Re: [ippm] draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Mon, 01 April 2019 16:25 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 773AA12039D; Mon, 1 Apr 2019 09:25:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level:
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=B74ftatL; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=W7WJCJDN
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wfYXAzsUx7V5; Mon, 1 Apr 2019 09:25:27 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28BB31203A1; Mon, 1 Apr 2019 09:25:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5398; q=dns/txt; s=iport; t=1554135920; x=1555345520; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=U23fZU2IDJMmO0wwClfUMoQiP1VSh/Zkhohp7zLZKRY=; b=B74ftatLKD0Dxd6VFuvQFIcncoD0wuTK51DiS1DbpdxNYPUoZGKxK7Cv CIRhSHiwqs2uWmXiAY2d/AHl6/uTjs5n+/2eMh6ApExGStBV73xrFRtbO qKh/QBVL4IRSzoHbgwP3nPMFfW01U9PrDCZHknnALgLYqVOb+Z9l2v101 M=;
IronPort-PHdr: 9a23:Kj/WCBefWPUkxuuWTu2VgfBqlGMj4e+mNxMJ6pchl7NFe7ii+JKnJkHE+PFxlwGQD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFnpnwd4TgxRmBceEDUPhK/u/YSYgG89BUlJN9HCgOk8TE8H7NBXf
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AIAACoOqJc/4MNJK1ZChoBAQEBAQIBAQEBBwIBAQEBgVEFAQEBAQsBgT0kLANodAQLJwqHSwOEUophgld+hCeEEgGNV4EuFIEQA1QOAQEjCYRAAoVEIjQJDQEBAwEBCQEDAm0cDIVKAQEBAQIBOgYBASUSAQsEAgEIDgMEAQEWCQULIREdCAIEDgUIgxuBXQMNCAECDKFEAooUgiCCeQEBBYE1AoNDDQuCDAMFgS8BizIXgUA/gRFGgTdgNT6CGkcBAQOBGRIBBwsBIT2CfIImpRc2CQKHb4gvg1qCA4YMjB2RUIE8jAECBAIEBQIOAQEFgU04ZXFwFYMnggoMBRITgziFFIU/coEoTYwogR8BgR4BAQ
X-IronPort-AV: E=Sophos;i="5.60,297,1549929600"; d="scan'208";a="252163902"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 01 Apr 2019 16:25:18 +0000
Received: from XCH-ALN-020.cisco.com (xch-aln-020.cisco.com [173.36.7.30]) by alln-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id x31GPIea004113 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 1 Apr 2019 16:25:18 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-ALN-020.cisco.com (173.36.7.30) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 1 Apr 2019 11:25:18 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 1 Apr 2019 12:25:17 -0400
Received: from NAM03-DM3-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 1 Apr 2019 12:25:17 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=frBG9YMoBCpY9mhuOGUmH9lVJHEWIuKJYC9dD0xtaEA=; b=W7WJCJDNoIumgIg1d/ygTuFSHOMTB5sZBYzO+j6UVyjfpuAfZfHmsCOjV5CcmyC6AkkHlmbHVXJXWh1OC73qHkSrKdM2kjmoenr+gwzZ7GB4cBFezH4eIyjY3qt362mY2vQkjmgcyEqBm1BivC+q+gsHZTIv/3PGOtN8LveA9nk=
Received: from BN8PR11MB3618.namprd11.prod.outlook.com (20.178.219.85) by BN8PR11MB3700.namprd11.prod.outlook.com (20.178.220.96) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1750.17; Mon, 1 Apr 2019 16:25:15 +0000
Received: from BN8PR11MB3618.namprd11.prod.outlook.com ([fe80::9d38:1845:842d:a489]) by BN8PR11MB3618.namprd11.prod.outlook.com ([fe80::9d38:1845:842d:a489%3]) with mapi id 15.20.1750.017; Mon, 1 Apr 2019 16:25:15 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Mikael Abrahamsson <swmike@swm.pp.se>
CC: Mark Smith <markzzzsmith@gmail.com>, "C. M. Heard" <heard@pobox.com>, 6man WG <ipv6@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)
Thread-Index: AQHU4eVk77oZnWiBmUa6JfuK7viq2qYclmiQgATixqCABbu4AIAAT+7g
