Re: [ippm] [sfc] [Int-area] encapsulation of IOAM data in various protocols - follow up from WG discussion in London

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Sun, 22 April 2018 09:21 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 214E51243F3; Sun, 22 Apr 2018 02:21:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PQoVqzFG03QR; Sun, 22 Apr 2018 02:21:29 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD833120721; Sun, 22 Apr 2018 02:21:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=33656; q=dns/txt; s=iport; t=1524388889; x=1525598489; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=U07Epi1VahIReqLNBWstBEwQctXP5ygIg36Tk4UGn0c=; b=fcuZbpMomB6NMvqzE0/sKFk2RdoHK7FOTe4M5j9XOFT7+oY5qknKdqYG BKdphBTp5ipSr4Ohr2Dx2UfhwtTFQHJIBFSSCh8gKJ63sdJ7UTBTntyBZ 5dCPVkZpPylgL29+lYhF6FsO4FqsdwJwWDTcNRQoiAwnGx3E/4xNO/VFg g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AKAQCzU9xa/5tdJa1SChkBAQEBAQEBAQEBAQEHAQEBAQGDQ2F6KINqiAKMdoF0dRqGbIwUFIFhAwsYC4RIAhqCKyE0GAECAQEBAQEBAmwcDIUiAQEBAQIBAQEYCQQNMwcLBQcEAgEGAhEDAQEBAQICHwQDAgICHwYLFAEICAIEDgUfhFgDDQgPiySbQIFpM4cFDYErgikFgQmHA4FUP4EPI4IzBy6CT0IBAYEtAQcEBAMBBxgXgmkwgiQCjAaEWIZpLAgCh3Y0glw7gn2BNINdgltng3uHOYI9hhACERMBgSQBHDhhcXAVOyoBghiCHRoRiEiFPm+OBw8XgiABAQ
X-IronPort-AV: E=Sophos;i="5.49,311,1520899200"; d="scan'208";a="102555616"
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 Apr 2018 09:21:26 +0000
Received: from XCH-RTP-008.cisco.com (xch-rtp-008.cisco.com [64.101.220.148]) by rcdn-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id w3M9LQ1B005045 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 22 Apr 2018 09:21:26 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-008.cisco.com (64.101.220.148) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Sun, 22 Apr 2018 05:21:25 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1320.000; Sun, 22 Apr 2018 05:21:25 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Tom Herbert <tom@herbertland.com>
CC: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>, NVO3 <nvo3@ietf.org>, Service Function Chaining IETF list <sfc@ietf.org>, IETF IPPM WG <ippm@ietf.org>, Mickey Spiegel <mspiegel@barefootnetworks.com>, "Shwetha Bhandari (shwethab)" <shwethab@cisco.com>, Tianran Zhou <zhoutianran@huawei.com>
Thread-Topic: [sfc] [ippm] [Int-area] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
Thread-Index: AQHT1en5jaGR0tKoZUqNJvcZ9CCngaQE2SWAgABtMICABQVeAIABT8mAgADvQ2k=
Date: Sun, 22 Apr 2018 09:21:25 +0000
Message-ID: <DCD4F1A5-468A-429D-AEA1-2E360D4D54E3@cisco.com>
References: <ff0c9182d1f14ec48b352e41fedaf58e@XCH-RCD-008.cisco.com> <CA+RyBmUNHcQZtTGJj67V=DqPkwV6GXWDUQJGjwT7ODEFg_QQFA@mail.gmail.com> <CALx6S36ojk0z+iOhNhFqF2A+acXC1=xHPEN7G0Y_9+itC+WiGQ@mail.gmail.com> <CACYmcDqd2gwUTmjj-BssB1Bh7EAVi6v_Uu6Qq9XXd2RbdMnGGw@mail.gmail.com> <CALx6S37aig+JJ8WPgC6NDeNExJ_qS9LZweSL2TOgD1EPqZRwTQ@mail.gmail.com> <CACYmcDqVzr9y-LyUzJPs98mrmGZynUCUiPwepNBQpsKdyweyPQ@mail.gmail.com> <fb963e482d074551853ce83816f24c7f@XCH-RCD-008.cisco.com> <BBA82579FD347748BEADC4C445EA