Re: [ippm] Benjamin Kaduk's Discuss on draft-ietf-ippm-ioam-data-12: (with DISCUSS and COMMENT)

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Tue, 04 May 2021 18:16 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 468EC3A0976; Tue, 4 May 2021 11:16:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.617
X-Spam-Level:
X-Spam-Status: No, score=-9.617 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=F67SiTyq; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=J+oLe7O7
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qh9qDVXhReMG; Tue, 4 May 2021 11:16:49 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1C003A096C; Tue, 4 May 2021 11:16:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=68358; q=dns/txt; s=iport; t=1620152208; x=1621361808; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=DQoPfPb3s7563w/fx+4ajCf6cit3vcG2cM8DE5FStQ8=; b=F67SiTyqbPTp+m8Je7lC4d1sE7f9w76n8yIa7AayS/zFqe95LDtvKW5o X5UZVrJkI0ulrDlbk999I5nhqpVcPYJHKb99ymEbJ4TQgk4n3VAFuG5Gi VcfVay3cWH1tpK2doSA+UIZI+cy+d8i6Jibe4sNN31hLjUPUjUD41nSY3 w=;
IronPort-PHdr: A9a23:BZOdlBMuf2oILUAv1ccl6nfrWUAX047cNxMJ6pchl7NFe7ii+JKnJkHE+PFxlzfhWITHrf9Ilrmev6PhXDkG5pCM+DAHfYdXXhAIwcMRg0Q7AcGDBEG6SZyibyEzEMlYElMw+Xa9PBtQGdq4alHP8TW+6DcIEUD5Mgx4bu3+Bo/ViZGx0Oa/s53eaglFnnyze7R3eR63tg7W8MIRhNgKFw==
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IronPort-AV: E=Sophos;i="5.82,272,1613433600"; d="scan'208";a="893658945"
Received: from alln-core-11.cisco.com ([173.36.13.133]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 04 May 2021 18:16:45 +0000
Received: from mail.cisco.com (xbe-rcd-002.cisco.com [173.37.102.17]) by alln-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 144IGjXc025808 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 4 May 2021 18:16:45 GMT
Received: from xfe-rcd-005.cisco.com (173.37.227.253) by xbe-rcd-002.cisco.com (173.37.102.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Tue, 4 May 2021 13:16:45 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xfe-rcd-005.cisco.com (173.37.227.253) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Tue, 4 May 2021 13:16:45 -0500
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Tue, 4 May 2021 14:16:44 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=R8VsXsB0EnPKqoOcRUuK4N3ZE8vt0sLuW8D6u8kfHiDsvo7sMmsbEaf4+HNi62IUGCWs1s1pChM6Owqn+u2EEqwsA4C3VCz4tgNB0Ep05lKSJnOu8cfLMIWLMtTYW7bmZFDmWchA/o0wq0CuTTIb6l2ZKdiD87LbopGqNP+0mBOrhZM9vgz4K57rhqm2WkG24RZe7RHLbujE45BT6enA5VbEM2kt4iD+o7krHRJ5A/UFnVbXuufoSsFmQE3NafL1mzb4XrZhswLUo/K5XgeL5JBV97mljhwBV7v3JtQ2cZvBvaK5ccEo1SFtCjFEJnC0aKa6KVLlXXcg9KzMkzoe+w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DQoPfPb3s7563w/fx+4ajCf6cit3vcG2cM8DE5FStQ8=; b=SZF/+AuDiRSHr3SNSk4lY7+9WMI+34mWDkPaXX4MOcobFF2W3Ce8j3cw5rig7qx7Qk83BA6d+dbmmAJWS1xBXZKX36KAQO0WGK5ODH7WBOm702InZhQnG/dNB/3J8ejVciAqZOuK4CKe89YocZl1jL1E/H28fiOxP6k5MuHOK8ddpwZwSyLjNdtuZXDWBWHxo375aVpaUYvk0w2KBEYCPTHPaFWGEmmBDJ81u+xSN15XgYjvglHdSrVJIu5P+FEB9922dYZkKG0KzqplNlcw6WDXHw7t2yYAMVThfRveIACVHj8XXraHo0YxcHnsMLqgg1MA4ymbejut/xoBRd443Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DQoPfPb3s7563w/fx+4ajCf6cit3vcG2cM8DE5FStQ8=; b=J+oLe7O7N6uxsP1XtDX8NilIW7LsUD0EuRnZQ4nzvzDAzEqXqQGPaRKNo2/LBhWUy2LtpaxcdNhAsovAIhcME3LhMUl0xlOmOA5/Pr+OSagHTO2Ii4asDe8exPWLcHSaPNGvJzV6545ifwEB9EeO0WzzYkZcy+MTTQUXfugZQds=
Received: from BYAPR11MB2584.namprd11.prod.outlook.com (2603:10b6:a02:c8::31) by BY5PR11MB4417.namprd11.prod.outlook.com (2603:10b6:a03:1c0::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4087.41; Tue, 4 May 2021 18:16:41 +0000
Received: from BYAPR11MB2584.namprd11.prod.outlook.com ([fe80::f0b2:5cc4:e741:93ca]) by BYAPR11MB2584.namprd11.prod.outlook.com ([fe80::f0b2:5cc4:e741:93ca%7]) with mapi id 15.20.4087.044; Tue, 4 May 2021 18:16:41 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Benjamin Kaduk <kaduk@mit.edu>, The IESG <iesg@ietf.org>
CC: "draft-ietf-ippm-ioam-data@ietf.org" <draft-ietf-ippm-ioam-data@ietf.org>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>, Al Morton <acm@research.att.com>, "tal.mizrahi.phd@gmail.com" <tal.mizrahi.phd@gmail.com>
Thread-Topic: Benjamin Kaduk's Discuss on draft-ietf-ippm-ioam-data-12: (with DISCUSS and COMMENT)
Thread-Index: AQHXIGhGhTi3dEcSUEKRprQPmMBCjqrHVRUw
Date: Tue, 04 May 2021 18:16:39 +0000
Message-ID: <BYAPR11MB2584CB996CDE38B9122F93B1DA5A9@BYAPR11MB2584.namprd11.prod.outlook.com>
References: <161656101267.7087.8167870905178123095@ietfa.amsl.com>
In-Reply-To: <161656101267.7087.8167870905178123095@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: mit.edu; dkim=none (message not signed) header.d=none;mit.edu; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [173.38.220.56]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a20b14ab-4652-4e02-7cf3-08d90f28c404
x-ms-traffictypediagnostic: BY5PR11MB4417:
x-microsoft-antispam-prvs: <BY5PR11MB441756B1AD9C5E4FD0995FDEDA5A9@BY5PR11MB4417.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2584.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(346002)(376002)(39860400002)(136003)(366004)(5660300002)(83380400001)(4326008)(8676002)(54906003)(30864003)(8936002)(122000001)(86362001)(66574015)(26005)(186003)(53546011)(316002)(38100700002)(2906002)(110136005)(55016002)(33656002)(966005)(64756008)(66556008)(66446008)(71200400001)(478600001)(9686003)(76116006)(7696005)(66946007)(6506007)(66476007)(52536014)(559001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2584.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a20b14ab-4652-4e02-7cf3-08d90f28c404
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 May 2021 18:16:40.7295 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 2G/JQ/XlAusep/sYrIoIjJE/UpkjvLez9xwRENF9InlKc0lzZ4PS1Kb+AB5sU0I9ZzdEzI8QmP/ZkdBB+2BMmw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR11MB4417
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.17, xbe-rcd-002.cisco.com
X-Outbound-Node: alln-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/3Lfbi5JEva_AmrKi9EP99Iw23s8>
Subject: Re: [ippm] Benjamin Kaduk's Discuss on draft-ietf-ippm-ioam-data-12: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 May 2021 18:16:54 -0000

