Re: [ippm] Vote at IPPM session

Tianran Zhou <zhoutianran@huawei.com> Wed, 19 April 2017 02:11 UTC

Return-Path: <zhoutianran@huawei.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED38F126C2F; Tue, 18 Apr 2017 19:11:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q74XVNzW8J8V; Tue, 18 Apr 2017 19:11:15 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D66411200DF; Tue, 18 Apr 2017 19:11:14 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml705-cah.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DLH54993; Wed, 19 Apr 2017 02:11:12 +0000 (GMT)
Received: from NKGEML414-HUB.china.huawei.com (10.98.56.75) by lhreml705-cah.china.huawei.com (10.201.108.46) with Microsoft SMTP Server (TLS) id 14.3.301.0; Wed, 19 Apr 2017 03:11:12 +0100
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by nkgeml414-hub.china.huawei.com ([10.98.56.75]) with mapi id 14.03.0235.001; Wed, 19 Apr 2017 10:11:00 +0800
From: Tianran Zhou <zhoutianran@huawei.com>
To: "MORTON, ALFRED C (AL)" <acmorton@att.com>, "Brian Trammell (IETF)" <ietf@trammell.ch>, "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
CC: IPPM Chairs <ippm-chairs@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: [ippm] Vote at IPPM session
Thread-Index: AQHSp+AQqwOfU4bhxE6OT40sqe9xy6Gp8KmAgAAD3ACAAAfTAIAAIx6AgAA2hgCAAPdoAIAAaFWAgAAcNgCAABufgIACkoWAgAt5d4CABF/dAIADEXMAgARQ/ICABTbxAIAAKoCAgAAKzQCAAOa8MA==
Date: Wed, 19 Apr 2017 02:10:59 +0000
Message-ID: <BBA82579FD347748BEADC4C445EA0F21A233CD00@NKGEML515-MBX.china.huawei.com>
References: <CA+RyBmXAyOVZy2DncvC9Bdkmt2P+OXhV49sFgCqXf=1Of3EWkw@mail.gmail.com> <830D269B-62A1-4782-8AFE-C2910F908BFF@trammell.ch> <CA+RyBmUtVv6fJVLrUxwLiHg9ktvDCkuV0s+KWyv4ygEb50rMOw@mail.gmail.com> <01fa01d2a7e9$1c65d520$55317f60$@olddog.co.uk> <8168bd84-88f4-c40b-7150-844b463f6612@trammell.ch> <CAKKJt-ca7VgePkstLE=RLTh506o44m3hiZ_ay88hOS1egz20KA@mail.gmail.com> <7e592d5c42d44db594dfdfbc76233e29@XCH-RCD-008.cisco.com> <3E70CF9A-5A09-419B-B330-F9B854E01539@trammell.ch> <01c801d2a8d3$eb6d2450$c2476cf0$@olddog.co.uk> <4D7F4AD313D3FC43A053B309F97543CF25F3D4C0@njmtexg5.research.att.com> <e60a1ae521054eb3b9e1352d5918c6b2@XCH-RCD-008.cisco.com> <2BCD950B-DEBF-4FCD-92DD-89BE50270006@encrypted.net> <aa0dea09d3e44260a2ed306836c68ccb@XCH-RCD-008.cisco.com> <45679B2A-EE96-4980-BAED-B39994C73CFE@encrypted.net> <070501d2b5c8$dc264d30$9472e790$@olddog.co.uk> <58b68d6d47614281846807b6353b46f3@XCH-RCD-008.cisco.com> <38C60635-D7B8-4AA9-843D-ABBA65AC3D62@trammell.ch> <4D7F4AD313D3FC43A053B309F97543CF25F71AE7@njmtexg5.research.att.com>
In-Reply-To: <4D7F4AD313D3FC43A053B309F97543CF25F71AE7@njmtexg5.research.att.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.111.156.116]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A0B0206.58F6C741.004C, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 98a08d21ef769b941ef7cde85a91f180
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/TWC6b_6pMCKuKaPfic_dQ3dObwA>
Subject: Re: [ippm] Vote at IPPM session
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Apr 2017 02:11:19 -0000

Hi Al,

I am not clear about some of your suggestions.
Please see inline.