0F21A6D62FA3@NKGEML515-MBX.china.huawei.com> <8d1b3bb4a1794c4fac3455257e0ab60e@XCH-RCD-008.cisco.com> <BBA82579FD347748BEADC4C445EA0F21A6D62FD6@NKGEML515-MBX.china.huawei.com> <C7371A46-50F6-4A08-9719-5B2AB51091B3@cisco.com> <BBA82579FD347748BEADC4C445EA0F21A6D63236@NKGEML515-MBX.china.huawei.com> <CALx6S377-PdtAno2Jho3E_JfOeHzAc+xzjWckZycdJYsWSqSQA@mail.gmail.com> <BBA82579FD347748BEADC4C445EA0F21A6D638D3@NKGEML515-MBX.china.huawei.com> <d0d024faead143259d83fea6446e7237@XCH-RCD-008.cisco.com> <CALx6S35_7h7R04OPypFQVvmGdJdxfLstN--mVCZbh0jSEae6DA@mail.gmail.com> <DD4CBF95-C04B-45EC-BC84-1D85F113230F@cisco.com>, <CALx6S35tScr2bqU4dt7HPDt_p8zgYyAZi5SmW-uruWpV0SCvNA@mail.gmail.com>
In-Reply-To: <CALx6S35tScr2bqU4dt7HPDt_p8zgYyAZi5SmW-uruWpV0SCvNA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/IwXOF-A4z7_HqG8eAKLjPXItggI>
Subject: Re: [ippm] [sfc] [Int-area] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Apr 2018 09:21:32 -0000

Hi Tom,

I agree that using IOAM in IPv6 both e2e and hbh is a powerful and useful combo!

My point, sorry if I was not clear, is that an “SFC Hop” does not correspond to a transport encapsulation hop, and that IOAM can be in-situ’ed to the encapsulation that realizes the (service, overlay, otherwise higher) topology (which can be IPv6 natively or something else as well)

Thanks,

Thumb typed by Carlos Pignataro.
Excuze typofraphicak errows

> On Apr 21, 2018, at 11:05, Tom Herbert <tom@herbertland.com> wrote:
> 
> On Fri, Apr 20, 2018 at 12:03 PM, Carlos Pignataro (cpignata)
> <cpignata@cisco.com> wrote:
>> Tom,
>> 
>> On Apr 17, 2018, at 10:22 AM, Tom Herbert <tom@herbertland.com> wrote:
>> 
>> On Tue, Apr 17, 2018 at 12:51 AM, Frank Brockners (fbrockne)
>> <fbrockne@cisco.com> wrote:
>> 
>> 
>> Hi Tianran,
>> 
>> Tom's note already includes the hint: You'll add IOAM data to the
>> protocol/layer that you're interested in monitoring. Again using Geneve over
>> IPv6 as an example:
>> * If you're interested in the overlay, i.e. Geneve (e.g. timestamping the
>> packet when it enters and exists the tunnel) - you'd add IOAM data to Geneve
>> * If you're interested in the underlay, i.e. IPv6 (e.g. you'd like to
>> understand which path packets take in the v6 network) - you'd add IOAM data
>> to IPv6
>> * If you're interested in both, then you'd add IOAM data to Geneve and IPv6
>> 
>> Frank,
>> 
>> In that case why not just use a hop-by-hop option for measuring the
>> underlay and a destination option for measuring the overlay? The
>> advantage is that this works _any_ IP encapsulation method or any IP
>> protocol for that matter.
>> 
>> 
>> Because you want to instrument the layer that you want to measure.
>> Because there’s cases with more unnatural layering where there’s a desire to
>> correlate and compare measurements across layers (in a way in which, for
>> example, the Service layer is tested in a service chaining scenario, not the
>> IPv6 hop-by-hop.
>> Because different topologies expose different Hops and IPv6 HBH goes by the
>> IPv6 node topology.