Hi Ben,

Thanks a lot for the very detailed review - and sorry for the delay in responding. 
Please find comments and questions inline ("..FB"). 

> -----Original Message-----
> From: Benjamin Kaduk via Datatracker <noreply@ietf.org>
> Sent: Mittwoch, 24. März 2021 05:44
> To: The IESG <iesg@ietf.org>
> Cc: draft-ietf-ippm-ioam-data@ietf.org; ippm-chairs@ietf.org; ippm@ietf.org;
> Al Morton <acm@research.att.com>; acm@research.att.com
> Subject: Benjamin Kaduk's Discuss on draft-ietf-ippm-ioam-data-12: (with
> DISCUSS and COMMENT)
> 
> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-ippm-ioam-data-12: Discuss
> 
> When responding, please keep the subject line intact and reply to all email
> addresses included in the To and CC lines. (Feel free to cut this introductory
> paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-data/
> 
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> I think we need some greater clarity on the relationship between IOAM "layers"
> and IOAM-Namespaces.  For example, in Section 4 there is a principle of
> "Layering" that seems to indicate that different layers operate entirely
> independently, such as might occur when traffic from one operator that uses
> IOAM is conveyed in a tunnel over a different operator's network and both
> operators use IOAM independently.  But in Section 5.3 we seem to see some
> discussion that IOAM-Namespaces can be used to enforce a separation of layers
> ("IOAM-Namespaces provide additional context [...] e.g. if an operator wishes
> to use different node identifiers for different IOAM layers"), and that namespace
> identifiers allow for determination of which IOAM-Option-Types need to be
> processed "in case of a layered IOAM deployment".

...FB: Roman's DISCUSS touched on a similar topic: Given that draft-ietf-ippm-ioam-data is focused on the definition of data-fields, we created a "sister" document, which is to discuss all deployment related aspects of IOAM: draft-brockners-opsawg-ioam-deployment (we're working on an updated version as we speak). Namespaces are discussed in section 7.1,  layering is discussed in section 7.2, and domains are discussed in section 3. Tal is currently evolving the security section (reflecting Shawn Emery review comments). In the past IPPM WG meeting we concluded that we'd go for a WG-adoption call once the updated is available.

Are you ok to keep "data fields definition" and "deployment aspects" separated in the two different documents? Otherwise, we would need to create redundancies between the documents, making it harder to keep the different documents in synch.

> 
> I think there is also some internal inconsistency relating to the role of IOAM
> transit nodes.  This may be localised in Section 5.2 where we see both that a
> transit node is one that "read and/or write or process [the] IOAM data" and that
> a transit node "updates one or more of the IOAM-Data-Fields" (i.e., always
> writes), but I did not attempt an exhaustive check for other instances.

...FB: Thanks for catching this inconsistency. The role of at transit node varies, depending on what type of IOAM Option-Type is contained in the packet, e.g.
* For the Tracing Option-Types (preallocated or incremental), a node will read the IOAM section (to understand what Option-Types in which namespaces are present). If the node is configured to operate as a transit node for the namespace-id present in the packet and a Tracing Option-Type, it'll also write new information into the packet (assuming there is space left) and it will update fields like RemainingLen.
* For "Direct Export" (draft-ietf-ippm-ioam-direct-export), a node will read the associated Option-Type and perform the associated data-gathering, but will not write anything to the packet for this particular Option-Type.
* For "Proof of Transit", a node will read the associated Option-Type and will update the fields of this data-type, as described in draft-ietf-sfc-proof-of-transit

So the "read and/or write and/or process IOAM data" is the right description, which captures the various roles a transit node can take. In the next rev of the document, we'll make sure that this is description is consistently used throughout the document.
 

> 
> I don't think the definition of the POSIX epoch is correct -- it seems to be copied
> (roughly) from the definition of the PTP epoch (i.e., using midnight TAI as the
> reference) but all the references I consulted indicate that the POSIX epoch
> started at midnight UTC.

...FB: Great catch. Reference to TAI is indeed inappropriate. Looking at the entire section, would you be ok if we reference https://pubs.opengroup.org/onlinepubs/9699919799/xrat/V4_xbd_chap04.html#tag_21_04_16 instead of trying to reexplain things?
I.e. we'd simply add a " For details further details on the POSIX time, including handling of leap seconds, see [reference above]" and we'd remove the sections on Epoch/Resolution/Wraparound/Synch, because those are rather restatements of what is defined in a much greater level of detail elsewhere. 

If you agree with the approach, we could go with the same approach for the other time formats - making the spec shorter and crisper.
We'd greatly appreciate your guidance.

