Re: [ippm] Call for adoption: draft-zhou-ippm-ioam-yang

"Spiegel, Mickey" <mickey.spiegel@intel.com> Fri, 20 November 2020 19:36 UTC

Return-Path: <mickey.spiegel@intel.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 636A43A0140; Fri, 20 Nov 2020 11:36:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Level:
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=intel.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oHNZ19-iFtzY; Fri, 20 Nov 2020 11:36:02 -0800 (PST)
Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A16B3A08B0; Fri, 20 Nov 2020 11:36:01 -0800 (PST)
IronPort-SDR: hXuxNRn7JBXshwX2VdZApdzHbuBnuyjzmvseSUxSELy6QD2UbvbPfAg8qEg6yst5dD5+yM7/SO swZUa6KIepVQ==
X-IronPort-AV: E=McAfee;i="6000,8403,9811"; a="168960797"
X-IronPort-AV: E=Sophos;i="5.78,357,1599548400"; d="scan'208,217";a="168960797"
X-Amp-Result: SKIPPED(no attachment in message)
X-Amp-File-Uploaded: False
Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2020 11:36:01 -0800
IronPort-SDR: MBNEK9fe0wC9DvRcUqu4zvlIEoSM6rfcxqPUjM2m6dSXLfjkTd1RGi/cVO0p6mTVLZ5Bo2iYG2 08QnIqUxu9fQ==
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.78,357,1599548400"; d="scan'208,217";a="360563549"
Received: from orsmsx605.amr.corp.intel.com ([10.22.229.18]) by fmsmga004.fm.intel.com with ESMTP; 20 Nov 2020 11:36:01 -0800
Received: from orsmsx611.amr.corp.intel.com (10.22.229.24) by ORSMSX605.amr.corp.intel.com (10.22.229.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Fri, 20 Nov 2020 11:36:00 -0800
Received: from orsmsx606.amr.corp.intel.com (10.22.229.19) by ORSMSX611.amr.corp.intel.com (10.22.229.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Fri, 20 Nov 2020 11:36:00 -0800
Received: from ORSEDG602.ED.cps.intel.com (10.7.248.7) by orsmsx606.amr.corp.intel.com (10.22.229.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5 via Frontend Transport; Fri, 20 Nov 2020 11:36:00 -0800
Received: from NAM04-SN1-obe.outbound.protection.outlook.com (104.47.44.57) by edgegateway.intel.com (134.134.137.103) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Fri, 20 Nov 2020 11:35:59 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mZXlLz3YMQedCkx2ZQ/CFfO16RUdhKQ2vTwFRGvkEIi9S0aC9rMLVynWaIJ+gwoX+atlhcey2YrczmWD6WD3RxVW9PFXJvN64Gkerz/XWvuLpw4qWNs29pAw97Z7SNXJLT3dloSn5Yvk151RHaR6Qt/m89YaimzLyvNlpyhVuOTVDLXqD1bke7eHJ8BPzc2n2K2/6uulYrd9Qa9iFjTuwAM1PY581ZCGlFHcyHTchufgA9qZ5lOmxv8CNNtWnmDYJ7Cv/0df73BQM4+E24PWFLeUIk6ccWEiM7y56wC4ovq0nZwxS8C1sXstdHWu6A51n/9nbJHs8ypFySZtzjQ/Pw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QE2jsdvsPOZYy4h0u4mdt+fpjsNJlc6fhz43m+uNjPA=; b=LKOcnpZ8f4SGWc+SJLjKWFzflNBU+LnTRk5Mo6lhVeQnR0a/TarUvuyNbZMUibaux3AXdmKt7ZOpV16r6OQhrTyM1xT6EzVUe/JooDAuHGxfgKQvrxFNGuBm90lMnY3jrnNGPRP1MSRHP9BDwsJxgV70qDOYqqC5PGV004kJrKp4hAKNtgATR5R7Yv+kkm4dB1dgDyV4WkIwl9dM0Fmo6ZBPuRPVcdqD84suYRWkJFvrSElFBTf2hjHBItLrAY0pmmztLmO/wz2DfO3NjKmMjJVm8OtWx7vkIu3Wm1qG9HN6gz24GMUOp7mO3zCTxku073bfeY0YXOufHIRqyMPN3w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QE2jsdvsPOZYy4h0u4mdt+fpjsNJlc6fhz43m+uNjPA=; b=qXwio0bckM/StaUqInVYdg4y/2sjs4O4CKA0Zq8q5tYviz/0Lprdt/kQ8eOQncwjPJRCw0lXoc730gnXZHwXJJkidwPFHg4hWfFdg3QjVIEYQ883xozYFqXvafimmr0cKCj/4BETCaQG0HdUX69jXt5gZ4SKGa/5LAme1DP3XwM=