>> Because not everything is IPv6, and because you have cases of IPv6 over
>> something as well.
>> Those are quick ones that come to mind.
>> 
> Carlos,
> 
> Please see my other email that details some use cases that shows
> destination options are functionally equivalent to ippm in
> encapsulation, and also my comments that the IPv6 has superior
> capabilities to cover in-situ ippm requirements (in particular that IP
> options are the _only_ protocol conformant means for intermediate
> nodes to change IP payloads needed for IOAM tracing).
> 
> I don't have a general issue with supporting ippm in encapsulation,
> but I do think this should be viewed as legacy support. Note there is
> no concept of segment routing in IPv4, they are blazing forward only
> on IPv6 so it is reasonable to take this view. Personally, I don't
> think this is a disadvantage to SR. IPv6 does have more capabilities
> than IPv4 and we're now seeing protocols that will take advantage of
> those. Features like this are good motivation for moving to IPv6,
> which in the long run is good for the Internet!
> 
> Tom
> 
>> Frank,
>> I don't believe adding ippm to every
>> encapsulation protocol is straightforward: e.g.
>> draft-brockners-ippm-ioam-geneve describe but notes the limited size
>> of header, draft-weis-ippm-ioam-gre states that a new EtherType would
>> be needed just for this purpose. This also entails additional
>> encapsulation-specific HW support also, whereas support destination
>> and hbh options could be more generic.
>> 
>> 
>> Engineering is about trade-offs. If you want to measure Geneve, there are
>> limitations. But instead of trying to prove why it does not work, I’ll point
>> to working demos of where it does — many of which on different HW/SW and
>> encaps, shown at various IETF events.
>> 
>> Thanks,
>> 
>> — Carlos Pignataro
>> 
>> Tom
>> 
>> Draft draft-ietf-ippm-ioam-data-02 already mentions layering (see section
>> 3):
>> "Layering: If several encapsulation protocols (e.g., in case of tunneling)
>> are stacked on top of each other, IOAM data-records could be present at
>> every layer.  The behavior follows the ships-in-the-night model."
>> 
>> Given the discussion here, we'll add some additional text in the next
>> revision to make things crisper (e.g. adding an example might help).
>> 
>> Frank
>> 
>> -----Original Message-----
>> From: Tianran Zhou <zhoutianran@huawei.com>
>> Sent: Dienstag, 17. April 2018 03:18
>> To: Tom Herbert <tom@herbertland.com>
>> Cc: Shwetha Bhandari (shwethab) <shwethab@cisco.com>; Frank Brockners
>> (fbrockne) <fbrockne@cisco.com>; Mickey Spiegel
>> <mspiegel@barefootnetworks.com>; NVO3 <nvo3@ietf.org>; Service Function
>> Chaining IETF list <sfc@ietf.org>; IETF IPPM WG <ippm@ietf.org>
>> Subject: RE: [ippm] [Int-area] encapsulation of IOAM data in various
>> protocols - follow up from WG discussion in London
>> 
>> I think it's better that Frank or Shwetha can explain the multi-layer use
>> case in detail.
>> 
>> Tianran
>> 
>> -----Original Message-----
>> From: Tom Herbert [mailto:tom@herbertland.com]
>> Sent: Monday, April 16, 2018 10:40 PM
>> To: Tianran Zhou <zhoutianran@huawei.com>
>> Cc: Shwetha Bhandari (shwethab) <shwethab@cisco.com>; Frank Brockners
>> (fbrockne) <fbrockne@cisco.com>; Mickey Spiegel
>> <mspiegel@barefootnetworks.com>; NVO3 <nvo3@ietf.org>; int-area
>> <int-area@ietf.org>; Service Function Chaining IETF list
>> <sfc@ietf.org>; IETF IPPM WG <ippm@ietf.org>
>> Subject: Re: [ippm] [Int-area] encapsulation of IOAM data in various
>> protocols - follow up from WG discussion in London
>> 
>> On Mon, Apr 16, 2018 at 6:31 AM, Tianran Zhou <zhoutianran@huawei.com>
>> wrote:
>> 
>> Hi Shwetha,
>> 
>> You are talking about the outer encapsution. It is straight forward
>> for the underlay to record by the header. But what about the
>> overlay, i.e., inner encapsulation(e.g. geneve)? Without special
>> configuration, intermediate node will not read the inner header,
>> hence not be able to process IOAM.e
>> 
>> 
>> Hi Tianran,
>> 
>> I believe that is also not protocol conformant. Intermediate nodes
>> should not be processing transport layer data as this can lead to
>> misinterpretation and possibly silent data corruption.
