+70e-TpFvQB+6kiy7iZwTtkiQ@mail.gmail.com>
To: ippm-ioam-ix-dt@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm-ioam-ix-dt/81Vb4cVJKc7AO_IWYfHxywB_Ouk>
Subject: [Ippm-ioam-ix-dt] IOAM Meeting Minutes - February 3rd, 2021
X-BeenThere: ippm-ioam-ix-dt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPPM iOAM Immediate Export \(IX\) design team" <ippm-ioam-ix-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm-ioam-ix-dt>, <mailto:ippm-ioam-ix-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm-ioam-ix-dt/>
List-Post: <mailto:ippm-ioam-ix-dt@ietf.org>
List-Help: <mailto:ippm-ioam-ix-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm-ioam-ix-dt>, <mailto:ippm-ioam-ix-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Feb 2021 07:53:13 -0000
IPPM IOAM Design Team Virtual meeting February 3rd, 2021, 07:00 UTC Webex meeting Attendees: Frank Brockners, Greg Mirsky, Tal Mizrahi. Minutes by Tal Mizrahi. Summary: ======== - Integrity protection draft: first draft was submitted, and some more discussion will happen on the mailing list. - Tal and Frank will submit pull requests with updates to the data draft. - Further thought will be given to the hybrid two step draft and its connection to DEX. - The next meeting will be on February 17th at 07:00 UTC. IOAM Integrity Protection Draft =============================== - Tal: there is a new integrity protection draft. We hope at this point we can proceed with publishing the IOAM data draft. - Greg: I read the new draft, and it looks good. Is it limited to trace options? I believe it should refer to other options and to direct exporting. It would be good if there was a single security solution for the hybrid two-step approach and for direct exporting. For trace options there is overhead for implementing security. The challenge for the trace option is operating at line rate. Direct exporting and hybrid two step can help. - Frank: there is a specific text in the draft that says that the scope is not limited to trace options. We can apply the same approach to end-to-end options or to DEX. We can use another example of a fixed header such as DEX. The methods described apply to all options. We can add another section to the draft: options that do not change along the path, which make it simpler. - Greg: the introduction section does not have a reference to the DEX draft. There is only discussion about tracing. I agree that the methods described in the draft can be applied to other variants such as DEX. - Frank: sure, I can add some text that refers to DEX. Are you saying that it may be simpler if there are fixed length headers? - Greg: it may be easier to apply at line rate. - Frank: I can see your point. We can add some text about potentially using a fixed header. - Greg: in DEX over IPv6 the integrity can be in IPv6 extension headers. - Tal: do you mean IPsec Authentication Header (AH)? - Greg: yes. - Frank: that would require an IPsec tunnel between endpoints. Does IPsec AH protect other extension headers? - Greg: I believe it does. - Frank: that sounds like a low hanging fruit for some scenarios. It is worth a closer look. - Greg: it would be worthwhile to ask the IPPM chairs to get people from the security area involved in this. - Frank: right, we have sent the draft to the security people that triggered writing this draft, but we have not received feedback yet. Draft submissions before IETF 110 ================================= - Tal: there is a submission deadline for IETF 110 on February 22nd. We want to update the drafts by then. There are a couple of updates I promised to do. I will create a pull request. - Frank: right, will also submit a pull request with my changes as well. - Tal: I will also update the flag and DEX drafts. There is still the major open issue in the DEX draft. I will revisit the issue on the mailing list. Hybrid Two Step (HTS) IOAM ========================== - Greg: the hybrid two-step approach uses follow up messages for sending the telemetry information. The advantage is that you do not need to increase the length of data packets - the data plane is unchanged. Another advantage is that follow up messages can be sent in lower priority. Low latency reliable applications - the resources are expensive. Disconnect generating information from collecting. - Tal: does follow up have to share the same path as the data it monitors? - Greg: yes. - Tal: in some cases different QoS will be forwarded through a different path. - Greg: but it does not have to be the case. You want to make sure that follow up goes though the same path. - Frank: does integrity protection happen on each hop? - Greg: yes, but the performance requirement is less strict since it does not operate in line rate. - Frank: sounds interesting. I will read it. - Greg: it would be helpful to get some more discussion on the mailing list.