> 
> As foreshadowed in
> https://mailarchive.ietf.org/arch/msg/last-call/Ak2NAIKQ7p4Rij9jfv123xeTXQY/
> I think we need to have a discussion about the expectations and provisions for
> cryptographic (e.g., integrity) protection of IOAM data.
> >From my perspective, IOAM is a new (class of) protocols that is seeking
> publication on the IETF stream as Proposed Standard.  While we do make
> exceptions for modifications to protocols that were developed before we
> realized how important integrated security mechanisms are, it's generally the
> case that new protocols are held to the current IETF expectations for what
> security properties are provided; the default expectation is that a protocol is
> expected to provide secure operation in the internet threat model of RFC 3552.
> This draft currently only provides a brief note in the security considerations that
> there exists an individual draft (draft-brockners-ippm-ioam-data-integrity) that
> might provide ways to protect the integrity of IOAM data fields.
> Shouldn't the security mechanisms be getting developed side-by-side by the
> protocol mechanisms, to ensure that they are properly integrated and fit for
> purpose?  (This does not necessarily have to be in the same document and could
> be part of a cluster of related documents, but I don't think that an informative
> reference to a non-WG draft really
> qualifies.)

...FB: IMHO there is general agreement in the WG by now that we need to have security mechanisms clearly defined, though I don't think they have to be in the very same document. The main scope of draft-ietf-ippm-ioam-data is to define the data fields for IOAM, rather than define procedures on how the fields are used, or even a new protocol. A good example is the proof-of-transit work (draft-ietf-sfc-proof-of-transit), which can leverage IOAM data fields for one particular implementation. That said, integrity protection is a special case. The procedures for integrity protection are obviously tightly linked to the data fields that they are supposed to protect, but the mechanisms might not be exclusive to IOAM. So personally, I'd agree that we should develop the integrity protection mechanisms in close association with the data fields itself but ensure the solution is as versatile as possible. The ”Performance and Diagnostic Metrics (PDM) team” (Michael, Nalini) already reached out – with the plan to investigate whether we can’t create a single solution which would cover PDM and IOAM – something that everyone would for sure appreciate. 

Since the discussion you've mentioned above, we've made quite a bit of progress.  We've not only created draft-brockners-ippm-ioam-data-integrity - but also agreed on a way forward in the WG to move from a discussion of options to solve the problem to an implementation discussion. I.e., the guidance from the last WG meeting was to focus on "Method 3" and spell this method out further. This would also allow us to move from an informative document to a standards track document. Here is the current WIP  - still needs more touches, e.g. reflecting the discussion that IPPM WG had at the last IETF meeting to reflect the needs to different deployments, i.e. deployments which require very strong protection and are ready to compromise performance for that and vice versa:
https://github.com/inband-oam/ietf/blob/master/drafts/versions/02/draft-brockners-ippm-ioam-data-integrity-02.txt

Given that draft-brockners-ippm-ioam-data-integrity was created as a result of the WG review and discussions - expectation is that it'll also be WG adopted (IPPM chairs, any view from your perspective)?
Now the big question: Assuming that draft-brockners-ippm-ioam-data-integrity would become a standards track document, does draft-ietf-ippm-ioam-data need to wait for the work on ippm-ioam-data-integrity to finish, by e.g. forcing a normative reference? We should acknowledge that while integrity protection might be considered important for some future deployment, current uses of early implementations of IOAM or similar are in “limited and isolated domains” and they do well without an integrity protection solution. 

> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> Thanks to Shawn Emery for the secdir review.
> 
> I have grave misgivings about the proposed behavior that provides for a
> separate domain boundary at the granularity of IOAM-Namespace.  It does not
> quite rise to a Discuss because it is technically possible to implement successfully
> if done perfectly, but it seems incredibly risky and very hard to get right, and
> there does not seem to be sufficient motivation presented for the benefits of
> this behavior to justify the risk.  Specifically, by partitioning all IOAM behaviors
> by IOAM-Namespace, we require a node to know whether or not it is to behave
> as ingress/egress for a domain on a per-namespace basis.  In effect, it allows for
> a proliferation of as many distinct and partially overlapping IOAM Domains as
> there are namespace values, and whether a node is ingress (or egress) for any
> given domain has to be looked up on the basis of the specific IOAM-Namespace
> value.  I find this concerning because the security properties of the system rely
> on properly policing the domain boundary, so that IOAM markings from outside
> the domain are rejected at ingress, and IOAM data is not leaked out of the
> domain by policing at egress.  While we have ample evidence to suggest that it is
> feasible to maintain a single tightly controlled domain that properly polices
> ingress and egress (e.g., MPLS), I don't know of evidence to suggest that it is
> feasible to do so with a spate of partially overlapping domains where domains
> and domain membership are malleable based the interaction of configuration
> and in-band protocol elements.
> It seems incredibly likely that some domain boundary somewhere will be
> inadvertently permeable, and compromise the security properties of the system.

...FB: Your, as well the comments from other reviewers, show that the document needs to be even crisper on the role of namespaces. We'll need to address this for sure in the next rev. The role of namespaces is to provide additional context to IOAM data fields. The draft is quite explicit about namespaces: “IOAM-Namespaces add further context to IOAM-Option-Types and associated IOAM-Data-Fields.", i.e. they are not intended as e.g. a tenant-identifier or organization-identifier.  What we should definitively clarify further is that this additional context that namespaces provide is within a limited domain, i.e., an IOAM domain. An IOAM domain is an umbrella for all the groupings that are associated with a particular namespace-id within an IOAM domain.  This is articulated by Section 5.2. "An IOAM decapsulating node situated at the edge of an IOAM domain MUST remove all IOAM-Option-Types and associated encapsulation headers for all IOAM-Namespaces from the packet.". If in the next rev of the doc, we'd explain the purpose of namespaces a bit more using details and also clarifying that an IOAM limited domain is really an umbrella on top of the grouping that namespace-ids provide, would that help?

> 
> Section 1
> 
> (side note) There's perhaps something of a philosophical question of whether a
> mechanism really qualifies as "in situ" if it involves encapsulating the packet in a
> full-fledged tunnel (as at least the IPv6 encapsulation does, as is needed to add
> the additional EHs that hold IOAM data fields).  That said, I don't really have any
> alternative suggestions, and I am sure that IOAM is a well-established
> terminology, so this is just a side node.