>> 
>> For instance, Geneve is a UDP encapsulation protocol with assigned port
>> 6081.
>> In order for an intermediate device to process the Geneve
>> encapsulation header it would need to look for packets with
>> destination port of 6081 since that is the only possible
>> discriminator. However, transport port numbers do not have global
>> meaning and hosts may use port numbers for other purposes (RFC7605
>> describes this). So a packet to port 6081 might be something other
>> than Geneve and may be misinterpreted. If a misinterpreted packet is changed
>> (like ippm data is written) then that would be systematic silent data
>> corruption.
>> 
>> As far as I know, hop-by-hop options is the only protocol confirming
>> mechanism that allows an intermediate note to change data of packet in
>> flight.
>> Encpasulation is the only conforming mechanism that allows an
>> intermediate node to add data (like extension headers) to a packet in
>> flight.
>> 
>> Tom
>> 
>> Maybe we are not synced by this overlay/underlay use case. :-)
>> 
>> Tianran
>> 
>> 
>> 
>> ________________________________
>> Sent from WeLink
>> 
>> 发件人: Shwetha Bhandari (shwethab)
>> 收件人: Tianran Zhou<zhoutianran@huawei.com>;Frank Brockners
>> (fbrockne)<fbrockne@cisco.com>;Mickey
>> Spiegel<mspiegel@barefootnetworks.com>;Tom
>> Herbert<tom@herbertland.com>
>> 抄送: NVO3<nvo3@ietf.org>;int-area<int-area@ietf.org>;Service Function
>> Chaining IETF list<sfc@ietf.org>;IETF IPPM WG<ippm@ietf.org>
>> 主题: Re: [ippm] [Int-area] encapsulation of IOAM data in various
>> protocols - follow up from WG discussion in London
>> 时间: 2018-04-16 18:17:01
>> 
>> Hi Tianran,
>> 
>> If I recall right, it is not written in the ioam data draft.
>> 
>> 
>> Data draft is defining the data to be carried in IOAM in an
>> encapsulation agnostic way, it does not specify how the
>> encapsulation protocol is configured.
>> 
>> 
>> 
>> Yes, node by node configuration is an easy way.
>> 
>> 
>> While it is, it does not have to be a node by node configuration. It
>> can be part of the encapsulation definition.
>> 
>> For e.g. If the encapsulation is IPv6 and if we define the data to
>> be carried as HbH options, then based on the Option Type with
>> highest order 2 bits set to 00 then the v6 nodes that implement IOAM
>> will process the option and others will skip over.
>> 
>> 
>> 
>> 
>> 
>> Thanks,
>> 
>> Shwetha
>> 
>> 
>> 
>> From: ippm <ippm-bounces@ietf.org> on behalf of Tianran Zhou
>> <zhoutianran@huawei.com>
>> Date: Monday, April 16, 2018 at 2:36 PM
>> To: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>, Mickey
>> Spiegel <mspiegel@barefootnetworks.com>, Tom Herbert
>> <tom@herbertland.com>
>> Cc: NVO3 <nvo3@ietf.org>, "int-area@ietf.org" <int-area@ietf.org>,
>> Service Function Chaining IETF list <sfc@ietf.org>, IETF IPPM WG
>> <ippm@ietf.org>
>> Subject: Re: [ippm] [Int-area] encapsulation of IOAM data in various
>> protocols - follow up from WG discussion in London
>> 
>> 
>> 
>> Hi Frank,
>> 
>> 
>> 
>> If I recall right, it is not written in the ioam data draft.
