Re: [ippm] [SUSPICIOUS] Re: [nvo3] Comments on draft-ietf-nvo3-vxlan-gpe

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Thu, 18 April 2019 01:08 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB3FD120096; Wed, 17 Apr 2019 18:08:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level:
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c3GeructIx2W; Wed, 17 Apr 2019 18:07:59 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF7E4120033; Wed, 17 Apr 2019 18:07:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=42928; q=dns/txt; s=iport; t=1555549679; x=1556759279; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=TetsWSy/95PjxMFyLIA2V9dP7DhvvcT+BDVEHBIzj3o=; b=OTTQsteR90jR+Qe7OUZnpSYUZFvNZZ90AtoWNgg6Bst72As1WBV7LoKY bXUI5meXCdQn+Pyo2IPRz/ZLaODeL03Qp1esABpl223a/F60w3+5zlXaU tjYP1MRSsouGscZ5oErDIiuo1P6jVNF0HHa1M1S+PagF47/t0Nk0o7DP2 E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AHAAAqzbdc/5ldJa1cChkBAQEBAQEBAQEBAQEHAQEBAQEBgVMCAQEBAQELAYEOUwUqaIEEKAqEBJU2iTqPEBSBZw4BARgBCYRLAheFfiM2Bw4BAwEBBAECAQJtHAyFSgEBAQMBAQEYCQRABwsFCwIBCBEDAQIBIAcDAgICHwYLFAkIAgQOBYMiAYEdTAMNDw+pVnwzhDYCg0gNghsGgTIBi0kXgUA/gREnH4FOfj6CGkcBAQIYgQ8NFQQyFoJUMYImBI0phDqHZ4wQLDcJAoIGhguEUoN3g0obggmGHYNniHCND4URgUeMMQIRFYEwJgkogVZwFTsqAYJBgzIBAoJIhRSFP0ExAQEKj0WBIQEB
X-IronPort-AV: E=Sophos;i="5.60,364,1549929600"; d="scan'208,217";a="263524500"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 18 Apr 2019 01:07:57 +0000
Received: from XCH-RTP-018.cisco.com (xch-rtp-018.cisco.com [64.101.220.158]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id x3I17vDS013117 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 18 Apr 2019 01:07:57 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-018.cisco.com (64.101.220.158) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 17 Apr 2019 21:07:56 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1473.003; Wed, 17 Apr 2019 21:07:56 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: NVO3 <nvo3@ietf.org>, "draft-ietf-nvo3-vxlan-gpe@ietf.org" <draft-ietf-nvo3-vxlan-gpe@ietf.org>, IETF IPPM WG <ippm@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [SUSPICIOUS] Re: [nvo3] Comments on draft-ietf-nvo3-vxlan-gpe
Thread-Index: AQHU8Pwb4PQUm0Sk6kyANyiY2S4odqY4th6AgAhKgYCAAAxngIAAJG4AgAAoIICAAAiMAP//wjaA
Date: Thu, 18 Apr 2019 01:07:56 +0000
Message-ID: <5C94C616-82BD-49CE-BB20-A31F843E8806@cisco.com>
References: <CA+RyBmV5R+jsPNn9-HooGcJzobD5mrxEwjbxn_o+hn2QcoiZNQ@mail.gmail.com> <12ACA02A-BB51-4214-A72B-1AEFCCB914AC@cisco.com> <CA+RyBmUgQdq-oHQFveGV3avStL=4B+=qxMU+epk6mHdAqhRR0w@mail.gmail.com> <3AFD4751-CF3A-4939-A49A-FB981C68CADF@cisco.com> <CA+RyBmXc3w4jzTnj_nbCQ0uDNhgyxyt4FZV_xLa0PsfaV7r-PA@mail.gmail.com> <4C9CDD29-BDF8-425E-998F-B12C1BD7CA7C@cisco.com> <CA+RyBmWsvuGYaCjF6N6StoHYCZZSKKUiUZB8AtjLgz=uSwXD9Q@mail.gmail.com>
In-Reply-To: <CA+RyBmWsvuGYaCjF6N6StoHYCZZSKKUiUZB8AtjLgz=uSwXD9Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.18.0.190414
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.118.116.132]
Content-Type: multipart/alternative; boundary="_000_5C94C61682BD49CEBB20A31F843E8806ciscocom_"
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.158, xch-rtp-018.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/LuNEfV7YT1h6r1ukrc-sjWEVnkc>
Subject: Re: [ippm] [SUSPICIOUS] Re: [nvo3] Comments on draft-ietf-nvo3-vxlan-gpe
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Apr 2019 01:08:05 -0000

Dear Greg,

As an innocent bystander, I have no dog in this fight (i.e., no personal stake in the issue you keep raising), but you seem to be making a rather strong accusation: “the updates the editors have been making without the WG agreeing to that”. You talk about plural “updates”, and you use a continued tense of “have been making” (implying more than once, or repeatedly).