Received: from MW3PR11MB4617.namprd11.prod.outlook.com (2603:10b6:303:59::24) by CO1PR11MB5201.namprd11.prod.outlook.com (2603:10b6:303:95::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3589.20; Fri, 20 Nov 2020 19:35:58 +0000
Received: from MW3PR11MB4617.namprd11.prod.outlook.com ([fe80::c56:f507:ac77:7a7a]) by MW3PR11MB4617.namprd11.prod.outlook.com ([fe80::c56:f507:ac77:7a7a%9]) with mapi id 15.20.3589.021; Fri, 20 Nov 2020 19:35:58 +0000
From: "Spiegel, Mickey" <mickey.spiegel@intel.com>
To: Tianran Zhou <zhoutianran@huawei.com>, Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org>, "IETF IPPM WG (ippm@ietf.org)" <ippm@ietf.org>
CC: IPPM Chairs <ippm-chairs@ietf.org>
Thread-Topic: [ippm] Call for adoption: draft-zhou-ippm-ioam-yang
Thread-Index: AQHWruxIFRtBPYJB7k21Qt16InOcLanQDmqAgADaNwCAABwpAA==
Date: Fri, 20 Nov 2020 19:35:58 +0000
Message-ID: <A12F405A-F42A-4984-8377-776DA61F80F0@intel.com>
References: <43DADFB5-FE8A-49A1-BF39-1ECC10594211@apple.com> <3754265B-BBB0-4510-90FF-247DD4807BA7@intel.com> <4e33e02d27dd4a2b8f5816d68f9b819b@huawei.com>
In-Reply-To: <4e33e02d27dd4a2b8f5816d68f9b819b@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.43.20110804
authentication-results: huawei.com; dkim=none (message not signed) header.d=none;huawei.com; dmarc=none action=none header.from=intel.com;
x-originating-ip: [73.202.53.195]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: db7bdb45-deda-4597-5bff-08d88d8b8177
x-ms-traffictypediagnostic: CO1PR11MB5201:
x-microsoft-antispam-prvs: <CO1PR11MB52015DE55D6A9673380A057D90FF0@CO1PR11MB5201.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: wf16IpMpwphCMuJWb1ei/wHnizwKSU5dMimYNzol+PGMFtBb2psbkGOLPpInqDvxWIrkXa6y5XATS4tD1dNqhVfXraPd64dWUcKJaNTMKtZbfWfP4YVJyZAO6jKQwEpO3EzIj2UGH7wu+DjpZWJjbKXdOR0AlmOrGCivF5vgJ2r6fOWjhCjx7xVQKw1Fr8su56CT+jP4Z8j8eUeof4UVapD1KpIwcyOezg4wXs40TCPwiHPpX3tsWdTdxzTFqdALzMOnylJgpdV9LslmBIVV8ix/7fVbo0EnZ6ogjp/CWlziBH0uht5lmSwLmgaHrbpdBgythLYH3vdr8bfFvdl+LQZZ75QOIlskzPkMecmZqcT5ivnaiFtI7UV6H0CfXCL+zS0QNMxF+yZc0yvDycnVNQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW3PR11MB4617.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(136003)(396003)(346002)(39860400002)(366004)(83380400001)(6512007)(478600001)(71200400001)(4326008)(86362001)(166002)(2616005)(53546011)(316002)(36756003)(110136005)(91956017)(966005)(66476007)(66556008)(64756008)(66946007)(66446008)(33656002)(186003)(5660300002)(26005)(6506007)(8676002)(8936002)(76116006)(2906002)(6486002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_A12F405AF42A49848377776DA61F80F0intelcom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW3PR11MB4617.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: db7bdb45-deda-4597-5bff-08d88d8b8177
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Nov 2020 19:35:58.4311 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: bfSigRGOJdgY420TnEsxkA9DFw45+uEerWzriPZzl/Y4aiv4Jz1kFz8tLb86r4cGiQHajk+5CL04y9+X5+gdilpw3MtJqTRiGxvxfXbt5MM=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR11MB5201
X-OriginatorOrg: intel.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/nxUrPs6oESjgg3-QvREvwKf7dP8>
Subject: Re: [ippm] Call for adoption: draft-zhou-ippm-ioam-yang
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2020 19:36:06 -0000