>> 
>> Yes, node by node configuration is an easy way. In the
>> draft-zhou-ippm-ioam-yang, we have the “protocol-type” to indicate
>> the layering.
>> 
>>  +--rw ioam
>> 
>>     +--rw ioam-profiles
>> 
>>        +--rw enabled?        boolean
>> 
>>        +--rw ioam-profile* [profile-name]
>> 
>>           +--rw profile-name                    string
>> 
>>           +--rw filter
>> 
>>           |  +--rw filter-type?   ioam-filter-type
>> 
>>           |  +--rw acl-name?      -> /acl:acls/acl/name
>> 
>>           +--rw protocol-type?                  ioam-protocol-type
>> 
>>           +--rw incremental-tracing-profile {incremental-trace}?
>> 
>>           |  ...
>> 
>>           +--rw preallocated-tracing-profile {preallocated-trace}?
>> 
>>           |  ...
>> 
>>           +--rw pot-profile {proof-of-transit}?
>> 
>>           |  ...
>> 
>>           +--rw e2e-profile {edge-to-edge}?
>> 
>>              ...
>> 
>> 
>> 
>> 
>> 
>> Tianran
>> 
>> From: Frank Brockners (fbrockne) [mailto:fbrockne@cisco.com]
>> Sent: Monday, April 16, 2018 4:51 PM
>> To: Tianran Zhou <zhoutianran@huawei.com>; Mickey Spiegel
>> <mspiegel@barefootnetworks.com>; Tom Herbert <tom@herbertland.com>
>> Cc: NVO3 <nvo3@ietf.org>; int-area@ietf.org; Service Function
>> Chaining IETF list <sfc@ietf.org>; IETF IPPM WG <ippm@ietf.org>
>> Subject: RE: [ippm] [Int-area] encapsulation of IOAM data in various
>> protocols - follow up from WG discussion in London
>> 
>> 
>> 
>> Hi Tianran,
>> 
>> 
>> 
>> IOAM is a domain specific feature (see also
>> draft-ietf-ippm-ioam-data-02 sections 3 and 4), which allows an
>> operator to control by means of configuration where and for which
>> traffic IOAM data fields are added/updated/removed from the customer
>> traffic. Using your example of Geneve over IPv6 – with IOAM data in
>> both the Geneve and the IPv6 protocol, one would expect that the
>> operator configures the endpoints of the Geneve tunnel to operate on
>> the IOAM data in Geneve, and the IPv6 routers that the Geneve tunnel
>> 
>> traverses to operate on the IOAM data in IPv6.
>> 
>> 
>> 
>> 
>> Frank
>> 
>> 
>> 
>> From: Tianran Zhou <zhoutianran@huawei.com>
>> Sent: Montag, 16. April 2018 10:37
>> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>; Mickey Spiegel
>> <mspiegel@barefootnetworks.com>; Tom Herbert <tom@herbertland.com>
>> Cc: NVO3 <nvo3@ietf.org>; int-area@ietf.org; Service Function
>> Chaining IETF list <sfc@ietf.org>; IETF IPPM WG <ippm@ietf.org>
>> Subject: RE: [ippm] [Int-area] encapsulation of IOAM data in various
>> protocols - follow up from WG discussion in London
>> 
>> 
>> 
>> Hi Frank,
>> 
>> 
>> 
>> How does a forwarder know when and where to insert the data?
>> 
>> In the case of Geneve over IPv6, do you mean the device need to scan
>> all the protocol stack? Or just the outer encapsulation?
