Re: [ippm] Progressing draft-ietf-ippm-ioam-conf-state

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Fri, 17 December 2021 09:45 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69BF53A19BC for <ippm@ietfa.amsl.com>; Fri, 17 Dec 2021 01:45:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.596
X-Spam-Level:
X-Spam-Status: No, score=-9.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=QtfJ67iz; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=yEy+uXuA
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FPUgs7q5STbc for <ippm@ietfa.amsl.com>; Fri, 17 Dec 2021 01:45:34 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 06A903A19B8 for <ippm@ietf.org>; Fri, 17 Dec 2021 01:45:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=10842; q=dns/txt; s=iport; t=1639734334; x=1640943934; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=llj5u5B0uXqm6L2HCbSpm8eJjYCooP7Y4Ch9rCI8/dE=; b=QtfJ67izYmS+DLzEc82ZVZSrt5/1qNuQGhIOqxJaEJlbJICruXZ6UW22 X0MjKQ/ScAy4ewwpXK+xR9Kz7IVlzCmHi/F7qrdQowrIGDwiBoJz3g3HE dHwry2EAJ+Gj7bsjQwQve8452D8dYZgkPweoOCxgnojm7pjvvv19uMEPD 4=;
IronPort-PHdr: A9a23:c3l9/hQHeAx22wlOalEmgH+87tpso7vLVj580XJvo75Nc6H2+ZPkMQSf4Ph2l1bGUM3d7O4MkOvZta3sGAliqZaMuXwPatpAAhkCj8hFkwkpGsXQD0r9IbbjZDA7G8IXUlhj8jm7PEFZFdy4aUfVpyi57CUZHVP0Mg8mTtk=
IronPort-Data: A9a23:Dfp0366OPuOzjf2RWQal5QxRtAPFchMFZxGqfqrLsTDasY5as4F+vjdLC2nTbPeOZWf9e9FyYNmx8UwOvZSDyNZnSQBlqyk1Zn8b8sCt6fZ1gavT04J+FiBIJa5ex512huLocYZkHhcwmj/3auK49CMlivnRLlbBILes1h5ZFFcMpBgJ0XqPq8Zh6mJZqYDR7zGl4LsekOWHULOR4AOYB0pPg061RLyDi9yp0N8QlgRWifmmJzYynVFNZH4UDfnZw3cV3uBp8uCGq+brlNlV/0vD9BsrT9iiiLu+IgsBQ6XZOk6FjX8+t6qK20cZ4HdtlPdgcqNANS+7iB3R9zx14NtHr5u7SgEkFqbNg+8aFRJfFkmSOIUXp+KXfCPh4Jz7I0ruNiGEL+9VJF0uNJAc685+GXlK+LoTLzVlRhGbn+eewb+nRK9rnMtLBNnqNYRZv3BmlxnLEftgSpfGBa7MjeK0dh9YattmB/3SYY8SbiBiKUSGaBxUMVBRA5U79NpET0LXK1VwwG95b4Jti4QL8DFM7Q==
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BxAAAiW7xh/5BdJa1aHQEBAQEJARIBBQUBQIFFCAELAYFRVQd4WjcxhEeDRwOEWWCFDoMCA4ETjyCKaoEugSUDVAgDAQEBDQEBKg0KBAEBhQYCF4MYAiU0CQ4BAgQBAQESAQEFAQEBAgEGBIEJE4VoAQyGQgEBAQEDAQEQEREMAQElBwsBCwQCAQYCEAEEAQEDAiYCAgIlCxUFAwgCBA4FCBqCXYJlAy8BDpQwjzYBgToCiVIBTHqBMYEBgggBAQYEBIFKQYMAGII1AwY4WCoBgw2EHoJaIoQKJxyBSUSBFUOCMDc+gmMBAQIBF4ETCiuDFjeCLpJAJEgCaAEDQw4CTwwFBhoYNQMOBh4CAQ4GDwRLkV8UEIM5qD+BKwqDQopolGYVg2+MBIZVkRWFS5BlIIIjijyTcDuEeAIEAgQFAg4BAQY1gSw7gVlwFTuCaVEZD44gDBaDUIUUhUp0OAIGAQoBAQMJAYI6i3YBJ4IeAQE
X-IronPort-AV: E=Sophos;i="5.88,213,1635206400"; d="scan'208";a="975853698"
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 17 Dec 2021 09:45:32 +0000
Received: from mail.cisco.com (xbe-rcd-007.cisco.com [173.37.102.22]) by rcdn-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 1BH9jVw6004950 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 17 Dec 2021 09:45:32 GMT
Received: from xfe-rtp-005.cisco.com (64.101.210.235) by xbe-rcd-007.cisco.com (173.37.102.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Fri, 17 Dec 2021 03:45:31 -0600
Received: from xfe-rtp-002.cisco.com (64.101.210.232) by xfe-rtp-005.cisco.com (64.101.210.235) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Fri, 17 Dec 2021 04:45:31 -0500