Tianran,

Thanks for your replies.
Please see my responses in line as [MS].

Mickey

From: Tianran Zhou <zhoutianran@huawei.com>
Date: Friday, November 20, 2020 at 1:55 AM
To: "Spiegel, Mickey" <mickey.spiegel@intel.com>, Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org>, "IETF IPPM WG (ippm@ietf.org)" <ippm@ietf.org>
Cc: IPPM Chairs <ippm-chairs@ietf.org>
Subject: RE: [ippm] Call for adoption: draft-zhou-ippm-ioam-yang

Hi Mickey,

Thanks for your comments.
Please see in line.

Best,
Tianran
From: ippm [mailto:ippm-bounces@ietf.org] On Behalf Of Spiegel, Mickey
Sent: Friday, November 20, 2020 12:54 PM
To: Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org>; IETF IPPM WG (ippm@ietf.org) <ippm@ietf.org>
Cc: IPPM Chairs <ippm-chairs@ietf.org>
Subject: Re: [ippm] Call for adoption: draft-zhou-ippm-ioam-yang

I believe that adoption of draft-zhou-ippm-ioam-yang would be premature. My concerns are in three areas:


  1.  Scope:
The proposed YANG model only addresses configuration, i.e. whatever is required to trigger encapsulation and decapsulation of IOAM data in flows.
There are other areas to which the scope could be expanded, where a YANG model would prove very useful:
     *   Typically, the IOAM data is exported to an offline monitoring system that analyzes the IOAM data from the nodes in the IOAM domain. By design, draft-ietf-ippm-ioam-data leaves many details open such as units or timestamp format. While this aids greatly in the ability of different hardware implementations to support IOAM, this makes it difficult for offline monitoring systems to interpret the data, unless mechanisms are defined for the offline monitoring systems to discover these details from individual nodes. IMO, a YANG model is the right way to define such a mechanism.
<ZTR> We can augment the system Capabilities model and provides the IOAM capability attributes. This could be and usually is a separate data model. It would be good if you can provide a list of these data, and we can cooperate on a new draft.


     *   Related to the previous item, there is currently an active thread about discovery of IOAM capabilities supported by nodes in the IOAM domain, in the context of draft-xiao-ippm-ioam-conf-state.
<ZTR> The same as above.


     *   Besides the flow-level configuration, draft-ietf-ippm-ioam-data also defines the concept of namespaces. Namespaces add context to IOAM-Option-Types and associated IOAM-Data-Fields. Namespaces may provide additional context for IOAM Data Fields such as units or timestamp format, and some IOAM Data Fields are namespace specific. The YANG model could be extended to support configuration of this namespace-related context.
<ZTR> Yes, this could also be in the ioam capability model.
[MS] Whether this belongs in an IOAM capability model or with the rest of the configuration is not so clear to me.
Some of this is configuration.


  1.  The proposed YANG model relies on the ACL YANG model (RFC 8519) to specify flows, which is very much a good thing. However, the proposed method to link the IOAM YANG model and the ACL YANG model is far from optimal:
     *   In draft-zhou-ippm-ioam-yang-08, within each profile, there is a single reference to an ACL through “leaf acl-name”. Each referenced ACL contains an ordered list of ACEs. Each ACE contains a forwarding action (accept, drop, or reject) and/or a log action (currently only log-syslog and log-none), in addition to the match criteria and statistics.
If the only purposes in defining these ACEs is for IOAM, then presumably forwarding action "accept" would have to be used, though this is not explicitly stated in the current draft.
<ZTR> We can state this in the next version.

     *   There are cases where it is desirable to use different profiles for different subsets of traffic.
For example, traffic matching certain IP source and destination address prefixes use a general profile with trace types trace-hop-lim-node-id, trace-if-id, trace-timestamp-seconds, trace-timestamp-nanoseconds, and trace-queue-depth.
Traffic matching those same IP source and destination address prefixes and also using certain L4 ports (e.g. UDP port 4791 for RoCEv2) use a different profile that includes trace types for tx-bytes and interface-speed (see draft-gafni-ippm-ioam-additional-data-fields-00, draft-pan-tsvwg-hpccplus-02).
Using the current proposal in draft-zhou-ippm-ioam-yang-08, two different ACLs would have to be defined corresponding to the two different profiles.
How would the implementation know which ACE in which ACL to use, if both ACEs match?
The ordered list only extends within each ACL.
<ZTR> So we can associate the ACE to each profile.

     *   A better approach is to flip the reference by augmenting ACE actions with choices such as ioam-encapsulate and associated leaf ioam-profile-name, so that each ACE can reference a different IOAM profile. This changes the granularity of the reference from ACLs to ACEs. For the case in the bullet immediately above this, there would be one ACL with two ACEs. The first ACE would reference the specific profile with tx-bytes and interface-speed. The second ACE would reference the general profile. The order of the ACEs within the ACL clarifies that a match on the first ACE wins.
<ZTR> I think this is a good idea. Thx. We can do this in the next version.
[MS] Thanks for considering this. I am looking forward to seeing your next version.


