Re: [ippm] draft-zhang-ippm-ioam-mp

Thomas.Graf@swisscom.com Tue, 19 March 2024 08:25 UTC

Return-Path: <Thomas.Graf@swisscom.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2522C14F61B for <ippm@ietfa.amsl.com>; Tue, 19 Mar 2024 01:25:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=swisscom.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z_nw-uT2wrZy for <ippm@ietfa.amsl.com>; Tue, 19 Mar 2024 01:25:28 -0700 (PDT)
Received: from mail.swisscom.com (mailout120.swisscom.com [138.188.166.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5748C14F686 for <ippm@ietf.org>; Tue, 19 Mar 2024 01:25:26 -0700 (PDT)
Received: by mail.swisscom.com; Tue, 19 Mar 2024 09:25:16 +0100
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=swisscom.com; s=iscm; t=1710836716; bh=MCKmn53fkRCvqBe7i+kF7VczC/TJgplIxS098FYX2EI=; h=From:To:CC:Subject:Date:References:In-Reply-To; b=LVw3Sr2Y1nUja/kVXPj3boGa2b31RSpA9706J4M4vUb5hcdGjMLj82ByX/s/WbckX JOXHAG3zWvrSnF5I5HGU0oY563CsvtrYNvztPVtYJQ82E/SGMyPWvY3QxC2T1Izyv6 p8z/lEZNfm2PXae52ca7Y6i28l3dS0Jvfx7OlSDrN8wdafAakmEQFR4TLutAS0FchF 7LTlpo8vUW0rTlZ9kzjAZ00MKB7snIjBnby8RLl3LNgkQc2rZto+usIAoBPZOabOaC kJuOH083496lHcipWfPZJxngzoxcnAeQppI75CV/I5MQSCbJw7X4xmk53u6cA+WHB8 3MJ6uBYopWgRg==
MIME-Version: 1.0
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="----=_Part_2150795_179059310.1710836715705"
X-Mailer: Totemo_TrustMail_(Notification)
From: Thomas.Graf@swisscom.com
To: zhangli344@huawei.com, ippm@ietf.org
Thread-Topic: draft-zhang-ippm-ioam-mp
Thread-Index: Adp5vm1Ro16mgpsWS2iRwMyUbh+Z/AAEljxg
Date: Tue, 19 Mar 2024 08:25:12 +0000
Message-ID: <4a367f0a702a4427931b15ba65a63b24@swisscom.com>
References: <2869a797bbfe483faa1d04174cf0161d@huawei.com>
In-Reply-To: <2869a797bbfe483faa1d04174cf0161d@huawei.com>
Accept-Language: en-US, de-CH
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_ActionId=7df47256-e321-4a31-967b-d9e50acf6ff5; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_ContentBits=0; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Enabled=true; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Method=Standard; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_Name=C2 Internal; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_SetDate=2024-03-19T07:40:54Z; MSIP_Label_2e1fccfb-80ca-4fe1-a574-1516544edb53_SiteId=364e5b87-c1c7-420d-9bee-c35d19b557a1;
x-originating-ip: [138.188.161.184]
X-CFilter-Loop: Reflected
X-Trustmail: processed
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/dHy_hNZbd67VN2RfK2vFUGg-ylo>
Subject: Re: [ippm] draft-zhang-ippm-ioam-mp
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Mar 2024 08:25:33 -0000

Dear Li,


Thanks a lot for the feedback. I do understand that your objective is to apply this feature only for Hybrid Type II active probing as described in RFC 7799. However I do not concur with your security assessment described in section 5 (https://datatracker.ietf.org/doc/html/draft-zhang-ippm-ioam-mp-00#section-5). You did not describe what measurements should be taken to prevent that this option is being abused.



To come back to my original statement. I quote


https://datatracker.ietf.org/doc/html/rfc9232#section-2.4
It is worth noting that a network telemetry system should not be intrusive to normal network operations by avoiding the pitfall of the "observer effect". That is, it should not change the network behavior and affect the forwarding performance.

Network Telemetry protocols are designed so that they are passive measuring networks with the least amount interference with the connectivity service. Hybrid Type I and II  however augment the packet with additional tracing information. Therefore we the IETF community need to pay close attention that such protocols are not going one step further and influencing the forwarding of the in-flight (customer) packets. There I see that your proposed crosses a red line and I object in the interest of Network Telemetry not being intrusive which is key for me as network operator since we receive push backs from colleagues in network operation or in software development on network vendor side when introducing Network Telemetry features in the forwarding and in the control plane of networks. Introducing such features would make it even harder to get adoption in the industry.

As Greg and I described. With flow label in IPv6 or entropy label in MPLS we have mechanism in the data plane already which can be applied in probing application to steer the traffic in multipathing scenarios. However I do understand the challenges there.

I am available this week at IETF and would like to take the opportunity to share with you some operator network analytical use cases and put your work in perspective and might be able to suggest some alternative options.

Best wishes
Thomas

From: zhangli (CE) <zhangli344@huawei.com>
Sent: Tuesday, March 19, 2024 3:33 PM
To: Graf Thomas, INI-NET-VNC-HCS <Thomas.Graf@swisscom.com>; ippm@ietf.org
Cc: Tianran Zhou <zhoutianran@huawei.com>
Subject: RE: draft-zhang-ippm-ioam-mp


Be aware: This is an external email.


Hi Thomas,

Thanks for your kindly comments.
Yes, your understanding is correct, but this extended flag only takes effect when using IOAM to do active measurements, so from my point of view, this extension will not impact normal In-suit OAM. And yes, this extension can also be used with STAMP.
I have a look at RFC 643 roughly, from my understanding, the usage of flow label is to enable efficient IPv6 flow classification, and make the load balance performance better. Our object is to collect every path’s information, so there's not much correlation between them.

Best Regards
Li

发件人: ippm <ippm-bounces@ietf.org<mailto:ippm-bounces@ietf.org>> 代表 Thomas.Graf@swisscom.com<mailto:Thomas.Graf@swisscom.com>
发送时间: 2024年3月19日 9:05
收件人: ippm@ietf.org<mailto:ippm@ietf.org>
主题: [ippm] draft-zhang-ippm-ioam-mp

Dear Li,

Thanks a lot for your presentation at IPPM.

If I understood correctly, the document proposes to clone a packet based on an IOAM flag. As a network operator I like to raise my concern. Network Telemetry protocols shall not be intrusive in the packet forwarding. I believe the objective of this work should be part of the probing protocol like STAMP or data plane protocol like IPv6. In IPv6 the flow label is defined in RFC 6437 to influence multipathing.

Best wishes
Thomas