>> 
>> 
>> 
>> Tianran
>> 
>> 
>> 
>> From: ippm [mailto:ippm-bounces@ietf.org] On Behalf Of Frank
>> Brockners
>> (fbrockne)
>> Sent: Monday, April 16, 2018 3:08 PM
>> To: Mickey Spiegel <mspiegel@barefootnetworks.com>; Tom Herbert
>> <tom@herbertland.com>
>> Cc: NVO3 <nvo3@ietf.org>; int-area@ietf.org; Service Function
>> Chaining IETF list <sfc@ietf.org>; IETF IPPM WG <ippm@ietf.org>
>> Subject: Re: [ippm] [Int-area] encapsulation of IOAM data in various
>> protocols - follow up from WG discussion in London
>> 
>> 
>> 
>> 
>> 
>> Tom,
>> 
>> 
>> 
>> a quick addition to what Mickey mentioned below: What you seem to
>> have in mind is what draft-ietf-ippm-ioam-data-02 refers to as “layering”
>> (see section 3.), i.e. if you’re running for example Geneve over
>> IPv6, then IOAM data could be encapsulated in both protocols, Geneve
>> and
>> IPv6 – giving you visibility into the “underlay” (IPv6) and the “overlay”
>> 
>> (Geneve).
>> 
>> 
>> 
>> 
>> Frank
>> 
>> 
>> 
>> From: ippm <ippm-bounces@ietf.org> On Behalf Of Mickey Spiegel
>> Sent: Freitag, 13. April 2018 20:22
>> To: Tom Herbert <tom@herbertland.com>
>> Cc: NVO3 <nvo3@ietf.org>; int-area@ietf.org; Service Function
>> Chaining IETF list <sfc@ietf.org>; IETF IPPM WG <ippm@ietf.org>
>> Subject: Re: [ippm] [Int-area] encapsulation of IOAM data in various
>> protocols - follow up from WG discussion in London
>> 
>> 
>> 
>> Tom,
>> 
>> 
>> 
>> On Thu, Apr 12, 2018 at 10:17 PM, Tom Herbert <tom@herbertland.com> wrote:
>> 
>> Mickey,
>> 
>> Looking at these ippm drafts more closely, I have a much more
>> fundamental concern.
>> 
>> In draft-brockners-ippm-ioam-geneve-00 for instance, there is the
>> text in the introduction:
>> 
>> "In-situ OAM (IOAM) records OAM information within the packet while
>> the packet traverses a particular network domain.  The term "in-situ"
>> refers to the fact that the IOAM data fields are added to the data
>> packets rather than is being sent within packets specifically
>> dedicated to OAM.  This document defines how IOAM data fields are
>> transported as part of the Geneve [I-D.ietf-nvo3-geneve]
>> encapsulation."
>> 
>> I assume this means that as packets with Geneve encapsulation
>> traverse the network they are interpreted by intermediate nodes as
>> being Geneve. Since Geneve is a UDP encapsulation, then the
>> destination UDP port number would be used to identify packets as
>> being Geneve. So an intermediate device might be looking for UDP
>> packets destined to port
>> 6081 (the assigned UDP port for Geneve). If my understanding is
>> correct, then this is a problem.
>> 
>> UDP port numbers do not have global meaning. An intermediate device
>> may very well see UDP packets destined to port 6081 that are not
>> actually Geneve. This scenario is discussed in RFC7605:
>> 
>> "...intermediate device interprets traffic based on the port number.
>> It is important to recognize that any interpretation of port numbers
>> -- except at the endpoints -- may be incorrect, because port numbers
>> are meaningful only at the endpoints."
>> 
>> If the UDP data is modified, as the draft would imply, then
>> misinterpretation may also mean silent data corruption of packets. A
>> protocol that would allow this seems pretty incorrect! Note that
>> this would be true also for any UDP encapsulation that the network
>> tries to interpret.
>> 
>> 
>> 
>> The intention is to allow for multiple nodes that a packet traverses
>> 
>> to be able to insert IOAM node information in the same trace option,
>> 
>> but leave some flexibility regarding which nodes actually do the
>> 
>> IOAM processing and the node information. This may vary
>> 
>> depending on the transport.
>> 
>> 
>> 
>> In case of a tunneled encapsulation such as Geneve or VXLAN,
>> 
>> there may still be multiple hops. For example a network may use
>> 
>> Geneve or VXLAN, but only do L2 processing at ToRs, with L3
>> 
>> processing done at aggregation or core switches. In this case
>> 
>> many packets would do 2 Geneve or VXLAN hops, so the packet
>> 
>> would contain IOAM node information from two nodes.
