Re: [ippm] Vote at IPPM session

"MORTON, ALFRED C (AL)" <acmorton@att.com> Tue, 18 April 2017 20:05 UTC

Return-Path: <acmorton@att.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F4861293D9; Tue, 18 Apr 2017 13:05:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.401
X-Spam-Level:
X-Spam-Status: No, score=-5.401 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-2.8, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8IVEPOt2Yg30; Tue, 18 Apr 2017 13:05:05 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0b-00191d01.pphosted.com [67.231.157.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8559412EABC; Tue, 18 Apr 2017 13:05:05 -0700 (PDT)
Received: from pps.filterd (m0049462.ppops.net [127.0.0.1]) by m0049462.ppops.net-00191d01. (8.16.0.17/8.16.0.17) with SMTP id v3IJtgmp006311; Tue, 18 Apr 2017 16:05:00 -0400
Received: from alpi155.enaf.aldc.att.com (sbcsmtp7.sbc.com [144.160.229.24]) by m0049462.ppops.net-00191d01. with ESMTP id 29wrfusv66-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 18 Apr 2017 16:04:59 -0400
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id v3IK4wml020897; Tue, 18 Apr 2017 16:04:59 -0400
Received: from mlpi407.sfdc.sbc.com (mlpi407.sfdc.sbc.com [130.9.128.239]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id v3IK4npQ020505 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 18 Apr 2017 16:04:50 -0400
Received: from clpi183.sldc.sbc.com (clpi183.sldc.sbc.com [135.41.1.46]) by mlpi407.sfdc.sbc.com (RSA Interceptor); Tue, 18 Apr 2017 20:04:31 GMT
Received: from sldc.sbc.com (localhost [127.0.0.1]) by clpi183.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id v3IK4Ulv023981; Tue, 18 Apr 2017 15:04:31 -0500
Received: from mail-green.research.att.com (mail-green.research.att.com [135.207.255.15]) by clpi183.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id v3IK4NiP023669; Tue, 18 Apr 2017 15:04:23 -0500
Received: from exchange.research.att.com (njmtcas2.research.att.com [135.207.255.47]) by mail-green.research.att.com (Postfix) with ESMTP id 0431BE1078; Tue, 18 Apr 2017 16:04:03 -0400 (EDT)
Received: from njmtexg5.research.att.com ([fe80::b09c:ff13:4487:78b6]) by njmtcas2.research.att.com ([fe80::d550:ec84:f872:cad9%15]) with mapi id 14.03.0319.002; Tue, 18 Apr 2017 16:04:22 -0400
From: "MORTON, ALFRED C (AL)" <acmorton@att.com>
To: "Brian Trammell (IETF)" <ietf@trammell.ch>, "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
CC: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, IPPM Chairs <ippm-chairs@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>, Sarah B <sbanks@encrypted.net>
Thread-Topic: [ippm] Vote at IPPM session
Thread-Index: AQHSp+ANywb7w7Y7CUWYR5PjBqbNA6GqudOAgAAD3QCAAAfSAIAAIx6AgAA2hgCAAPdoAIAAaFWAgAAcNwD//8lsgIAC5LeAgAt5d4CABF/eAIADEXMAgARQ+4CABTbyAIAAKoCA///CZvA=
Date: Tue, 18 Apr 2017 20:04:22 +0000
Message-ID: <4D7F4AD313D3FC43A053B309F97543CF25F71AE7@njmtexg5.research.att.com>
References: <CA+RyBmXAyOVZy2DncvC9Bdkmt2P+OXhV49sFgCqXf=1Of3EWkw@mail.gmail.com> <830D269B-62A1-4782-8AFE-C2910F908BFF@trammell.ch> <CA+RyBmUtVv6fJVLrUxwLiHg9ktvDCkuV0s+KWyv4ygEb50rMOw@mail.gmail.com> <01fa01d2a7e9$1c65d520$55317f60$@olddog.co.uk> <8168bd84-88f4-c40b-7150-844b463f6612@trammell.ch> <CAKKJt-ca7VgePkstLE=RLTh506o44m3hiZ_ay88hOS1egz20KA@mail.gmail.com> <7e592d5c42d44db594dfdfbc76233e29@XCH-RCD-008.cisco.com> <3E70CF9A-5A09-419B-B330-F9B854E01539@trammell.ch> <01c801d2a8d3$eb6d2450$c2476cf0$@olddog.co.uk> <4D7F4AD313D3FC43A053B309F97543CF25F3D4C0@njmtexg5.research.att.com> <e60a1ae521054eb3b9e1352d5918c6b2@XCH-RCD-008.cisco.com> <2BCD950B-DEBF-4FCD-92DD-89BE50270006@encrypted.net> <aa0dea09d3e44260a2ed306836c68ccb@XCH-RCD-008.cisco.com> <45679B2A-EE96-4980-BAED-B39994C73CFE@encrypted.net> <070501d2b5c8$dc264d30$9472e790$@olddog.co.uk> <58b68d6d47614281846807b6353b46f3@XCH-RCD-008.cisco.com> <38C60635-D7B8-4AA9-843D-ABBA65AC3D62@trammell.ch>
In-Reply-To: <38C60635-D7B8-4AA9-843D-ABBA65AC3D62@trammell.ch>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [73.178.187.36]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-RSA-Inspected: yes
X-RSA-Classifications: public
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2017-04-18_17:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1703280000 definitions=main-1704180157
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/v7K9yLzcZ1bLulSpjKfsLHKmVwI>
Subject: Re: [ippm] Vote at IPPM session
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Apr 2017 20:05:07 -0000