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-002.cisco.com (64.101.210.232) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Fri, 17 Dec 2021 04:45:31 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MperwDBDlaQSAD55j0x2TIsJh/Zkue/ViClgng35wlVMmlrBesQq3Aop3kUgcooc0nHitRx0PhcceRyYS04K3FqLymCtuhVCol2bfcByxS3EvksOn4nsNnBWjlHBLcC+RbBiNUxW0pY2tFY+0XY9zC9zyj1pY4Y8qN2+qBjK4ZFXn3Blg0MrzokyfZnuM1S2thr/wunX3nOf40ZdpocAVGSqcfMLhfPNY4UIppTtM1AEQk0GMXqJYvo6PYrvYE/8IhLbDz3RB3RHWWLcE17Lv7cJUDVGQLqt7mfnV/nt+LzNv9zLl1b6vMA9uOr+3ehRZOUjIo7/nh0dygsSLz2AXA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=llj5u5B0uXqm6L2HCbSpm8eJjYCooP7Y4Ch9rCI8/dE=; b=jvlv3nkT1wVkXfI2FHvTvmNnG3yAwvNZT734pMmAViX1TwO9g/pgHtuRxOFb8pNUhl7xIo+JJH3axNLvy79Jn6GveBUkPGrDZ072BpXXwKuGY8m7zT5aoXY3LUDPDlVFNVr8n4RRm7bG3aeRwmlbDRVx80awWCTwbw7KGxXOGnylxNWbqsgSlTKv5+wwm3UXWvpDgfU6uLNFIofU8DPjRkgEfSN4H96kkyVo1yASlWrPEqZUArvXdrH3LrizjuDjOUH5HU9DDDPmCI2rMfv7w3TjiSovikfI1ekuKDun5gFvPlZw9uZ2LYy75e7ePKXlBkf5OaJEF8r7rqQb4e4U2A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=llj5u5B0uXqm6L2HCbSpm8eJjYCooP7Y4Ch9rCI8/dE=; b=yEy+uXuAtAxYo6P6LWvFA2uFpQ75zwhiO6ZQeXsogRDdfLZKjOe6Lm+KhKOj01yHJUOnZwJD0DbAKzd+w1AglQB/U2yLJ3bGRRa8oTigMM6iEzbbw/7WNMGfj56bfoBDYb4zZTVUjpcNRvzxdsWT80ssb0yD7hz4UX22aC9Tb8g=
Received: from CY4PR11MB1672.namprd11.prod.outlook.com (2603:10b6:910:f::8) by CY4PR11MB1895.namprd11.prod.outlook.com (2603:10b6:903:126::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4801.14; Fri, 17 Dec 2021 09:45:29 +0000
Received: from CY4PR11MB1672.namprd11.prod.outlook.com ([fe80::80a:357b:8644:2312]) by CY4PR11MB1672.namprd11.prod.outlook.com ([fe80::80a:357b:8644:2312%7]) with mapi id 15.20.4801.015; Fri, 17 Dec 2021 09:45:29 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: "xiao.min2@zte.com.cn" <xiao.min2@zte.com.cn>
CC: "ippm@ietf.org" <ippm@ietf.org>, "tpauly@apple.com" <tpauly@apple.com>
Thread-Topic: Re:[ippm] Progressing draft-ietf-ippm-ioam-conf-state
Thread-Index: AQHX7ZPJRKVfHSMK8km2j+o41ByxSaw1Dk+AgADyHoCAAHXB0A==
Date: Fri, 17 Dec 2021 09:45:29 +0000
Message-ID: <CY4PR11MB1672DC052465BFE82C401635DA789@CY4PR11MB1672.namprd11.prod.outlook.com>
References: 202112101500302348450@zte.com.cn, CY4PR11MB1672EE19AF2E99EE77BAF5D3DA779@CY4PR11MB1672.namprd11.prod.outlook.com <202112171028356091854@zte.com.cn>
In-Reply-To: <202112171028356091854@zte.com.cn>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d1062679-a6de-4d0b-31c0-08d9c141f5f5
x-ms-traffictypediagnostic: CY4PR11MB1895:EE_
x-microsoft-antispam-prvs: <CY4PR11MB189569BF49D1BD405E11C9BEDA789@CY4PR11MB1895.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR11MB1672.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(7696005)(83380400001)(86362001)(53546011)(54906003)(508600001)(64756008)(38070700005)(6506007)(71200400001)(38100700002)(966005)(8936002)(5660300002)(122000001)(316002)(55016003)(2906002)(9686003)(33656002)(6916009)(66476007)(26005)(76116006)(66946007)(66556008)(66446008)(4326008)(52536014)(186003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CY4PR11MB1672.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d1062679-a6de-4d0b-31c0-08d9c141f5f5
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Dec 2021 09:45:29.0988 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: sKHO2SLCJ0YU5e01uVMqvTi+N34EyldZh9vxW6j8wf/XZPW1xHzNN6OhAdjN/ixgZ+1HgHzzFaubvlCtaJeyrA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR11MB1895