...FB: Philosophical indeed :-) -- naming is always hard. Things started out with "in-band OAM" - which was considered inappropriate and there were a lot of discussions some 5 years ago - and it was Erik Nordmark who came up with the term "in-situ OAM" which everyone was ok with so far. 

> 
> Section 4
> 
>    Scope: This document defines the data fields and associated data
>    types for in-situ OAM.  The in-situ OAM data field can be
>    encapsulated in a variety of protocols, including NSH, Segment
>    Routing, Geneve, IPv6, or IPv4.  Specification details for these
> 
> I found drafts (split between targeting ippm and "the relevant working
> groups") that would cover Geneve and IPv6, but not anything for IPv4.
> Are we fully confident that the aim is actually achievable for IPv4?

...FB: "Fully confident" are big words. We should probably change the sentence to include an "e.g." and only state protocols where there are progressing draft: "The in-situ OAM data field can be encapsulated in a variety of protocols, including e.g., NSH, GRE, IPv6, etc.". 

There's been efforts to also do something for v4, but those didn't go further than -00 so far:
https://tools.ietf.org/html/draft-gafni-ippm-ioam-ipv4-options-00

> 
>    Deployment domain (or scope) of in-situ OAM deployment: IOAM is a
>    network domain focused feature, with "network domain" being a set of
>    network devices or entities within a single administration.  For
>    example, a network domain can include an enterprise campus using
>    physical connections between devices or an overlay network using
>    virtual connections / tunnels for connectivity between said devices.
> 
> If these virtual connections/tunnels do not provide cryptographic confidentiality
> and integrity protection, then the security considerations for IOAM need to
> include the full physical deployment scope including the underaly over which the
> overlay is constructed, not just the "administrative domain" as defined here.
> 
> Furthermore, there seems to be a very questionable interaction between
> labeling the IOAM deployment domain an administrative domain yet allowing
> for multiple partially overlapping IOAM domains as distinguished by namespace
> ID.  Does the administrative domain have to encompass the union of all the
> different IOAM domains (as identified by namespace ID)?

...FB: IOAM domains are limited domains per RFC8799. As mentioned in the discussion on Roman's DISCUSS, we'll add an explicit reference to RFC8799. 
The assumption - and we should indeed make this clear in the text as you hint at - is that an all virtual connections/tunnels/overlay and underlays are associated to the one limited domain. 
And as mentioned above, your assumption of the admin domain (i.e., limited domain) being the union/umbrella of all the groupings associated to Namespace-IDs is the logical model the document follows.

> 
> Section 5.2
> 
>    An "IOAM transit node" updates one or more of the IOAM-Data-Fields.
> 
> (per the discuss)
> The previous discussion suggested that even a node that only reads IOAM-
> DataFields is still considered a "transit node", and that updating the field
> contents is not necessary in order to justify that moniker.
> That said, the notion that a transit node is writing (e.g., to update trace option-
> types) seems to be prevailing throughout later portions of the document, so
> perhaps it is the text a few paragraphs earlier that is in error.

...FB: See the explanation above. It depends on the IOAM Option-Type what a transit node will do with the IOAM data-fields.

> 
>    If both the Pre-allocated and the Incremental Trace Option-Types are
>    present in the packet, each IOAM transit node based on configuration
>    and available implementation of IOAM populates IOAM trace data in
>    either Pre-allocated or Incremental Trace Option-Type but not both.
> 
> (per the discuss)
> Likewise, is this "populates" mandatory?

...FB: In case of Trace Options-Types, "populates" indeed makes sense, because the transit node will write information to the packet.

> 
>    A transit node MUST ignore IOAM-Option-Types that it does not
>    understand.  A transit node MUST NOT add new IOAM-Option-Types to a
>    packet, MUST NOT remove IOAM-Option-Types from a packet, and MUST NOT
>    change the IOAM-Data-Fields of an IOAM Edge-to-Edge Option-Type.
> 
> Almost all of this (not the Edge-to-Edge stuff) seems fairly tautological, in that if
> a node did that stuff it would be an encapsulating and/or decapsulating node,
> possibly in addition to being a transit node.

...FB: Agree that this states the obvious, but IMHO it also does not hurt either. Are you suggesting that we're rather remove the obvious pieces?

> 
>    The role of an IOAM-encapsulating, IOAM-transit or IOAM-decapsulating
>    node is always performed within a specific IOAM-Namespace.  This
>    means that an IOAM node which is e.g. an IOAM-decapsulating node for
>    IOAM-Namespace "A" but not for IOAM-Namespace "B" will only remove
>    the IOAM-Option-Types for IOAM-Namespace "A" from the packet.  Note
>    that this applies even for IOAM-Option-Types that the node does not
>    understand, for example an IOAM-Option-Type other than the four
>    described above, that is added in a future revision.  An IOAM
>    decapsulating node situated at the edge of an IOAM domain MUST remove
>    all IOAM-Option-Types and associated encapsulation headers for all
>    IOAM-Namespaces from the packet.
> 
> I can only make sense of this paragraph as a whole if the last sentence instead
> says "MUST remove from the packet [...] for all IOAM-Namespaces for which
> the node is a decapsulating node.  The current text says to remove literally all
> IOAM information for literally all IOAM-Namespaces, which seems to contradict
> the separation of namespaces depicted earlier in the paragraph.

...FB: Per the discussion above, the IOAM limited domain is a union/umbrella of all the groupings associated to Namespace-IDs. As such, if a node happens to be located at the edge, it would indeed remove all IOAM Option-Types from the packet.

> 
> Section 5.4
> 
>    A particular implementation of IOAM MAY choose to support only one of
>    the two trace option types.  In the event that both options are
>    utilized at the same time, the Incremental Trace-Option MUST be
>    placed before the Pre-allocated Trace-Option.  Deployments which mix
>    devices with either the Incremental Trace-Option or the Pre-allocated
>    Trace-Option could result in both Option-Types being present in a
>    packet.  Given that the operator knows which equipment is deployed in
>    a particular IOAM, the operator will decide by means of configuration
>    which type(s) of trace options will be used for a particular domain.
> 
> Up in Section 5.2 we said that "each IOAM transit node based on configuration
> and available implementation" populates exactly one trace option type.  I think I
> can read the two statements as being consistent with each other, but it might be
> useful to harmonize the specific language used to make it very clear that these
> refer to the same behavior.