Date: Mon, 01 Apr 2019 16:25:15 +0000
Message-ID: <BN8PR11MB36181C47785968D8FCA2DED9DA550@BN8PR11MB3618.namprd11.prod.outlook.com>
References: <CACL_3VGxyn-PYosFsKPVdd8C=P5AbE6HD1zrimHKuh2MPkhnuQ@mail.gmail.com> <505272eac2dd44fa891d4d36d14da9af@XCH-RCD-008.cisco.com> <CAO42Z2wGMzc_RT=eWTx9Ve-5reS0nCWiteGOuE16=MB4Fg8mkg@mail.gmail.com> <f50040ab52d04867b9a5cefa1c3131c3@XCH-RCD-008.cisco.com> <CAO42Z2zgguekybwVuCh8Az3mK8gHp292BYnWYhJq-8KEyfKzOA@mail.gmail.com> <7ea9049fe6f44a40aefe4801bd796322@XCH-RCD-008.cisco.com> <CAO42Z2y5TS1+8YxNsr=BKz5v8-ZPTiO-M7CU2k6FzNqVZoU4VA@mail.gmail.com> <CY4PR11MB1335960AD9BF9A4B990F7E10DA4A0@CY4PR11MB1335.namprd11.prod.outlook.com> <CAO42Z2xqq=uksNQPxvF_CRSxf1V_MADbFurzW4hqQW0v478cyw@mail.gmail.com> <DM6PR11MB36254EAC97ACF07F5BAD43CADA5F0@DM6PR11MB3625.namprd11.prod.outlook.com> <DM6PR11MB362528DB0EADA21493CC49A3DA590@DM6PR11MB3625.namprd11.prod.outlook.com> <alpine.DEB.2.20.1904011139550.3490@uplift.swm.pp.se>
In-Reply-To: <alpine.DEB.2.20.1904011139550.3490@uplift.swm.pp.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=fbrockne@cisco.com;
x-originating-ip: [173.38.220.59]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 08576bf6-099d-42e2-ca0a-08d6b6be9f7f
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600139)(711020)(4605104)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060)(7193020); SRVR:BN8PR11MB3700;
x-ms-traffictypediagnostic: BN8PR11MB3700:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <BN8PR11MB3700AA2F48809050F2811237DA550@BN8PR11MB3700.namprd11.prod.outlook.com>
x-forefront-prvs: 0994F5E0C5
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(396003)(136003)(39860400002)(376002)(366004)(13464003)(189003)(199004)(76176011)(53546011)(6506007)(446003)(11346002)(26005)(102836004)(6116002)(5660300002)(486006)(105586002)(8936002)(6246003)(6436002)(186003)(6916009)(97736004)(5024004)(14444005)(68736007)(14454004)(966005)(81166006)(2906002)(81156014)(8676002)(7736002)(305945005)(53936002)(256004)(33656002)(52536014)(6306002)(66574012)(74316002)(229853002)(54906003)(9686003)(66066001)(55016002)(478600001)(476003)(86362001)(316002)(106356001)(99286004)(25786009)(71200400001)(71190400001)(7696005)(93886005)(4326008)(3846002); DIR:OUT; SFP:1101; SCL:1; SRVR:BN8PR11MB3700; H:BN8PR11MB3618.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: ehpX4LZ5fjjjVgFpr1mg1FqV6oxduG+raj2OvHzUEdKl4syudw0FyjS6dwLFn5nf55KspdWhKa5Bh48iufwTb+T5Y1ELteLUDbkIVwawil6PmMizJ7t/hVCy0zgmnydqeZXHKHGHROmvNGmS/YiRgwVz/PAnbSkExH0anad3d1pgnc8ve5prNFnN/MP6TiwL9tgVHYYoqxU+uD4+1FdLE6ZlBY0PLEk50iTjsJrkUxtbKHm73dVlzOTP3XVkJGQz96BtPeRUwYOB2mLPt9VpqtTcxvieQrl51VQppO6C4twtLXX813RIFY5jSSjzfvAh/4/7HNrydX+/AiuTWOp00h4p9hQQoWitbbyiawwZCvxEMJEUTYXy72pafdUr3d/LaZvA3PnbiVzbUNbeHILe2c6FeGub3EqXTUXCPNsdzwQ=
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 08576bf6-099d-42e2-ca0a-08d6b6be9f7f
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Apr 2019 16:25:15.3616 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3700
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.30, xch-aln-020.cisco.com
X-Outbound-Node: alln-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/BB7W_n3g7HL9o5eIvpx8ItlDW28>
Subject: Re: [ippm] draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Apr 2019 16:25:32 -0000

