Re: [ippm] draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)

"Rajiv Asati (rajiva)" <rajiva@cisco.com> Mon, 25 March 2019 05:06 UTC

Return-Path: <rajiva@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 472AD120339; Sun, 24 Mar 2019 22:06:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level:
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=XnU/v3sh; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=HArrGkEV
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OAauV-aHRH5w; Sun, 24 Mar 2019 22:06:34 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B341E120336; Sun, 24 Mar 2019 22:06:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=43647; q=dns/txt; s=iport; t=1553490393; x=1554699993; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=gd3/AiA9fqWU9fYCNjVwtFdZdP7JeRwKn1A5eRcJ6vo=; b=XnU/v3shm8+HFnGKTt/FncC5NSwv3JSAyqUbSWbilgEKGY3GD/VbfNY/ 9fvu0B4vPnDgx6nUH1MJ2CVNDMpyW2lb0tH4YzAzrnHGuen9mCyzRK6ae cHeG6kQN8pkEo0ZRB1rWa0N6LwfGojkEodzfQSaRToR5cOuGbclFxp1WW A=;
IronPort-PHdr: 9a23:9zx/oRVyEVsOVkRpxXvHMB4fhtHV8LGuZFwc94YnhrRSc6+q45XlOgnF6O5wiEPSANSJ8OpK3uzRta2oGXcN55qMqjgjSNRNTFdE7KdehAk8GIiAAEz/IuTtankgFcZDSlZN9HCgOk8TE8H7NBXf
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AEAABqYJhc/5hdJa1ZChoBAQEBAQIBAQEBBwIBAQEBgVEFAQEBAQsBgQ4vJCwDaHQECyeEDoNHA4RSilaCV4k3jVWBLhSBEANQBA0BARgBCgmEQAIXhGUiNAkNAQEDAQEJAQMCbRwMhUoBAQEBAwEBIR0BASwLAQ8CAQgRAwECIQECBAMCAgIfBgsUCQgCBAENBRuDBwGBEUwDFQECDKJBAooUcYEvgngBAQWEfQ0LggwDBYEvAYsxF4FAP4ERJx+CTD6CGkcBAYEuAQcLAT8NCYJUMYImihskgjSEH4dGjAs2CQKPeIM/GZN+ixyHP4trAgQCBAUCDgEBBYFNOGVxcBU7KgGCQYIKDBcTgziFFIU/coEojAqCPgEB
X-IronPort-AV: E=Sophos;i="5.60,256,1549929600"; d="scan'208,217";a="542467241"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Mar 2019 05:06:32 +0000
Received: from xch-rcd-011.cisco.com (xch-rcd-011.cisco.com [173.37.102.21]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id x2P56Weu016448 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 25 Mar 2019 05:06:32 GMT
Received: from xhs-aln-001.cisco.com (173.37.135.118) by XCH-RCD-011.cisco.com (173.37.102.21) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 25 Mar 2019 00:06:31 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 25 Mar 2019 00:06:30 -0500
Received: from NAM01-BY2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 25 Mar 2019 01:06:30 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gd3/AiA9fqWU9fYCNjVwtFdZdP7JeRwKn1A5eRcJ6vo=; b=HArrGkEVFt9WYCuH0OOl8sWujdpkQEw3qEVzhwh+Ng0jrnHBtW8q1Xigak/Wn2eKTccqJCrDw9ZT4cBldpEVmvK8MLfWXAjCV8s8pS9oqUZJgw4/Q++usLyeZ2PA9iwo5Yhv8HX6CO6c2IfrIlMxi0D8IyRWZp1ElZmOLBoK1bI=
Received: from DM6PR11MB3068.namprd11.prod.outlook.com (20.177.218.153) by DM6PR11MB3947.namprd11.prod.outlook.com (20.176.124.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1730.15; Mon, 25 Mar 2019 05:06:28 +0000
Received: from DM6PR11MB3068.namprd11.prod.outlook.com ([fe80::5d16:a8db:b524:e147]) by DM6PR11MB3068.namprd11.prod.outlook.com ([fe80::5d16:a8db:b524:e147%4]) with mapi id 15.20.1730.019; Mon, 25 Mar 2019 05:06:28 +0000
From: "Rajiv Asati (rajiva)" <rajiva@cisco.com>
To: Mark Smith <markzzzsmith@gmail.com>, "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