...FB: Good point - and we'll harmonized things in the next rev. These are some of the (unfortunate) artefacts of the document having many authors. 

> 
> Section 5.4.1
> 
> Just to check my understanding: when I first read the discussion of this being an
> "array" and there being a potential "Opaque State Snapshot"
> component, I assumed that the length of this opaque snapshot would need to be
> fixed per array element (i.e., as part of the namespace definition).  Having read a
> bit more, it seems that my initial assumption is incorrect, since there is a length
> field in the opaque state snapshot framing, and so a node parsing the array of
> elements will be able to skip over the approprate (variable) length for each
> element in the array.  Please confirm that my updated understanding is correct.

...FB: That is true. "Opaque State Snapshot" can have variable length which is defined in the "Length" field of Opaque State Snapshot (see 5.4.2.13.)

> 
>    Namespace-ID:  16-bit identifier of an IOAM-Namespace.  The
>       Namespace-ID value of 0x0000 is defined as the "Default-Namespace-
>       ID" (see Section 5.3) and MUST be known to all the nodes
>       implementing IOAM.  For any other Namespace-ID value that does not
>       match any Namespace-ID the node is configured to operate on, the
>       node MUST NOT change the contents of the IOAM-Data-Fields.
> 
> Though it may seem banal to do so, explicitly listing "change, add, or remove"
> might help avoid future questions of how to interpret this text.
> E.g., there is some similar text in RFC 2460 about "examined or processed" that
> proved to be highly controversial and was changed in RFC 8200.

...FB: Good point. Will do. Avoiding a future discussion similar to what 6man went through is for sure a big plus!

> 
>       A node receiving an IOAM Pre-allocated or Incremental Trace-Option
>       relies on the NodeLen value, or it can ignore the NodeLen value
>       and calculate the node length from the IOAM-Trace-Type bits (see
>       below).
> 
> Allowing an implementation to pick one or the other option like this introduces
> fragility to the system as a whole and requires strict controls that encapsulating
> nodes always set the value even if their implementation does not use it.  I would
> prefer if we had a single well-specified required behavior for all nodes, that
> could be easily tested for conformance.

...FB: Good point. We can simply shorten the sentence to "A node receiving an IOAM Pre-allocated or Incremental Trace-Option relies on the NodeLen value."
Calculating the length from the IOAM-Trace-Type bits was just mentioned as an alternate, though more complicated way. 

> 
>       Bit 0  "Overflow" (O-bit) (most significant bit).  If there are
>          not enough octets left to record node data, the network element
>          MUST NOT add any fields and MUST set the overflow "O-bit" to
>          "1" in the IOAM-Trace-Option header.  This is useful for
>          transit nodes to ignore further processing of the option.
> 
> This makes things awkward for a lot of the earlier statements that require transit
> nodes to populate trace data.  How is the document internally consistent in this
> regard, if transit nodes are both required to populate trace data and required to
> not add trace data?

...FB: The intended behavior of a transit node for any of the Trace Option-Types is: "Write information into the packet as long as there is space available". If there isn't sufficient space available, a transit node won't be able to write information to the packet. To avoid the transit node trying to write information to the packet only to find out that there isn't enough space, the overflow bit is to help the transit node determine whether there is indeed space available for the write operation. 
Any suggestion how we can explain this in a better/clearer way?


> 
>       NodeLen - sizeof(opaque snapshot) in 4 octet units.  If
>       RemainingLen in a pre-allocated trace option exceeds the length of
>       the option, as specified in the preceding header, then the node
>       MUST NOT add any fields.
> 
> What is the "preceding header"?  This seems like perhaps it originated in a
> description of a concrete protocol encoding of this data item and does not quite
> apply to the abstract description thereof.

...FB: Good catch - and you're probably even right on the origin. With e.g. v6 one would have an "Opt Data Len" field that could be evaluated - but this clearly does not belong here but into the associated protocol specific encapsulation spec (like e.g.,  draft-ietf-ippm-ioam-ipv6-options). We'll remove that sentence.

> 
>       Bit 12-21  Undefined.  An IOAM encapsulating node MUST set the
>                value of each of these bits to 0.  If an IOAM transit
>                node receives a packet with one or more of these bits set
>                to 1, it MUST either:
> 
>                1.  Add corresponding node data filled with the reserved
>                    value 0xFFFFFFFF, after the node data fields for the
>                    IOAM-Trace-Type bits defined above, such that the
> 
> Just to confirm: this means that there cannot be any future allocations of bits to
> "wide format" items and thus that only bits 8-10 will ever consume 2 units each
> of four-octets?  (This does not preclude allocating two adjacent bits to indicate
> a single logical data item, of course, with appropriate error handling for when
> only one of the two is set.)

...FB: Another good catch - and excluding future allocations in "wide" format wasn't the intention from what I know. To simplify things, we can avoid the "either" behavior and simply state:

      Bit 12-21  Undefined, see section 8.2. for future registrations.
            
               An IOAM encapsulating node MUST set the
               value of each reserved bit to 0.  If an IOAM transit
               node receives a packet with one or more of the reserved bits set
               to 1, it MUST not add any node data fields to the packet, even for
               the IOAM-Trace-Type bits defined above.

> 
>       Bit 23   Reserved: MUST be set to zero upon transmission and
>                ignored upon receipt.
> 
> I note that this description for the "reserved" bit has a different specified
> behavior than the unallocated bits 12-21 (that require a node to fill the data with
> ones if the bit is set).  Do we have a sense for any ways in which this reserved
> bit's semantics could be used for future extensibility, vs being locked into these
> (basically useless) semantics forever?

... FB: The idea was to set aside a bit which won't be consumed for any additional IOAM-Trace-Type, but rather allow some future RFC to extend the Trace-Type bit field, in case there should ever be the need for it. Should we just state this here?

> 
> Section 5.4.2
> 
>    Some IOAM-Data-Fields defined below, such as interface identifiers or
>    IOAM-Namespace specific data, are defined in both "short format" as
>    well as "wide format".  Their use is not exclusive.  A deployment
>    could choose to leverage both.  [...]
> 
> While the text goes on to clarify that, based on per-domain configuration, they
> can hold qualitatively different types of information, I still must ask if there is
> any entity that is or might be tasked with enforcing that there is consistency
> between the two fields (mostly for when they are different representations of
> the same information, but not necessarily exclusively so).