Hi Mikael,

Thanks - please find some notes inline ("... FB").

-----Original Message-----
From: Mikael Abrahamsson <swmike@swm.pp.se> 
Sent: Montag, 1. April 2019 13:16
To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
Cc: Mark Smith <markzzzsmith@gmail.com>; C. M. Heard <heard@pobox.com>; 6man WG <ipv6@ietf.org>; ippm@ietf.org
Subject: RE: draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)

On Thu, 28 Mar 2019, Frank Brockners (fbrockne) wrote:

>
> FYI - A new draft including Mark's comments below just got posted:
> https://tools.ietf.org/html/draft-ioametal-ippm-6man-ioam-ipv6-deploym
> ent-01

I watched the tech deep dive video recording in conjunction with this. 
This is a really hard problem to solve with all those factors to take into account. Some random thoughts:

There seems to be overlap of this problem space with SRv6, these seem to have almost identical properties. They insert something, the forwarding devices need to interact with it and it needs to be stripped before it leaves the domain.

Though, in the SRv6 space the forwarding information is in the header, whereas for the IOAM space the forwarding device should actually ignore whatever is in the IOAM header as the desire is for it to treat packets identically regardless if they have the header or not. Considering how routers forward packets based on 5-tuple (or even deeper), what's the thinking been on this so far?

...FB: There is obviously no easy answer. Couple of thoughts:
* IOAM is considered a "domain specific" feature (see draft-ietf-ippm-ioam-data-05, section 3). Routers in the IOAM domain should be IOAM capable.  And IMHO,  we should add a statement to draft-ioametal-ippm-6man-ioam-ipv6-deployment that an implementation of IOAM MUST ensure "C1".
* That said, there can be situations, where C1 cannot be achieved, e.g. consider a network which does ECMP scheduling based on packet length. 
* What one could consider - and which is one suggested deployment model - is that by default IOAM data fields are added to _all_ customer packets. The decapsulating node would decide whether the IOAM information contained in a packet would be used (and exported) or not. That way one would not need to deal with the situation that some traffic carries IOAM while other does not - and might thus be treated differently. 

The MTU issue should be the least problematic, recommendations on using a considerable higher MTU on the internal links compared to the external links is identical to what has been used for encapsulation networks for a long time. We use 9180 IP MTU on the internal links and external links are
9000 MTU. This leaves room for several layers of encap without affecting the customer visible MTU.

I like the fact that the IOAM information is attached to the real packet being forwarded as opposed to just using test traffic.

I think the C1-C6 requirements make a lot of sense, but following them is hard. I have myself run networks that ran IPv4 and IPv6 Internet packets native (no encap) internally, and only encapsulated VPN overlay packets. 
It'd of course be nice to support IOAM also for those deployment scenarios, but then it becomes harder to assure no leakage (C5) and identifying the leaker. Otoh when doing MPLS if you leak labeled packets they are probably dropped at the other end (do we have research on this?). 
So leaking IOAM enabled packets might be less of a disaster compared to other encaps?

...FB: The comparison to MPLS is interesting. How often do MPLS packets leak and cause harm? For IOAM, draft-ioametal-ippm-6man-ioam-ipv6-options-02 proposes a deployment model similar to what we do for MPLS: Unless an interface is explicitly configured for IOAM, packets with IOAM data fields MUST be dropped. Hence leakage would only occur, if we have a clearly misbehaving router which violates this rule. Similar to you, I'd also greatly appreciate any pointers to research on how common MPLS leaked packets are.

Doing IOAM only based on some other forwarding scheme (MPLS, SRv6 etc) and embedding meaning into whatever forwarding information is used for that might help (IOAM information lives within that forwarding plane), but also makes IOAM less deployable for other networks that just run native.

...FB: Yes - this is a trade-off. In some deployments, it might not be feasible to deploy IOAM in the underlay (e.g. v6) - but you still want to use it to measure the overlay (e.g. with NSH) - hence we're defining encapsulations for several "tunnel" protocols. 

Reading https://tools.ietf.org/html/draft-ietf-ippm-ioam-data-05 and considering the C5 requirement, how do I as an end receiver of a packet with an IOAM header in it identify even what operator to contact about these leaked packets? It looks like the namespace/identifier is operator-internal, but how do I identify what operator it is?

...FB: One idea that Shwetha came up with to identify the source AS of a leaked packet, would be to add a new new IOAM E2E option - as proposed in section 5.1.1 bullet 2 of draft-ioametal-ippm-6man-ioam-ipv6-deployment-01.

Cheers, Frank

-- 
Mikael Abrahamsson    email: swmike@swm.pp.se