All,
one alternative to consider, below.
Al

> -----Original Message-----
> From: Brian Trammell (IETF) [mailto:ietf@trammell.ch]
> Sent: Tuesday, April 18, 2017 3:26 PM
> To: Frank Brockners (fbrockne)
> Cc: adrian@olddog.co.uk; MORTON, ALFRED C (AL); IPPM Chairs;
> ippm@ietf.org; Sarah B
> Subject: Re: [ippm] Vote at IPPM session
> 
> hi Frank, all,
> 
> Speaking as an individual.
> 
> First, thanks for the scope section... this is all much more concrete
> now.
> 
> So, as I understand it, iOAM is designed first and foremost to be a
> single-network (in the sense of "coherent administrative domain")
> protocol data model with a binding to a variety of "carrier" protocols
> (the draft speaks of "transports" in the RTG-area meaning of the term,
> not the TSV-area one, so let's overload "carrier" here instead), some of
> which are also explicitly single-network, some of which less so...
> 
> I tend to share the concerns of those who've expressed discomfort with
> the "warning label approach" to ensuring that iOAM data stays single-
> network, but I'm not sure it's a problem *for the data model*. I don't
> necessarily read this "MUST NOT leave the network" as an additional
> responsibility of operators, but rather on the designers of carrier
> protocols for iOAM data. Now, some of the carrier protocols (e.g. IPv6
> extension headers) provide no such protection or support for providing
> that protection, so in that case it falls to the implementor of the iOAM
> solution to provide it... but this is rather a matter to be handled on a
> per carrier protocol basis, isn't it?
> 
> Cheers,
> Brian
[ACM] 

IOM, there is a general message to convey for all future protocol 
development. Something like "sufficient provisions should be made
to restrict the iOAM traffic to the intended domain."

We could provide guidance to interconnecting network operators,
as well, effectively allowing them to discard traffic containing 
unexpected iOAM data. This would be applicable to 
non-iOAM network operators, but might be more important for
interconnecting operators who have established their own iOAM domain.

This is similar to the approach we used for BMWG test traffic:
there are v4 and v6 address spaces dedicated for isolated test 
environments, and any packet with testing addresses observed on 
the Internet may be discarded.

regards,
Al

> 
> 
> 
> > On 18 Apr 2017, at 18:53, Frank Brockners (fbrockne)
> <fbrockne@cisco.com> wrote:
> >
> > Hi Adrian,
> >
> > thanks - please see inline below...
> >
> > -----Original Message-----
> > From: Adrian Farrel [mailto:adrian@olddog.co.uk]
> > Sent: Samstag, 15. April 2017 11:16
> > To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> > Cc: 'ALFRED MORTON' <acmorton@att.com>; 'Brian Trammell (IETF)'
> <ietf@trammell.ch>; 'IPPM Chairs' <ippm-chairs@ietf.org>; ippm@ietf.org;
> 'Sarah B' <sbanks@encrypted.net>
> > Subject: RE: [ippm] Vote at IPPM session
> >
> > Hi Frank, all,
> >
> > Thanks for proposing some text.
> >
> >> How about: "The operator of such a domain MUST put provisions in
> place
> >> to ensure that in-situ OAM data stays within the specific domain only
> >> (i.e., does
> > not
> >> leak beyond the edge) using for example packet filtering methods. The
> >> operator SHOULD consider potential operational impact of IOAM to
> >> mechanisms such as ECMP processing (e.g. load-balancing schemes based
> >> on packet length could be impacted by the increased packet size due
> to
> >> IOAM), path MTU (i.e. ensure that the MTU of all links within a
> domain
> >> is sufficiently large to support the
> > increased
> >> packet size due to IOAM) and ICMP message handling (i.e. in case of a
> >> native
> > IPv6
> >> transport, IOAM support for ICMPv6 Echo Request/Reply could desired
> >> which would translate into ICMPv6 extensions to enable IOAM data
> >> fields to be copied from an Echo Request message to an Echo Reply
> message)."
> >
> > Like Sarah, I think this is a start.
> >
> > I remain disappointed that it is the operators' responsibility to
> ensure various things, and not a feature of the protocol or
> implementation.
> >
> > But perhaps this text serves as a warning to the operators about using
> implementations of iOAM and so will suffice.
> >
> > ...FB: The current document is just the starting point. Let's hope
> that the WG can improve the current approach further and/or suggest
> improved text.
> >
> > I think the use of 2119 capitalisation is meaningless in this
> paragraph, and that the "SHOULD" in the second sentence should in any
> case be a "must".
> >
> > ...FB: Thanks. Will change/correct in the next revision (along with a
> set of typos that I introduced when crafting the section)
> >
> > Thanks, Frank
> >
> > Thanks,
> > Adrian