...FB: The main logic that the draft follows is to specify the syntax, but avoid specifying the semantics of the data-fields. That way the nodes can supply the information in their native format - and the interpretation would be happening in network management systems / analytics systems, which would transform and process the information in any cases. The combination of a particular data-field and the namespace-id should provide for the context to interpret the provided data appropriately. As a consequence, consistency checks would happen at the network management station.

> 
> Section 5.4.2.1
> 
>    Hop_Lim:  1-octet unsigned integer.  It is set to the Hop Limit value
>       in the packet at the node that records this data.  Hop Limit
> 
> "In the packet" at ingress to, or egress from, the node?

...FB: Should be egress. We'll add this clarification.

> 
>    node_id:  3-octet unsigned integer.  Node identifier field to
>       uniquely identify a node within the IOAM-Namespace and associated
>       IOAM-Domain.  The procedure to allocate, manage and map the
>       node_ids is beyond the scope of this document.
> 
> Even if we attempt to leave allocation/management of node_ids out of scope
> for this document, I think we still need to talk about what goes wrong and how
> to recover in case of collision.

...FB: While the discussion of potential collisions etc. is important, draft-ietf-ippm-ioam-data is probably the wrong place for the discussion, because it is a deployment consideration.
Would you be ok if we add this to the list of topics that we'd add to draft-brockners-opsawg-ioam-deployment?

> 
> Section 5.4.2.2
> 
> I kind of expected some note that the interpretation of the interface identifier
> fields here is (or might be?) going to be specified by the node they apply to and
> can only be interpreted in that context.  Or are these expected to be allocated
> by a central entity?

...FB: Similar to the note above: The focus is on specifying the syntax and leaving the semantics and even the allocation to a specific deployment. Which means, that IDs could be allocated centrally, or locally on the node. Personally I'd expect that latter to be the more likely, but it would be out of scope for the document.

> 
> Section 5.4.2.12
> 
>    The "buffer occupancy" field is a 4-octet unsigned integer field.
>    This field indicates the current status of the occupancy of the
>    common buffer pool used by a set of queues.  The units of this field
>    are implementation specific.  Hence, the units are interpreted within
>    the context of an IOAM-Namespace and/or node-id if used.  The authors
>    acknowledge that in some operational cases there is a need for the
>    units to be consistent across a packet path through the network,
>    hence it is RECOMMENDED for implementations to use standard units
>    such as Bytes.
> 
> I guess I'm not sure that I understand exactly what this field should be indicating,
> even if my implementation does adhere to the recommendation to "use
> standard units such as Bytes" (which, by the way, could probably stand to be a
> stronger recommendation for a single distinguished unit chosen by the authors).
> That is, if I suppose that the node in question has some common pool of buffers
> that's shared across queues.  Maybe all the buffers are the same size, maybe
> not.  But in order to measure "occupancy", is it more important to know how
> many bytes are occupied, how many buffers are in use, or what proportion of
> the total buffers are in use?  Just knowing the number of bytes or buffers in use
> does not convey much information if the total capacity is unknown, and having
> 40 MB of buffers in use would mean something very different for a CPE router vs
> "big iron".  Can we give a bit more clarity into at least what portions of the
> semantics need to be set at a per-namespace level, even if we can't nail them
> down more tightly as part of the protocol spec?

...FB: Given that different devices are implementing scheduling/buffering in very different ways, it is hard to come up with anything that would meet all expectations.
Hence we're back to the "focus on syntax and leave the semantics and units definition to a particular deployment". 
Similar to what I mentioned above, we can add a discussion as you suggest to draft-brockners-opsawg-ioam-deployment.

> 
> Section 5.4.13
> 
>    Schema ID:  3-octet unsigned integer identifying the schema of Opaque
>       data.
> 
> Just to check my understanding: the interpretation of this schema ID is per
> IOAM-Namespace, which is mostly going to be something maintained by the
> individual operators.  So in some sense each operator will have to maintain and
> publish (internally) a registry of these Schema IDs and avoid collisions.  Is this the
> sort of thing that is already a common practice, or is there a risk of operational
> fragility being introduced?

...FB: Expectation is exactly what you describe above - i.e., it would be the operator that maintains an internal registry.
Personally I don't have any experience with Opaque state snapshot deployments. Maybe others can chime in here.

> 
> Furthermore, some of the Namespace IDs are not operator-managed, e.g.,
> 0x0000.  Is the opaque state snapshot functionality just not going to be used for
> those well-known namespaces?  If so, we should say so explicitly.

...FB: I don't think that there is an intention to exclude any fields from the "Default-Namespace-ID". The Default-Namespace-ID just indicates that no specific  namespace is associated with the IOAM data fields in the packet.


> 
> Section 5.5
> 
>    o  Random: Unique identifier for the packet (e.g., 64-bits allow for
>       the unique identification of 2^64 packets).
> 
> We should probably say that this is generated using a cryptographic-strength
> PRNG (i.e., not rand()).  BCP 106 covers randomness requirements for security.
> 
> Also, due to the birthday paradox, an actual 64-bit random identifier will
> produce collisions well before 2^64 packets.  Since these identifiers
> (AFAICT) need to be assigned in an uncoordinated fashion, the random
> allocation scheme may well be the best scheme (or "least bad"), but if that's the
> case I don't think we should make bold statements like "allow for the unique
> identification of 2^64 packets".

...FB: Good point - and it was also pointed out by other reviewers. And it indeed needs to be a random number (see draft-ietf-sfc-proof-of-transit-08, section 3.2.2) - as it represents the constant part of the polynomial used. We'll reword the section accordingly.

> 
>    IOAM POT flags:  8-bit.  Following flags are defined:
> 
> It's slightly surprising to me that the flags are defined as having global semantics
> across all POT values, as opposed to being interpreted in the context of the POT
> type they are used with, but that's not inherently problematic.
> 
> Section 5.5.1
> 
> Should we just say that the Namespace-ID, POT Type, and flags are as defined in
> Section 5 rather than repeating the definitions wholesale (or, as we currently do,
> having to modify the definition text slightly)?
> In particular (but not exclusively), it's pretty distracting to have Section 5 refer to
> "Bit 0" and "Bit 1-7" but Section 5.5.1 refer to the "P bit" and "R (7 bits)"

...FB: Good catch. We'll clean this up. Another left-over of "many cooks (authors) in the kitchen".