Thanks,
Tianran

> -----Original Message-----
> From: ippm [mailto:ippm-bounces@ietf.org] On Behalf Of MORTON, ALFRED C
> (AL)
> Sent: Wednesday, April 19, 2017 4:04 AM
> To: Brian Trammell (IETF); Frank Brockners (fbrockne)
> Cc: IPPM Chairs; ippm@ietf.org
> Subject: Re: [ippm] Vote at IPPM session
> 
> All,
> one alternative to consider, below.
> Al
> 
> > -----Original Message-----
> > From: Brian Trammell (IETF) [mailto:ietf@trammell.ch]
> > Sent: Tuesday, April 18, 2017 3:26 PM
> > To: Frank Brockners (fbrockne)
> > Cc: adrian@olddog.co.uk; MORTON, ALFRED C (AL); IPPM Chairs;
> > ippm@ietf.org; Sarah B
> > Subject: Re: [ippm] Vote at IPPM session
> >
> > hi Frank, all,
> >
> > Speaking as an individual.
> >
> > First, thanks for the scope section... this is all much more concrete
> > now.
> >
> > So, as I understand it, iOAM is designed first and foremost to be a
> > single-network (in the sense of "coherent administrative domain")
> > protocol data model with a binding to a variety of "carrier" protocols
> > (the draft speaks of "transports" in the RTG-area meaning of the term,
> > not the TSV-area one, so let's overload "carrier" here instead), some
> > of which are also explicitly single-network, some of which less so...
> >
> > I tend to share the concerns of those who've expressed discomfort with
> > the "warning label approach" to ensuring that iOAM data stays single-
> > network, but I'm not sure it's a problem *for the data model*. I don't
> > necessarily read this "MUST NOT leave the network" as an additional
> > responsibility of operators, but rather on the designers of carrier
> > protocols for iOAM data. Now, some of the carrier protocols (e.g. IPv6
> > extension headers) provide no such protection or support for providing
> > that protection, so in that case it falls to the implementor of the
> > iOAM solution to provide it... but this is rather a matter to be
> > handled on a per carrier protocol basis, isn't it?
> >
> > Cheers,
> > Brian
> [ACM]
> 
> IOM, there is a general message to convey for all future protocol development.
> Something like "sufficient provisions should be made to restrict the iOAM
> traffic to the intended domain."
> 
> We could provide guidance to interconnecting network operators, as well,
> effectively allowing them to discard traffic containing unexpected iOAM
> data. 

"Discard" the traffic? This might be available for active measurement with additional testing packets. But this iOAM is in-situ within the data packet. The discard will harm the user traffic. Or bypassing the iOAM instruction/header be better?

>This would be applicable to non-iOAM network operators, but might
> be more important for interconnecting operators who have established their
> own iOAM domain.
> 
> This is similar to the approach we used for BMWG test traffic:
> there are v4 and v6 address spaces dedicated for isolated test environments,
> and any packet with testing addresses observed on the Internet may be
> discarded.
> 
> regards,
> Al
> 
> >
> >
> >
> > > On 18 Apr 2017, at 18:53, Frank Brockners (fbrockne)
> > <fbrockne@cisco.com> wrote:
> > >
> > > Hi Adrian,
> > >
> > > thanks - please see inline below...
> > >
> > > -----Original Message-----
> > > From: Adrian Farrel [mailto:adrian@olddog.co.uk]
> > > Sent: Samstag, 15. April 2017 11:16
> > > To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> > > Cc: 'ALFRED MORTON' <acmorton@att.com>; 'Brian Trammell (IETF)'
> > <ietf@trammell.ch>; 'IPPM Chairs' <ippm-chairs@ietf.org>;
> > ippm@ietf.org; 'Sarah B' <sbanks@encrypted.net>
> > > Subject: RE: [ippm] Vote at IPPM session
> > >
> > > Hi Frank, all,
> > >
> > > Thanks for proposing some text.
> > >
> > >> How about: "The operator of such a domain MUST put provisions in
> > place
> > >> to ensure that in-situ OAM data stays within the specific domain
> > >> only (i.e., does
> > > not
> > >> leak beyond the edge) using for example packet filtering methods.
> > >> The operator SHOULD consider potential operational impact of IOAM
> > >> to mechanisms such as ECMP processing (e.g. load-balancing schemes
> > >> based on packet length could be impacted by the increased packet
> > >> size due
> > to
> > >> IOAM), path MTU (i.e. ensure that the MTU of all links within a
> > domain
> > >> is sufficiently large to support the
> > > increased
> > >> packet size due to IOAM) and ICMP message handling (i.e. in case of
> > >> a native
> > > IPv6
> > >> transport, IOAM support for ICMPv6 Echo Request/Reply could desired
> > >> which would translate into ICMPv6 extensions to enable IOAM data
> > >> fields to be copied from an Echo Request message to an Echo Reply
> > message)."
> > >
> > > Like Sarah, I think this is a start.
> > >
> > > I remain disappointed that it is the operators' responsibility to
> > ensure various things, and not a feature of the protocol or
> > implementation.
> > >
> > > But perhaps this text serves as a warning to the operators about
> > > using
> > implementations of iOAM and so will suffice.
> > >
> > > ...FB: The current document is just the starting point. Let's hope
> > that the WG can improve the current approach further and/or suggest
> > improved text.
> > >
> > > I think the use of 2119 capitalisation is meaningless in this
> > paragraph, and that the "SHOULD" in the second sentence should in any
> > case be a "must".
> > >
> > > ...FB: Thanks. Will change/correct in the next revision (along with
> > > a
> > set of typos that I introduced when crafting the section)
> > >
> > > Thanks, Frank
> > >
> > > Thanks,
> > > Adrian
> 
> _______________________________________________
> ippm mailing list
> ippm@ietf.org
> https://www.ietf.org/mailman/listinfo/ippm