Re: [ippm] draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Tue, 02 April 2019 09:39 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D3469120111; Tue, 2 Apr 2019 02:39:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level:
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=IQT1kTQB; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=QKQHigeK
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ltIAuFfQTU1B; Tue, 2 Apr 2019 02:39:55 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DDEBF1200B5; Tue, 2 Apr 2019 02:39:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5389; q=dns/txt; s=iport; t=1554197994; x=1555407594; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=6VfnFzFSQ5Ig8qi4M8Z5Bpk4D7O3aNNqBYlCZ1Jygik=; b=IQT1kTQBzBnrI/HF2PKa3z/bRoPW+HhB6egT6uFibLtzG0H42No0xZbG Sd+egMEvD0fmYErFMY73XGSjnrYTte7bSrcTsp9RM76/FhWYlgBLNxhgp POc8FwVEJaNRRVn7MZE1UzibciQ21cOH+MGo0mA1C9L540ukC9TjzjoZs M=;
IronPort-PHdr: 9a23:MjLHwB0c6SMPVZ8zsmDT+zVfbzU7u7jyIg8e44YmjLQLaKm44pD+JxKGt+51ggrPWoPWo7JfhuzavrqoeFRI4I3J8RVgOIdJSwdDjMwXmwI6B8vQB0fhK/XpaSESF8VZX1gj9Ha+YgBY
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0B2AABrLaNc/49dJa1bChoBAQEBAQIBAQEBBwIBAQEBgVQCAQEBAQsBgT0kLAOBPCAECycKh0sDjzSCV4k4jVmBQoEQA1QOAQEsgUuCdQKFOiI3Bg0BAQMBAQkBAwJtHAyFSgEBAQEDOgYBASUSAQsEAgEIDgMEAQEfBQshER0IAgQOBQiEeAMVAQKiHAKKFIIggnkBAQWFEw0LggwIgS8BizIXgUA/gRFGgkw+ghqBdwEHCwEhgzmCJqUeNgkCkCSDW5Q0kxqMBAIEAgQFAg4BAQWBYyJlcXAVgyeCCgkDBRITgziKU3KBKIx5gR8BgR4BAQ
X-IronPort-AV: E=Sophos;i="5.60,300,1549929600"; d="scan'208";a="542410466"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 02 Apr 2019 09:39:52 +0000
Received: from XCH-RCD-007.cisco.com (xch-rcd-007.cisco.com [173.37.102.17]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id x329dqJQ005776 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 2 Apr 2019 09:39:53 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-RCD-007.cisco.com (173.37.102.17) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 2 Apr 2019 04:39:52 -0500
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 2 Apr 2019 04:39:51 -0500
Received: from NAM04-CO1-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Tue, 2 Apr 2019 04:39:51 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lZhjMnfHIFjadMQiUlXDrvMpwfRIMj/nKdETZ+oyPCI=; b=QKQHigeKa2rFVudNEoYTWE2tY8v9AjDuak9cCqo6Se2rM+smJaWp+kSnnZ49Egv6UwP8nW9uEpG2Yiuky0TbdYX6Ae+A1VYU24xEb+2o681qfiBnl7MRS35xPva/AlD/5YaXVH4ttAtkVlDf6Xlp/0+AwCV344Ue4yfeGpRAwzs=
Received: from MN2PR11MB3629.namprd11.prod.outlook.com (20.178.252.31) by MN2PR11MB3662.namprd11.prod.outlook.com (20.178.251.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1750.20; Tue, 2 Apr 2019 09:39:49 +0000
Received: from MN2PR11MB3629.namprd11.prod.outlook.com ([fe80::ad94:267b:a12e:1a64]) by MN2PR11MB3629.namprd11.prod.outlook.com ([fe80::ad94:267b:a12e:1a64%2]) with mapi id 15.20.1750.014; Tue, 2 Apr 2019 09:39:49 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Mikael Abrahamsson <swmike@swm.pp.se>
CC: Mark Smith <markzzzsmith@gmail.com>, "C. M. Heard" <heard@pobox.com>, 6man WG <ipv6@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)
Thread-Index: AQHU4eVk77oZnWiBmUa6JfuK7viq2qYclmiQgATixqCABbu4AIAAT+7ggADrloCAADhXsA==
Date: Tue, 02 Apr 2019 09:39:49 +0000