CC: "C. M. Heard" <heard@pobox.com>, 6man WG <ipv6@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)
Thread-Index: AQHU4eV8jI/omcO61EelL2QiWIaZYqYbiiaA
Date: Mon, 25 Mar 2019 05:06:28 +0000
Message-ID: <A4C3F78F-45D8-493F-BF44-96E9FF6146E7@cisco.com>
References: <CACL_3VGxyn-PYosFsKPVdd8C=P5AbE6HD1zrimHKuh2MPkhnuQ@mail.gmail.com> <505272eac2dd44fa891d4d36d14da9af@XCH-RCD-008.cisco.com> <CAO42Z2wGMzc_RT=eWTx9Ve-5reS0nCWiteGOuE16=MB4Fg8mkg@mail.gmail.com> <f50040ab52d04867b9a5cefa1c3131c3@XCH-RCD-008.cisco.com> <CAO42Z2zgguekybwVuCh8Az3mK8gHp292BYnWYhJq-8KEyfKzOA@mail.gmail.com> <7ea9049fe6f44a40aefe4801bd796322@XCH-RCD-008.cisco.com> <CAO42Z2y5TS1+8YxNsr=BKz5v8-ZPTiO-M7CU2k6FzNqVZoU4VA@mail.gmail.com> <CY4PR11MB1335960AD9BF9A4B990F7E10DA4A0@CY4PR11MB1335.namprd11.prod.outlook.com> <CAO42Z2xqq=uksNQPxvF_CRSxf1V_MADbFurzW4hqQW0v478cyw@mail.gmail.com>
In-Reply-To: <CAO42Z2xqq=uksNQPxvF_CRSxf1V_MADbFurzW4hqQW0v478cyw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.17.0.190309
authentication-results: spf=none (sender IP is ) smtp.mailfrom=rajiva@cisco.com;
x-originating-ip: [2001:420:c0c4:1001::137]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3eea051f-1a1c-422d-a3c0-08d6b0dfa392
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:DM6PR11MB3947;
x-ms-traffictypediagnostic: DM6PR11MB3947:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <DM6PR11MB3947CDBF758968C2E1B004DFC75E0@DM6PR11MB3947.namprd11.prod.outlook.com>
x-forefront-prvs: 0987ACA2E2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39850400004)(346002)(136003)(366004)(376002)(396003)(189003)(199004)(51444003)(6636002)(58126008)(106356001)(316002)(229853002)(14454004)(2906002)(606006)(36756003)(76176011)(99286004)(33656002)(966005)(4326008)(5660300002)(486006)(25786009)(105586002)(11346002)(478600001)(476003)(2616005)(66574012)(46003)(6436002)(6486002)(7736002)(81156014)(86362001)(8676002)(53936002)(6246003)(446003)(6512007)(6306002)(236005)(54896002)(83716004)(71190400001)(71200400001)(81166006)(186003)(14444005)(256004)(5024004)(6116002)(6506007)(54906003)(53546011)(8936002)(102836004)(97736004)(82746002)(110136005)(93886005)(68736007); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR11MB3947; H:DM6PR11MB3068.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: GNqK32iOJx5o5gT7hyE6BoK/4DBDjBKMpDw4SIOs3sqNlu+XRNJ1Sqnodi7V81LG7eJ3vFtOe5i1mgrm0CjzGn7nV9abaO3CcGh4FelpBub5xZoKMzsC5f63ErmlD/fX9dQHigM1P/PH0amS1zGAyPCBTzbvf2SBSaZedDMkHTmQxF9ZVZpF66/FfHHeZEll1d9ciljG5AvyRBWnntL16NZvNMa9t40ag/hPIlUaXu6FSP3PBhXGTyRhU+jGJuDRC85VJdWXUnZRco51WT7spfOarly6Eh/VJ4Xhcrqfk1bMEKvJ9XFPLDVJE3B4gqo8UhV7nCLDQm5EMI4T1LyXY3XnzU5RXO1z77oyseMXmqUPPdcNbXog3RwvePoriQP5ulixcz06CjQVZwHAzsutSOqaTPtMKW08aHwfVIRG6wA=
Content-Type: multipart/alternative; boundary="_000_A4C3F78F45D8493FBF4496E9FF6146E7ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 3eea051f-1a1c-422d-a3c0-08d6b0dfa392
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Mar 2019 05:06:28.7665 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB3947
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.21, xch-rcd-011.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/KaSKPgD2Y3cMsXw97XzUGsNXGEs>
Subject: Re: [ippm] draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Mar 2019 05:06:37 -0000