  1.  There have been lots of IOAM discussions about preventing IOAM data from leaking outside of the IOAM domain. Depending on the encapsulation that is used and the deployment scenarios, there may be cases where this relies on configuration of the IOAM domain boundaries.
In draft-zhou-ippm-ioam-yang-08, this requires configuration of both an IOAM profile and an ACL.
The IOAM profile specifies node-action "action-decapsulate" and references the ACL by name.
The ACL specifies one or more ACEs, with traffic matching any of those ACEs taking the node-action specified in the IOAM profile.
While this approach is flexible, it is somewhat unwieldy. This approach significantly increases the chances of operational errors, where misconfiguration results in leaking of IOAM data outside of the IOAM domain.
A simpler approach would be to list interfaces at the edges of the IOAM domain.
<ZTR> I do not understand this point. Do you mean, for the egress node, we use a wide filter(interface) for the decap action? What if one packet without IOAM encapsulation hit this ACL? I am afraid this will cause a forwarding error.
[MS] The proposal is to allow the decapsulate action to be driven by a list of egress interfaces instead of ACLs.
Packets that egress out such interfaces that did not have any IOAM headers would have nothing to decapsulate.

[MS] I do not follow your concern about a forwarding error.
In the current draft-zhou-ippm-ioam-yang-08, when a profile has node-action "action-decapsulate", any packets matching the referenced ACL will decapsulate any IOAM headers with a matching namespace. There are no augments to the ACL match criteria to condition on presence of IOAM headers. This implies that packets without IOAM headers could match the ACL. I do not think such augments would be necessary. If the packet did not have any IOAM headers then there would be nothing to decapsulate, no harm done.

[MS] Another point to note is that the decapsulate action should be driven by an egress filter, whether that be a list of egress interfaces as I have proposed, or an egress ACL as supported by the current draft-zhou-ippm-ioam-yang-08.
My preference is to use ingress ACLs to drive IOAM encapsulation. If an ingress ACL says to do IOAM encapsulation and an egress filter says to do IOAM decapsulation, IMO that is normal behavior that must be supported. For example, communication between two hosts attached to the same ToR switch, where the ToR switch typically acts as an IOAM encapsulating node for traffic transmitted by the hosts, and as an IOAM decapsulating node for traffic received by the hosts. In this case, the packet would be transmitted without any IOAM headers due to decapsulation. This can be viewed logically as encapsulation followed by decapsulation. Whether the device actually carried out the encapsulation and decapsulation internally does not matter, as that is not visible externally.
If egress ACLs are used to drive IOAM encapsulation, then it would be a configuration error to define ACEs that say to do IOAM encapsulation on a packet that also matches filters for IOAM decapsulation, for the same namespace. This scenario could occur regardless of whether decapsulation is driven by a list of egress interfaces, or by egress ACL filters.

Besides the three areas of concern above, there are smaller issues that should be discussed such as:

  *   Why does node-action "action-transit" need to be configured on a per flow basis?
Shouldn’t nodes receiving IOAM just follow the instructions in the IOAM headers, unless they act as decapsulating nodes?
<ZTR> Here I do not remember. It takes for a long time. It seems you are right. Could other coauthors helps on this?
[MS] I also encourage others to reply with their opinions on this issue.

Mickey


From: ippm <ippm-bounces@ietf.org<mailto:ippm-bounces@ietf.org>> on behalf of Tommy Pauly <tpauly=40apple.com@dmarc.ietf.org<mailto:tpauly=40apple.com@dmarc.ietf.org>>
Date: Friday, October 30, 2020 at 11:41 AM
To: "IETF IPPM WG (ippm@ietf.org<mailto:ippm@ietf.org>)" <ippm@ietf.org<mailto:ippm@ietf.org>>
Cc: IPPM Chairs <ippm-chairs@ietf.org<mailto:ippm-chairs@ietf.org>>
Subject: [ippm] Call for adoption: draft-zhou-ippm-ioam-yang

Hello IPPM,

This email starts a Working Group call for adoption for draft-zhou-ippm-ioam-yang. Now that our IOAM documents are mature and progressing, the chairs believe it is time to consider the YANG work officially.

The document can be found here:

https://tools.ietf.org/html/draft-zhou-ippm-ioam-yang-08

Please provide your feedback on these document, and state whether or not you believe the IPPM WG should adopt this work by replying to this email. Please provide your feedback by the start of the IETF 109 meeting week, on Monday, November 16.

Best,
Tommy & Ian