>> 
>> 
>> 
>> Another example is service function chaining using Geneve or
>> 
>> VXLAN rather than NSH.
>> 
>> 
>> 
>> 
>> I am also wondering if hop-by-hop options been considered for this
>> application? Their interpretation in the network is unabiguous and
>> they also have the advantage that the work with any IP protocol or
>> encapsulation.
>> 
>> 
>> 
>> IPv6 hop-by-hop options has been considered. See
>> 
>> draft-brockners-inband-oam-transport-05. This has not yet been
>> 
>> broken out into a separate draft.
>> 
>> 
>> 
>> Mickey
>> 
>> 
>> 
>> 
>> Thanks,
>> Tom
>> 
>> 
>> On Thu, Apr 12, 2018 at 3:31 PM, Mickey Spiegel
>> <mspiegel@barefootnetworks.com> wrote:
>> 
>> Tom,
>> 
>> On Thu, Apr 12, 2018 at 2:46 PM, Tom Herbert <tom@herbertland.com> wrote:
>> 
>> 
>> On Thu, Apr 12, 2018 at 9:54 AM, Greg Mirsky
>> <gregimirsky@gmail.com>
>> wrote:
>> 
>> Hi Frank,
>> thank you for sharing your points. Please find my notes in-line
>> and tagged
>> GIM>>. I believe that this is very much relevant to work of
>> GIM>>other
>> working
>> groups that directly work on the overlay encapsulations in the
>> center of the discussion and hence I've added them to the list.
>> Hope we'll have more opinions to reach the conclusion that is
>> acceptable to all.
>> 
>> Regards,
>> Greg
>> 
>> On Wed, Apr 11, 2018 at 12:02 PM, Frank Brockners (fbrockne)
>> <fbrockne@cisco.com> wrote:
>> 
>> 
>> Back at the IPPM meeting in London, we discussed several drafts
>> dealing with the encapsulation of IOAM data in various
>> protocols (draft-brockners-ippm-ioam-vxlan-gpe-00,
>> draft-brockners-ippm-ioam-geneve-00,
>> draft-weis-ippm-ioam-gre-00). One discussion topic that we
>> decided to take to the list was the question on whether
>> draft-ooamdt-rtgwg-ooam-header could be leveraged..  After
>> carefully considering draft-ooamdt-rtgwg-ooam-header, I came to
>> the conclusion that the “OOAM header” does not meet the needs
>> of
>> IOAM:
>> 
>> * Efficiency: IOAM adds data to live user traffic. As such, an
>> encapsulation needs to be as efficient as possible. The “OOAM header”
>> is 8
>> bytes long. The approach for IOAM data encapsulation in the
>> above mentioned drafts only requires 4 bytes. Using the OOAM
>> header approach would add an unnecessary overhead of 4 bytes –
>> which is significant.
>> 
>> Greg,
>> 
>> I'm missing something here. I looked at the drafts you referenced
>> and each of them looks like the overhead for OAM is greater that
>> four bytes. In each there is some overhead equivalent to
>> type/length, for instance in Geneve four bytes are needed for
>> option class, type, and length. Unless the the OAM data is zero
>> length, I don't see how this adds up to only four bytes of overhead.
>> 
>> 
>> 
>> The four versus eight bytes just refers to the fields in the four
>> bytes of IOAM info, that is common to all IOAM options. Beyond
>> that, there are IOAM option specific fields. For example if doing
>> one of the IOAM trace options, there are four bytes of trace option
>> header, including the IOAM-trace-type, NodeLen, Flags, and
>> RemainingLen fields. These are followed by the node data list
>> containing the per hop IOAM information.
>> 
>> In looking at the OOAM header content, it has nothing to do with
>> any of the IOAM information after the first four bytes. It contains
>> another variant of the information in the first four bytes of IOAM
>> info, spread out over eight bytes.