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.22, xbe-rcd-007.cisco.com
X-Outbound-Node: rcdn-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/tqp2hoBWAXVvSHUwsEDyPUi06cQ>
Subject: Re: [ippm] Progressing draft-ietf-ippm-ioam-conf-state
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 Dec 2021 09:45:40 -0000

Hi Xiao Min,

per https://datatracker.ietf.org/doc/html/draft-ietf-ippm-ioam-data-17#section-4, IOAM is focused on "limited domains" as defined in [RFC8799], which is per RFC 8799 the same as what is also referred to as a "controlled environment". Personally I understand "Controlled environment" as an environment where an operator does have control over the nodes in the network and their configuration, i.e., the operator has control over his nodes, knows what network elements he is dealing with and what the config of the nodes is. How this control is implemented - whether there is one or several "controllers" or "network managers" or similar - is an implementation detail IMHO.

Cheers, Frank



> -----Original Message-----
> From: xiao.min2@zte.com.cn <xiao.min2@zte.com.cn>
> Sent: Friday, 17 December 2021 03:29
> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> Cc: ippm@ietf.org; tpauly@apple.com
> Subject: Re:[ippm] Progressing draft-ietf-ippm-ioam-conf-state
> 
> Hi Frank,
> 
> Thanks for your thorough review and thoughtful comments.
> I apologize if I misinterpreted your mind.
> Considering that your holiday season is coming, before digging into technical
> details, I suggest that we discuss the IOAM deployment environment first.
> As you may have noticed while reading through draft-ietf-ippm-ioam-conf-
> state-02, in the introduction section it says "A centralized controller which owns
> the enabled IOAM capabilities of each IOAM device could be used in some IOAM
> deployments.  The IOAM encapsulating node can discover the enabled IOAM
> capabilities infomation from the centralized controller, using, for example,
> NETCONF/YANG, PCEP, or BGP.  In the IOAM deployment scenario where there
> is no centralized controller, NETCONF/YANG or IGP may be used by the IOAM
> encapsulating node to discover these IOAM capabilities information."
> I know you're the primary author of both IOAM-Data and IOAM-Deployment
> documents, so I have a fundamental question to you: Is the above statement
> correct or not?
> More specifically, if you can confirm that "the IOAM deployment scenario where
> there is no centralized controller" doesn't exist at all, on both the mailing list and
> the IOAM-Deployment document, then I suggest IPPM WG to abandon draft-
> ietf-ippm-ioam-conf-state, that would save the energy of the whole wg
> including you and me.
> 
> Best Regards,
> Xiao Min
> ------------------原始邮件------------------
> 发件人:FrankBrockners(fbrockne)
> 收件人:肖敏10093570;ippm@ietf.org;
> 抄送人:Tommy Pauly;
> 日 期 :2021年12月16日 20:56
> 主 题 :RE: [ippm] Progressing draft-ietf-ippm-ioam-conf-state Hi Xiao Min,
> Thanks for posting draft-ietf-ippm-ioam-conf-state-02. I read through the
> updated version and looked at the diff to the 01 version
> (https://www.ietf.org/rfcdiff?url1=draft-ietf-ippm-ioam-conf-state-
> 01&url2=draft-ietf-ippm-ioam-conf-state-02). Different from what you state
> below, I don't see any of my comments reflected.