Message-ID: <MN2PR11MB36299BC5A8F12770A6EABA01DA560@MN2PR11MB3629.namprd11.prod.outlook.com>
References: <CACL_3VGxyn-PYosFsKPVdd8C=P5AbE6HD1zrimHKuh2MPkhnuQ@mail.gmail.com> <505272eac2dd44fa891d4d36d14da9af@XCH-RCD-008.cisco.com> <CAO42Z2wGMzc_RT=eWTx9Ve-5reS0nCWiteGOuE16=MB4Fg8mkg@mail.gmail.com> <f50040ab52d04867b9a5cefa1c3131c3@XCH-RCD-008.cisco.com> <CAO42Z2zgguekybwVuCh8Az3mK8gHp292BYnWYhJq-8KEyfKzOA@mail.gmail.com> <7ea9049fe6f44a40aefe4801bd796322@XCH-RCD-008.cisco.com> <CAO42Z2y5TS1+8YxNsr=BKz5v8-ZPTiO-M7CU2k6FzNqVZoU4VA@mail.gmail.com> <CY4PR11MB1335960AD9BF9A4B990F7E10DA4A0@CY4PR11MB1335.namprd11.prod.outlook.com> <CAO42Z2xqq=uksNQPxvF_CRSxf1V_MADbFurzW4hqQW0v478cyw@mail.gmail.com> <DM6PR11MB36254EAC97ACF07F5BAD43CADA5F0@DM6PR11MB3625.namprd11.prod.outlook.com> <DM6PR11MB362528DB0EADA21493CC49A3DA590@DM6PR11MB3625.namprd11.prod.outlook.com> <alpine.DEB.2.20.1904011139550.3490@uplift.swm.pp.se> <BN8PR11MB36181C47785968D8FCA2DED9DA550@BN8PR11MB3618.namprd11.prod.outlook.com> <alpine.DEB.2.20.1904020744260.3490@uplift.swm.pp.se>
In-Reply-To: <alpine.DEB.2.20.1904020744260.3490@uplift.swm.pp.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=fbrockne@cisco.com;
x-originating-ip: [173.38.220.33]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 29627dab-5378-4328-97cb-08d6b74f26a8
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600139)(711020)(4605104)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:MN2PR11MB3662;
x-ms-traffictypediagnostic: MN2PR11MB3662:
x-microsoft-antispam-prvs: <MN2PR11MB36623BC67F45E93466127484DA560@MN2PR11MB3662.namprd11.prod.outlook.com>
x-forefront-prvs: 0995196AA2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(136003)(346002)(39860400002)(376002)(396003)(199004)(13464003)(189003)(7696005)(53546011)(14454004)(305945005)(8936002)(2906002)(102836004)(6436002)(66066001)(3846002)(6116002)(478600001)(106356001)(99286004)(316002)(105586002)(186003)(446003)(486006)(86362001)(6506007)(55016002)(9686003)(6916009)(229853002)(476003)(54906003)(66574012)(26005)(93886005)(76176011)(11346002)(71190400001)(71200400001)(256004)(68736007)(14444005)(52536014)(74316002)(97736004)(8676002)(6246003)(5660300002)(81166006)(81156014)(25786009)(53936002)(33656002)(4326008)(7736002); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR11MB3662; H:MN2PR11MB3629.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: wT/Z2ig1eiCjtVZSTT7oGtjtrQH3p1pLIQ3QwEFBNALhUn9QBS02xIkEBFzwTX62p0D6+D6mRvALGjKnaPerqHgsuI/Tor0Y3DShweYXNoK8lV+LsVXMXJLhMAiyE7G0AXGAHJoxX6DfSjiGql/Y/XBQ42CNj+3KJ1dMKlMAxnrnVwxvrJZYIeORsGIoaV+KWjQro08PvFPySvQADfBQ+Goy9Jw0y1BSf/W+0Hkd0YY5RJJHMsu/Mj6zsxkyyXdJET6zQROJU8gDSFQ3tuWz00ybc1tC7zENaixEEmiA7BJ7xnuHgaZ+o3WilEmbuWe1OYcL7w/QhY/pg5RA3A0Kn7CEAbWYmcbdMnsqolFATarzVJkm5O0qiVcEpbOKyOC16gCb0Xxb0jBUaMfIOl/RZJWXuuRA3V16zpNKVH76jLI=
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 29627dab-5378-4328-97cb-08d6b74f26a8
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Apr 2019 09:39:49.7055 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB3662
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.17, xch-rcd-007.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/vrkwgAqCjOS-2JOyTFLpsbiYbPo>
Subject: Re: [ippm] draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Apr 2019 09:39:58 -0000