Looking at the diffs from draft-ietf-nvo3-vxlan-gpe-00 to draft-ietf-nvo3-vxlan-gpe-07:
https://www6.ietf.org/rfcdiff/?url1=draft-ietf-nvo3-vxlan-gpe-00&url2=draft-ietf-nvo3-vxlan-gpe-07

I see no changes in the definition of the O-bit.

I will stop replying to this thread with this final note, and let the Editors of that document answer your explicit call – however, for the benefit of clarity for the WG, what specific updates you refer to?

You mention “the last two versions” of VXLAN-GRE.
05 -> 06: https://www6.ietf.org/rfcdiff/?url1=draft-ietf-nvo3-vxlan-gpe-05&url2=draft-ietf-nvo3-vxlan-gpe-06
I see no content changes – only updating references and spaces

06 -> 07: https://www6.ietf.org/rfcdiff/?url1=draft-ietf-nvo3-vxlan-gpe-06&url2=draft-ietf-nvo3-vxlan-gpe-07
Definition of Next Protocol range for shim headers, and assignment of a Next Protocol value for the IOAM shim.

Which one is it?

Carlos.


From: Greg Mirsky <gregimirsky@gmail.com>
Date: Wednesday, April 17, 2019 at 8:49 PM
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Cc: NVO3 <nvo3@ietf.org>, "draft-ietf-nvo3-vxlan-gpe@ietf.org" <draft-ietf-nvo3-vxlan-gpe@ietf.org>, IETF IPPM WG <ippm@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [SUSPICIOUS] Re: [nvo3] Comments on draft-ietf-nvo3-vxlan-gpe

Hi Carlos,
thank you for the discussion.
As the VXLAN-GPE is on the Informational track, there may be little point to discuss it. But as the draft has been adopted by NVO3 WG, I'm curious about the updates the editors have been making without the WG agreeing to that. I'm looking forward to hearing from any of the editors of VXLAN-GPE about the updates in the last two versions. Also, hope editors of the draft will find time to reply to my questions and consider my comments.

Regards,
Greg

On Wed, Apr 17, 2019 at 5:18 PM Carlos Pignataro (cpignata) <cpignata@cisco.com<mailto:cpignata@cisco.com>> wrote:
Dear Greg,

[Now adding the SFC WG Mailing list since you take us to a different WG again]

Thank you very much for fine-combing with a magnifying glass through all the documents I’m currently co-authoring :-)

It is refreshing to see that the only issues you find are non-issues, and your questions easy to re-answer :-)

At this point I am a bit at a loss of what your point is, or what you are trying to prove bending text. Are you coding, deploying, or testing IOAM on NSH without data packets on VXLAN-GPE over IP? NSH is data as far as VXLAN-GPE is concerned. IOAM shimmed in NSH is orthogonal to IOAM shimmed in VXLAN-GPE.

I feel this discussion about the O-bit already took place once or twice.

Kind Regards,

— Carlos Pignataro

PS: The Evil bit is defined for IPv4, should we therefore also define it here?