>> 
>> 
>> Tom
>> 
>> 
>> GIM>> The difference in four octets is because OOAM Header:
>> 
>> provides more flexibility, e.g. Flags field and Reserved fields;
>> 
>> 
>> 
>> The flags field only has one defined flag at the moment, for a
>> timestamp block. For IOAM trace we need per hop timestamps, which
>> the timestamp block cannot address, i.e. the timestamp block is
>> redundant for
>> 
>> IOAM.
>> 
>> 
>> 
>> supports larger OAM packets than iOAM header;
>> 
>> 
>> 
>> For IOAM purposes, 1020 octets is more than enough.
>> 
>> 
>> is future proof by supporting versioning (Version field).
>> 
>> 
>> 
>> IMO, taking the first two bits of the IOAM-Type to define a Version
>> field would be a good thing. This does not require adding four more
>> bytes of overhead. 64 IOAM-Types is more than enough.
>> 
>> 
>> 
>> * Maturity: IOAM has several implementations, which were also
>> shown at recent IETF hackathons – and we’re expecting
>> additional implementations to be publicized soon. Interoperable
>> implementations need timely specifications. Despite the
>> question being asked, the recent thread on OOAM in the NVO3
>> list hasn’t revealed any implementation of the OOAM header.
>> In
>> addition, the thread revealed that several fundamental
>> questions about the OOAM header are still open, such as whether
>> or how active OAM mechanisms within protocols such as Geneve
>> would apply to the OOAM header. This ultimately means that we
>> won’t get to a timely specification.
>> 
>> 
>> GIM>> May I ask which encapsulations supported by the
>> GIM>> implementations
>> you
>> refer to. Until very recently all iOAM proposals were to use
>> meta-data TLV in, e.g. Geneve and NSH. And if these or some of
>> these implementations already updated to the newly proposed iOAM
>> shim, I don't see problem in making them use OOAM Header. Would
>> you agree?
>> 
>> 
>> * Scope: It isn’t entirely clear to which protocols the OOAM
>> header would ultimately apply to. The way the OOAM header is
>> defined, OOAM uses a 8-bit field for “Next Prot”, the next
>> protocol. Some protocols that IOAM data needs to be
>> encapsulated into use 16-bits for their next protocol code points. See e.g.
>> the GRE encapsulation – as specified in
>> draft-weis-ippm-ioam-gre-00.
>> 
>> 
>> GIM>> The first paragraph of the Introduction section states:
>>  New protocols that support overlay networks like VxLAN-GPE
>>  [I-D.ietf-nvo3-vxlan-gpe], GUE [I-D.ietf-nvo3-gue], Geneve
>>  [I-D.ietf-nvo3-geneve], BIER
>> [I-D.ietf-bier-mpls-encapsulation],
>> 
>> and
>> 
>>  NSH [I-D.ietf-sfc-nsh] support multi-protocol payload, e.g.
>>  Ethernet, IPv4/IPv6, and recognize Operations, Administration, and
>>  Maintenance (OAM) as one of distinct types.  That ensures that
>>  Overlay OAM (OOAM)packets are sharing fate with Overlay data packet
>>  traversing the underlay.
>> I'm updating the OOAM Header draft and along with cleaning nits
>> will update reference to GUE. I think that the list and the
>> statemnt are quite clear in identifying the scope of networks
>> that may benefit from using not only common OOAM Header but
>> common OOAM mechanisms, e.g. Echo Request/Reply.
>> 
>> With the above in mind, I’d suggest that the WG moves forward
>> with specific definitions for encapsulating IOAM data into
>> protocols – per the above mentioned drafts.
>> 
>> 
>> 
>> Regards, Frank
>> 
>> 
>> _______________________________________________
>> ippm mailing list
>> ippm@ietf.org
>> https://www.ietf.org/mailman/listinfo/ippm
>> 
>> 
>> 
>> _______________________________________________
>> Int-area mailing list
>> Int-area@ietf.org
>> https://www.ietf.org/mailman/listinfo/int-area
>> 
>> 
>> _______________________________________________
>> ippm mailing list
>> ippm@ietf.org
>> https://www.ietf.org/mailman/listinfo/ippm
>> 
>> 
>> 
>> 
>> 
>> 
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>> 
>>