> 
>    P bit:  1-bit.  "Profile-to-use" (P-bit) (most significant bit).
>       Indicates which POT-profile is used to generate the Cumulative.
>       Any node participating in POT will have a maximum of 2 profiles
>       configured that drive the computation of cumulative.  The two
>       profiles are numbered 0, 1.  This bit conveys whether profile 0 or
>       profile 1 is used to compute the Cumulative.
> 
> Is it worth saying a few more words about how the P bit is used as a "generation
> count" for performing incremental/in-place updates of what profile to use, and
> that profile 0 can be repurposed for something new once all uses of its previous
> interpretation have been removed from the network?  ("No" is a fine answer,
> but it might be worth proactively allaying the concern that you can only have
> two profiles, ever.)

...FB: We can add a reference to draft-ietf-sfc-proof-of-transit, which details how the profiles are being used.

> 
> Section 5.6
> 
> I suggest giving some guidance as to whether the initial sequence number should
> (not) start at zero, for the fields indicated by bits 0 and 1.
> I note that draft-gont-numeric-ids-sec-considerations has some discussion
> supporting starting at non-zero values.  It seems that the "increment by one for
> each packet" behavior is needed, though, in order to be able to use this value to
> detect loss.

...FB: Good point - and something which IMHO would be a good fit for draft-brockners-opsawg-ioam-deployment

> 
>       Bit 0    (Most significant bit) When set indicates presence of a
>                64-bit sequence number added to a specific "packet group"
>                which is used to detect packet loss, packet reordering,
>                or packet duplication within the group.  The "packet
>                group" is deployment dependent and defined at the IOAM
>                encapsulating node e.g. by n-tuple based classification
>                of packets.
> 
>       Bit 1    When set indicates presence of a 32-bit sequence number
>                added to a specific "packet group" which is used to
>                detect packet loss, packet reordering, or packet
>                duplication within that group.  The "packet group" is
>                deployment dependent and defined at the IOAM
>                encapsulating node e.g. by n-tuple based classification
>                of packets.
> 
> When both of these bits are set, are the contained values agglomerated into a
> hybrid 96-bit sequence number?  If so, in which order?

...FB: My understanding so far was either Bit 0 or Bit 1. We can clarify that in the next rev.

> 
>       Bit 2    When set indicates presence of timestamp seconds,
>                [...]
>                packet is encapsulated into the tunnel.  Each
>                implementation has to document when the E2E timestamp
>                that is going to be put in the packet is retrieved.  This
> 
> It seems a little awkward that an operator is going to have to base their
> processing logic on knowledge of what *implementation* the encapsulating
> node is, especially on a heterogeneous network.  But I suppose it would be an
> RFC 6919 "MUST (BUT WE KNOW YOU WON'T)" if we said that implementations
> had to allow configuring the different possibilities, based on the IOAM-
> Namespace...

...FB: True :-) - this is why we have namespace-ids. The namespace-id will (hopefully) help the backend systems apply the right processing logic to the data.

> 
> Section 6.3 (POSIX-based Timestamp Format)
> 
>       The POSIX-based timestamp format is affected by leap seconds; it
>       represents the number of seconds since the epoch minus the number
>       of leap seconds that have occurred since the epoch.  The value of
>       a timestamp during or slightly after a leap second could be
>       temporarily inaccurate.
> 
> (If I'm wrong about the Discuss point, this description seems inconsistent with
> the POSIX epoch being midnight TAI.)

...FB: You're correct. Already covered in the DISCUSS section above.

> 
> Section 8
> 
> I note that the "RFC Required" policy lets ISE and IRTF stream documents
> allocate values, in theory without any IETF review at all.  It seems unlikely that
> this is what is intended in all of the cases where "RFC Required" is specified, such
> asa the 4-bit IOAM Trace-Flags registry that has only three unallocated
> codepoints.

...FB: Discussion on Francesca's DISCUSS concluded that we'd switch to "IETF review" - which is the process that all extensions in flight are following already.

> 
> Section 8.4
> 
>    0: 16 Octet POT data
> 
> I'd suggest a slightly more descriptive name, as there may well be other POT
> formats that want to use 16 octets for their data.

...FB: Sure. We can add additional description and add the reference to draft-ietf-sfc-proof-of-transit.

> 
> Section 8.7
> 
> I suggest removing the sentence "Upon a new allocation request, the
> responsible AD will appoint a designated expert, who will review the allocation
> request." as it is not really accurate (the IESG appoints
> DEs) and is not helpful for the potential registrant.  It's arguably also needlessly
> restrictive, preventing the IESG from appointing an expert before there is a
> request to review.

...FB: Ack. Will follow your suggestion.

> 
> Section 10
> 
> "Direct Export" sounds like a self-induced DoS attack by traffic amplification, but
> that's probably more a matter to be discussed in that document, not this one.
> (Though, do we need to mention direct export here at all?)

...FB: As you know, this is a topic of ongoing discussion in the IPPM WG. We can remove the reference to direct export from the security consideration of this document. draft-ietf-ippm-ioam-direct-export is the more appropriate location for the discussion.

> 
> We should probably say that the opaque snapshot, namespace specific data,
> etc., will have security considerations corresponding to their defined data
> contents that should be described where those formats are defined.

...FB: Ack. We'll add this note.

> 
>    From a confidentiality perspective, although IOAM options do not
>    contain user data, they can be used for network reconnaissance,
> 
> Given that we provide multiple fields that essentially carry opaque or operator-
> defined data, the blanket "do not contain" may be too strong of a statement.
> (What if someone decides to put a subscriber identifier in the namespace-
> specific data?)  So maybe "are not expected to" is more appropriate".

...FB: Ack. We'll follow your suggestion.