> On Apr 17, 2019, at 5:54 PM, Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>> wrote:
>
> Hi Carlos,
> to add another quote from the draft-ietf-sfc-ioam-nsh that you've co-authored,
>    Packets with IOAM data included MUST follow this
>    definition, i.e. the O bit MUST NOT be set for regular customer
>    traffic which also carries IOAM data and the O bit MUST be set for
>    OAM packets which carry only IOAM data without any regular data
>    payload.
>
> So, if the only iOAM message is carried in or after an NSH, it is identified as OAM. And, by your own example in the earlier note, so should VXLAN-GPE.
>
> Regards,
> Greg
>
> On Wed, Apr 17, 2019 at 12:44 PM Carlos Pignataro (cpignata) <cpignata@cisco.com<mailto:cpignata@cisco.com>> wrote:
> Hi, Greg,
>
> Adding the IPPM mailing list, since you reference it below, and point to RFC 7799.
>
> Please see inline.
>
> > On Apr 17, 2019, at 3:00 PM, Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>> wrote:
> >
> > Hi Carlos,
> > thank you for sharing your view on the design of the VXLAN-GPE protocol. Please find my comments in-line tagged GIM>>.
> >
> > Regards,
> > Greg
> >
> > On Fri, Apr 12, 2019 at 5:23 AM Carlos Pignataro (cpignata) <cpignata@cisco.com<mailto:cpignata@cisco.com>> wrote:
> > Greg,
> >
> > You seem to be confusing and mixing things up.
> >
> > Please see inline.
> >
> > > On Apr 12, 2019, at 2:50 AM, Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>> wrote:
> > >
> > > Dear Editors, et al.,
> > > I've read the latest -07 version and would like to share my comments and questions with you:
> > >       • in the earlier version of the draft, the O-bit was introduced and defined as:
> > > OAM Flag Bit (O bit):  The O bit is set to indicate that the packet is an OAM packet.
> > > At the same time, in the latest version, the new Next Protocol value (0x81) to identify iOAM Data was introduced. Hence are my questions:
> > >       • What must be the value of the O-bit when the value of the Next Protocol field is iOAM?
> >
> > The O bit “is set to indicate that the packet is an OAM packet”.
> > IAOM is not an OAM packet. Hence, O bit clear if VXLAN-GPE encapsulates a non-OAM packet and adds an IOAM shim.
> > GIM>> It is a very unexpected statement from you,
>
> I would tell you ‘expect the unexpected’, but that is not the case here... :-)
>
> If you actually read my statement, you will see "IAOM is not an OAM *packet*.” New emphasis added — it is _not_ *an OAM packet*.
>
> I stand by it. It’s an augmented data packet of interest.
>
> > one of the co-authors of draft-ietf-ippm-ioam-data  where the first paragraph of the Introduction section defines iOAM as Hybrid Type 1 OAM, according to RFC 7799 classification:
>
> This is still quite consistent with that definition, which I recommend you re-read:
>
> RFC 7799 is about metrics and methods, not packet definitions.
>
> You will see that Active methods include a “dedicated measurement packet stream”. “Active Methods generate packet streams.”
>
> However, Hybrid Type I leverages “Augmentation or modification of the stream of interest"
>
> Following your logic, if you change a packet field such as TTL/HL to provide packet coloring, do you need to set the O-bit?
>
> >    IOAM is to complement
> >    mechanisms such as Ping or Traceroute, or more recent active probing
> >    mechanisms as described in [I-D.lapukhov-dataplane-probe]..  In terms
> >    of "active" or "passive" OAM, "in-situ" OAM can be considered a
> >    hybrid OAM type.  While no extra packets are sent, IOAM adds
> >    information to the packets therefore cannot be considered passive.
> >    In terms of the classification given in [RFC7799] IOAM could be
> >    portrayed as Hybrid Type 1.
> >
> > >       • Do you plan to define the Next Protocol values for active OAM protocols, e.g., Echo Request/Reply, BFD, Performance Monitoring?
> >
> > I cannot speak to “plans” (replying as “et al.”, not as “editor”), but I expect OAM documents ought to have those requested, and you do not need necessarily all of those — the nex protocol IPv4 / IPv6 can encapsulate ICMP, UDP/BFD, etc., etc., etc., etc.
> > GIM>> Of course, use of the well-known port number, usually it is UDP destination port, is one of the methods to demultiplex protocols. This method is broadly used, for example, in MPLS OAM. But this method has some disadvantages that were pointed out in the discussion of BFD over GENEVE in Prague by David Black (the last presentation in the minutes):