I also think that there is a value in dividing this draft in 2 separate drafts – one generic, and another focused on IOAM specifics.

Also, it might be useful to distinguish the deployment considerations that relate to Inter-AS and/or Inter-Provider IOAM usage. For ex, C3, C4. An IOAM domain An AS can have more than one IOAM domains after all. In such usages, IOAM information would need to be exchanged outside the domain & AS.

BTW, wrt C6, which section of rfc8200 prescribes using encapsulation? IMO, using encap breaks C1. Of course, using option insertion into the original packets breaks C6. In light of that, it would be useful to add the 5.1.4 that lists non-encapsulation option as well.


--
Cheers,
Rajiv

From: ipv6 <ipv6-bounces@ietf.org> on behalf of Mark Smith <markzzzsmith@gmail.com>
Date: Saturday, March 23, 2019 at 10:01 PM
To: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
Cc: "C. M. Heard" <heard@pobox.com>, 6man WG <ipv6@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Subject: draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)

Hi Frank,

Apologies not to get back to you sooner, I missed this email (and now
have a filter to highlight emails directly sent to me). Also apologies
for sending feedback so close to IETF104.

On Thu, 14 Mar 2019 at 03:23, Frank Brockners (fbrockne)
<fbrockne@cisco.com<mailto:fbrockne@cisco.com>> wrote:

With the upcoming meeting in Prague, I wanted to come back to this discussion:

We've just recently posted a new draft (draft-ioametal-ippm-6man-ioam-ipv6-deployment-00) - which summarizes a set of deployment considerations for IOAM with IPv6, i.e. complementing 6man draft-ioametal-ippm-6man-ioam-ipv6-options-01. draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 also includes the deployment scenario that Mark detailed below.

Appreciate your thoughts - especially from 6man to provide for proper guidance to IPPM.


<snip>

Thanks very much to you and the other authors for writing up that this
Internet Draft.

Regarding

"3.  Considerations for IOAM deployment in IPv6 networks"

that's an excellent list and set of descriptions of what I think are
the requirements for when information is added to an existing IPv6
packet as it transits a network domain that wishes to add and then
remove local domain supplementary information.

I think those requirements also apply to the addition of Segment
Routing information to existing packets as they transit an SR domain,
so one thought could be to extract them out and publish them as a more
general Internet Draft, titled something like "Considerations For
Adding Supplemental Information to IPv6 Packets Transiting a Network
Sub-Domain". (Actually, reading more, I think most of the ID is not
really that specific to IOAM, so most of the ID could probably be
published as a more generic document on considerations for adding
supplemental information to transit IP packets).


Regarding,

"5.1.1.  IPv6-in-IPv6 encapsulation"

where the outer encapsulation header destination IPv6 address is set
to the same as the inner, original IPv6 destination address, for
packets transiting the IOAM domain, I think that method would be quite
vulnerable to C3:

"C3 Packets with IOAM data or associated ICMP errors, should not
      arrive at destinations which have no knowledge of IOAM.  Consider
      using IOAM in transit devices; misleading ICMP errors due to
      addition and/or presence of OAM data in the packet can confuse a
      source of the packet that did not insert the OAM information."


As the outer header IPv6 address is exterior to the IOAM domain as it
is also the inner packet's DA, it means that standard and default IPv6
destination address based forwarding would forward the packet as is
(i.e. encapsulated with IOAM information) external to the domain,
without removing the outer IPv6 encapsulation and the IOAM
information. In other words, IOAM information would leak if standard
IPv6 forwarding was used, which of course is enabled by default for
IPv6 routers.

To prevent that, the egress IOAM device would have to use
non-standard, non-default IPv6 forwarding, which means deeper
inspection of each and every egress packet regardless of its
destination address, to see if it is an encapsulated IOAM packet, and
to then remove the outer IPv6 header and IOAM information if it
exists, before then standard IPv6 forwarding the original inner
packet.

The advantage of using a separate and IOAM domain local and interior
address space as in "5.1.2.  IP-in-IPv6 encapsulation with ULA", is
that the outer packet ULA destination address is distinguishing which
packets need IOAM encapsulation processing from those that don't (and
of course, as the ULA address space is local to and unique to the IOAM
domain, if they do leak externally, they have no valid destination to
reach).

As those encapsulated IOAM packets are distinguished using the (outer)
Destination Address, the selector for standard IPv6 forwarding, there
is now no need for any special, new and more complex packet handling
by the IOAM domain egress device. Using standard IPv6 forwarding
avoids the complexity and implementation that would then be imposed on
every router implementation that could be used as an egress IOAM
domain device.

"2. To simplify debugging in case of leaked IOAM data fields in

       packets, consider a new IOAM E2E destination option to identify
       the Source IOAM domain (AS, v6 prefix).  Insert this option into
       the IOAM destination options EH attached to the outer IPv6
       header.  This additional information would allow for easy
       identification of an AS operator that is the source of packets
       with leaked IOAM information."

is suggesting a solution to the leaked IOAM issue. However I think it
is always better to avoid a problem using an alternative method if
possible, rather than to continue to let it the problem exist and then
mitigate or eliminate its effects with even further mechanisms. It's
more complexity to mitigate or eliminate, and that's more things that
can break.


Regarding,

"5.1.2.  IP-in-IPv6 encapsulation with ULA"

Some suggested text -

"Addressing and routing in the ION are to be configured so
   that the IP-in-IPv6 encapsulated packets follow the same path as the
   original, non-encapsulated packet would have taken."

add something like

"This would create an internal IPv6 forwarding topology using the IOAM
domain's interior ULA address space that is parallel with the
forwarding topology that exists with the non-IOAM address space (the
topology and address space that would be followed by packets that do
not have supplemental IOAM information) . Establishment and
maintenance of the parallel IOAM ULA forwarding topology could be
automated in the future, similar to how LDP [RFC5036] is used in MPLS
to establish and maintain an LSP forwarding topology that is parallel
to the network's IGP forwarding topology."


"Assuming that the operational guidelines specified in Section 4 of
   [RFC4193] are properly followed, the probability of leaks in this
   approach will be almost close to zero."

add something like

"If the packets do leak through IOAM egress device misconfiguration or
partial IOAM egress device failure, the packets' ULA destination
address is invalid outside of the IOAM domain. There is no exterior
destination to be reached, and the packets will be dropped when they
encounter either a router external to the IOAM domain that has a
packet filter that drops packets with ULA destinations, or a router
that does not have a default route."


Regards,
Mark.

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------