> The two main points I mentioned in the last WG meeting were about (a)
> alignment with draft-ietf-ippm-ioam-yang and (b) enhancements to the security
> section, reflecting that the protocol you are defining is a network management
> protocol, and needs to be secured as such.
> More specifically:
> * Alignment with draft-ietf-ippm-ioam-yang:
> The IPPM WG is in the process of defining a YANG module for IOAM: draft-ietf-
> ippm-ioam-yang. We should have a single, comprehensive model for config
> information for IOAM. That model can then be rendered into different
> transports (be it JSON, XML, or yet another format - to then be carried over a
> e.g. ICMP in your case). Right now draft-ietf-ippm-ioam-conf-state heads down
> a path of defining a new set of management objects - many are similar to what
> draft-ietf-ippm-ioam-yang already defines, some they are less comprehensive,
> some hint at additional information that draft-ietf-ippm-ioam-yang does not
> cover yet: E.g.,  you define a "Pre-allocated Tracing Capabilities Object" where
> draft-ietf-ippm-ioam-yang  has a "Preallocated Tracing Profile" defined. You
> define ingress interface fields, which is information, which is more
> comprehensively defined by the ioam-filter grouping. You define specific fields
> to describe the timestamp format used by a node, which is information that
> should be  described as part of the ioam-info container - and which is currently
> missing in draft-ietf-ippm-ioam-yang; point well taken :-). It is interesting to
> note that draft-ietf-ippm-ioam-conf-state does not even reference draft-ietf-
> ippm-ioam-yang.
> From my perspective we should have one single data model for IOAM
> configuration - and that is the YANG module defined in draft-ietf-ippm-ioam-
> yang. Let's make sure that this model covers all the information required to
> properly manage IOAM. Then draft-ietf-ippm-ioam-conf-state would be solely
> focused on defining how that YANG module (from draft-ietf-ippm-ioam-yang)
> would be rendered into e.g., ICMP as a carrier protocol.
> * Security: Revision -02 does not seem to update the security section. IMHO,
> section 6 on security considerations should be enhanced to clearly articulate
> that we're dealing with very sensitive information. Consider loaning from e.g.,
> https://datatracker.ietf.org/doc/html/rfc6241#section-9. As part of the
> discussion, it would be good to see an explanation where you'd expect  draft-
> ietf-ippm-ioam-conf-state to be used. Given the discussion in the Introduction
> section, you seem to assume an environment that does not have a central
> network management station / controller in place. Or in other terms, you seem
> to target a deployment, which isn't a limited domain per RFC 8799. In that case,
> I would expect that we have normative language that requires the use of strong
> authentication and encryption between the nodes (i.e., MUST use ICMP with AH
> and ESP..).
> In addition to the above, I struggle to understand the "Operational Guide" in
> section 4: Could you shed a bit more light on how you expect things to work -
> and what a target deployment environment would look like? It seems that you
> assume that you don't know the network nor the destination addresses in your
> network: Do you expect that you would do regular "ICMP echo sweeps" in your
> network? Do you expect that, while doing the expanding ring search, an ICMP
> time exceeded message would also carry the "IOAM Capabilities Response
> Container Header", so that the capabilities container would not only be carried
> in the echo reply message but also in the time exceeded message?
> Thanks, Frank
> (BTW - Note that due to the upcoming holiday season, replies might be delayed).
> > -----Original Message-----
> > From: ippm <ippm-bounces@ietf.org> On Behalf Of xiao.min2@zte.com.cn
> > Sent: Friday, 10 December 2021 08:01
> > To: ippm@ietf.org
> > Subject: [ippm] Progressing draft-ietf-ippm-ioam-conf-state
> >
> > Hi IPPM WG,
> >
> > The -02 version of draft-ietf-ippm-ioam-conf-state has been posted.
> > There are mainly two changes, one is on IOAM Tracing Capabilities
> > Objects to make them applicable to ICMPv6 extensions, another one is
> > on IOAM Proof-of- Transit Capabilities Object to make it aligned with
> > the updated IOAM-Data document.
> > Also note that I've had an offline discussion with wg chairs and Frank
> > Brockners, my conclusion is that Frank's concern raised at IETF 112
> > has been addressed. If that's not the case, please speak up.
> > With that said, I think this draft is ready for WGLC.
> >
> > Best Regards,
> > Xiao Min
> >
> > _______________________________________________
> > ippm mailing list
> > ippm@ietf.org
> > https://www.ietf.org/mailman/listinfo/ippm