> > David: I want the BFD header to be as close to the thing whose liveness I'm testing. The more headers you add in the middle, the more ways there are to break BFD without breaking the forwarding engine. The further away I move BFD from the chunk of hardware's liveness I care about, the more opportunities are for BFD and the hardware to not to tell me the same thing.
> >
>
> Theory and practice match in theory, less so in practice — unless you are planning to update RFC 5881.
>
> This can be argued both ways (e.g., better to have common handlers, etc.), but I take no position. I do say that in presence of deployed OAM encapsulations, there’s no basis for your your comment about defining a protocol type for “Performance Monitoring” as a protocol...
>
>
> >
> > >       • How to interpret the situation when the O-bit value is 1 but the value of the Next Protocol field is, for example, NSH, i.e.., not any of OAM protocols?
> >
> > I expect it means there’s OAM within that NSH (sometimes there’s no such things as “OAM Protocols”), or an unhandled OAM protocol.
> > GIM>> Should that, i.e., OAM in NSH or immediately following NSH be signaled using SFC NSH methods that are already defined in draft-ietf-sfc-multi-layer-oam?
>
>
> Non sequitur — I do not follow what signaling has to do with the conversation, nor how that draft might be relevant.
>
> > Using the server layer, as you've suggested, seems as layer violation.
> >
>
> This is a funny statement — NVO3 is a layer violation :-) So are Pseudowires. Please do not take this statement too seriously, it is not inviting discussion.
>
> > >       • I believe that the use of the dedicated OAM flag and the Next Protocol field for a fixed-size header that cannot include meta-data is unwarranted and adds unnecessary complexity.
> >
> > Disagree.
> >
> > See example where protocol is IP carrying an OAM packet.
> > GIM>> When IP/UDP encapsulation is used for OAM, there's no, in my opinion, any need to use the O-bit. The destination IP address must be as described in RFC 8029 or RFC 5884 and the demultiplexing is done based on the destination UDP port number. Clearly, O-bit is unnecessary if IP/UDP encapsulation for OAM being used.
> >
>
> Fortunately, bit usage is a matter of definition and not opinion :-)
>
> Kind regards,
>
> Carlos.
>
>
> > > I suggest not to use O-bit in the VXLAN-GPE header and release it into the Reserved field.  I don't see the apparent benefit of using the flag, as the VXLA-GPE uses the fixed size header and the header cannot carry OAM data in it. The only role the VXLAN-GPE header must perform, in my opinion, is to unambiguously identify the payload type that immediately follows the header as OAM (demultiplexing OAM protocols may be done in OAM Header shim).
> > > Much appreciate your consideration.
> > >
> >
> > Best,
> >
> > —
> > Carlos Pignataro, carlos@cisco.com<mailto:carlos@cisco.com>
> >
> > “Sometimes I use big words that I do not fully understand, to make myself sound more photosynthesis."
> >
> > > Regards,
> > > Greg
> > > _______________________________________________
> > > nvo3 mailing list
> > > nvo3@ietf.org<mailto:nvo3@ietf.org>
> > > https://secure-web.cisco.com/1j-jr64yh2D8yO92ibcqaN-H98ZCP3lQdHmsYPsH8lkjsa4WlJ4kg3W4HL8qT25rCVittT5bFQox__OnSknV5w_wW69FvUhXkxqxKhi9MCiy5oH-JTucXN_7FK85q7jD-qEwRM5IXY68_Vfeb_XI2rKxyzwVsG_06KTGF09Bw9oHAOXUNFcdCw_oon_eruUhRPtdwLc9UQNz2ThYP8ysf2pr64VU04VjMKmGwqYvzzyAsLTEbHrs7GVCqphT58T0st78_968rM5MKFLk7EiWBj7gZPm_rDeBf63gUtxkcj-w8XybJiiO2tcFaeoAL_8m-ZT5L9-1VK4wZkHmR5C_Ldg/https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fnvo3
> >
>
> _______________________________________________
> nvo3 mailing list
> nvo3@ietf.org<mailto:nvo3@ietf.org>
> https://secure-web.cisco.com/1j-jr64yh2D8yO92ibcqaN-H98ZCP3lQdHmsYPsH8lkjsa4WlJ4kg3W4HL8qT25rCVittT5bFQox__OnSknV5w_wW69FvUhXkxqxKhi9MCiy5oH-JTucXN_7FK85q7jD-qEwRM5IXY68_Vfeb_XI2rKxyzwVsG_06KTGF09Bw9oHAOXUNFcdCw_oon_eruUhRPtdwLc9UQNz2ThYP8ysf2pr64VU04VjMKmGwqYvzzyAsLTEbHrs7GVCqphT58T0st78_968rM5MKFLk7EiWBj7gZPm_rDeBf63gUtxkcj-w8XybJiiO2tcFaeoAL_8m-ZT5L9-1VK4wZkHmR5C_Ldg/https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fnvo3