> 
>    allowing attackers to collect information about network paths,
>    performance, queue states, buffer occupancy and other information.
> 
> One possible application of such reconiassance is to gauge the effectiveness of
> an ongoing attack (e.g., if buffers and queues are overflowing).  I don't know
> whether it's particularly useful to mention that scenario here or not, though.
> 
>    IOAM can be used as a means for implementing Denial of Service (DoS)
>    attacks, or for amplifying them.  For example, a malicious attacker
>    can add an IOAM header to packets in order to consume the resources
>    of network devices that take part in IOAM or entities that receive,
>    collect or analyze the IOAM data.  [...]
> 
> Messing up the POT data seems worth calling out here as well (though the
> particular behavior when proof of transit fails is not defined in this document, of
> course).

...FB: Ack.  We can add a brief note on this here.

> 
>    Notably, in most cases IOAM is expected to be deployed in specific
>    network domains, thus confining the potential attack vectors to
> 
> Where does the "most cases" come from?  I thought the definitions restricted
> IOAM to the IOAM domain.

...FB: Excellent catch! We'll correct this one.

> 
>                   Indeed, in order to limit the scope of threats
>    mentioned above to within the current network domain the network
>    operator is expected to enforce policies that prevent IOAM traffic
>    from leaking outside of the IOAM domain, and prevent IOAM data from
>    outside the domain to be processed and used within the domain.
> 
> It would be great if we could provide a bit more detail on the scope of
> consequences if the operator fails to do so.

...FB: We can add more detail. That said - and other reviewers brought this up as well - the question is whether the discussion of potential risks and consequences really belongs into this document, or should rather be in the deployment-focused draft-brockners-opsawg-ioam-deployment.

> 
> Section 12.1
> 
> The 2008 POSIX reference has since been superseded by the 2017 version.

...FB: Ack.
> 
> 
> 
> 
> 
> NITS
> 
> Abstract
> 
> nits: NSH is not listed as "well known" at the RFC Editor's abbreviation list, so
> should probably be written out in full.  Also, please put commas before and after
> "e.g." (which will presumably help with the spurious double-space as well).
> 
> Section 1
> 
>    cannot be considered passive.  In terms of the classification given
>    in [RFC7799] IOAM could be portrayed as Hybrid Type 1.  IOAM
> 
> RFC 7799 writes it with a majuscule 'I', not the numeral '1'.
> 
> Section 3
> 
> Please use the updated RFC 8174 version of the BCP 14 boilerplate.
> 
> Section 4
> 
>    Scope: This document defines the data fields and associated data
>    types for in-situ OAM.  The in-situ OAM data field can be
>    encapsulated in a variety of protocols, including NSH, Segment
>    Routing, Geneve, IPv6, or IPv4.  [...]
> 
> s/field/fields/, and s/or/and/
> 
> Section 5.3
> 
>    A subset or all of the IOAM-Option-Types and their corresponding
>    IOAM-Data-Fields can be associated to an IOAM-Namespace.  IOAM-
> 
> The way this is written seems to imply that any given IOAM-Option-Type is
> associated with at most one IOAM-Namespace, which I think is not the intent.
> 
>    Namespaces add further context to IOAM-Option-Types and associated
>    IOAM-Data-Fields.  Any IOAM-Namespace MUST interpret the IOAM-Option-
>    Types and associated IOAM-Data-Fields per the definition in this
>    document.  IOAM-Namespaces group nodes to support different
> 
> Presumably this ("MUST interpret") only applies to the option-type and data
> fields defined in this document?

...FB: Ack. We'll add this clarification.

> 
>    deployment approaches of IOAM (see a few example use-cases below) as
> 
> IIUC the meaning here is "IOAM-Namespaces provide a way to group nodes"
> and would be easier to read if formulated in that manner.
> 
> The RFC Editor will probably have a hard time in this section with which things
> that end in 's' are possessives (and thus benefit from an
> apostrophe) and which are not, though it may not be an efficient use of time to
> try to tidy up before the document gets to them.
> 
>    o  whether IOAM-Option-Type(s) has to be removed from the packet,
>       e.g. at a domain edge or domain boundary.
> 
> there's a singular/plural mismatch here (irrespective of the "(s)" -- "whether an
> [option-type] has to be removed" vs "whether [option-types] have to be
> removed"
> 
> Section 5.4.2.3
> 
>    The "timestamp seconds" field is a 4-octet unsigned integer field.
>    Absolute timestamp in seconds that specifies the time at which the
> 
> s/Absolute timestamp/It contains the absolute timestamp/
> 
> Section 5.4.2.4
> 
>    The "timestamp subseconds" field is a 4-octet unsigned integer field.
>    Absolute timestamp in subseconds that specifies the time at which the
> 
> s/Absolute timestamp/It contains the absolute timestamp/
> 
> Section 5.4.2.9
> 
> Please use the exact same wording in the description of the Hop_Lim field that
> was used in Section 5.4.2.1 (or just incorporate that definition by reference).
> (The node_id descriptions properly differ only in the 3-octet vs 7-octet phrase.)
> 
> Section 5.4.3
> 
>    An entry in the "node data list" array can have different formats,
>    following the needs of the deployment.  [...]
> 
> This phrasing seems needlessly confusing.  Within a single "node data list" (i.e., a
> single packet), all the list entries have the same format.  What we want to be
> describing is that the per-entry format can vary across packets and across
> deployments.  So perhaps just "the format used for the entries in a packet's
> "node data list" array can vary from packet to packet and deployment to
> deployment".
> (Also, there's a singular/plural mismatch between "an entry" and "different
> formats".)
> 
> Section 5.5, 5.6
> 
> When we talk about how the different Data-Fields "MUST be 4-octet aligned",
> having the figure show a variable-height entry might be helpful; the current
> formulation looks like it's exactly a 32-bit field.
> 
> Section 5.5
> 
>    IOAM Proof of Transit Option-Type is to support path or service
>    function chain [RFC7665] verification use cases.  Proof-of-transit
> 
> s/is to/is used to/
> 
> Sections 6.1, 6.2, 6.3
> 
>       Seconds: specifies the integer portion of the number of seconds
>       since the epoch.
> 
> I suggest writing out "the PTP epoch", "the NTP epoch", and "the Unix epoch" in
> the respective sections, to avoid giving the impression (via the definite article)
> that there is a single distinguished epoch, when there is not.  (Similarly for the
> Fractions.)
> 
> 

Thanks again for the really thorough review, all your comments and the nits you caught. Greatly appreciated!

Cheers, Frank