-----Original Message-----
From: Mikael Abrahamsson <swmike@swm.pp.se> 
Sent: Dienstag, 2. April 2019 08:06
To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
Cc: Mark Smith <markzzzsmith@gmail.com>; C. M. Heard <heard@pobox.com>; 6man WG <ipv6@ietf.org>; ippm@ietf.org
Subject: RE: draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 feedback (Re: v6 option types for IOAM data fields)

On Mon, 1 Apr 2019, Frank Brockners (fbrockne) wrote:

> ...FB: There is obviously no easy answer. Couple of thoughts:
> * IOAM is considered a "domain specific" feature (see 
> draft-ietf-ippm-ioam-data-05, section 3). Routers in the IOAM domain 
> should be IOAM capable.  And IMHO,  we should add a statement to 
> draft-ioametal-ippm-6man-ioam-ipv6-deployment that an implementation 
> of IOAM MUST ensure "C1".
>
> * That said, there can be situations, where C1 cannot be achieved, e.g. 
> consider a network which does ECMP scheduling based on packet length.
>
> * What one could consider - and which is one suggested deployment 
> model
> - is that by default IOAM data fields are added to _all_ customer 
> packets. The decapsulating node would decide whether the IOAM 
> information contained in a packet would be used (and exported) or not.
> That way one would not need to deal with the situation that some 
> traffic carries IOAM while other does not - and might thus be treated 
> differently.

Yes, I think this is the only way. Is there a risk that intermediate routers would not be IOAM capable? I think the C1 requirement is really really hard to fulfil and I'm also afraid that adding the IOAM header will actually make ECMP stop working on some platforms (because they would not have the capability to look deep enough into the packet to find L4 information, so it'll go back to 2 tuple ECMP instead of 5 tuple.

But this question can only be answered by people with deep NPU knowledge...

...FB2: Given that IOAM is a domain specific feature - I expect that folks initially start to use it in domains (like e.g. a DC) where all boxes are IOAM capable and can trace the packet appropriately - or per Tom's note, can be configured so that one would do ECMP based on addresses and flow-label.  There are chips with pretty deep parsing capability (up to a few hundred bytes). 

> ...FB: The comparison to MPLS is interesting. How often do MPLS 
> packets leak and cause harm? For IOAM,
> draft-ioametal-ippm-6man-ioam-ipv6-options-02 proposes a deployment 
> model similar to what we do for MPLS: Unless an interface is 
> explicitly configured for IOAM, packets with IOAM data fields MUST be dropped.
> Hence leakage would only occur, if we have a clearly misbehaving 
> router which violates this rule. Similar to you, I'd also greatly 
> appreciate any pointers to research on how common MPLS leaked packets are.

When it comes to "cause harm" I imagine there are (at least) two ways to cause harm, one is privacy/secrecy/security loss and the other one is actual operational loss.

I know of bugs where labeled packets went the wrong way and caused them to be lost, I've also seen bugs where bugs caused traffic to "hop" between VRFs in MPLS VPN (or to "global" VRF). I don't have numbers on this though.

Depending on the deployment scenario, it might make sense to make IOAM packets not valid for non-IOAM aware devices (basically encap entire packet/payload), but that might be a problem for intermediate non-IOAM nodes then. This would affect the ECMP requirement. I can see cases where one would operationally turn on IOAM for some customers traffic and then see the problem go away because now ECMP changed.

> ...FB: One idea that Shwetha came up with to identify the source AS of 
> a leaked packet, would be to add a new new IOAM E2E option - as 
> proposed in section 5.1.1 bullet 2 of 
> draft-ioametal-ippm-6man-ioam-ipv6-deployment-01.

Yes, that'd solve that problem.

How much has the silicon people been involved so far in the design of the headers? What is the current thinking of amount of data going into the IOAM header? Considering things like trace options etc it seems to me the header can grow quite large? To satisfy the ECMP requirement what about putting the IOAM information as a trailer behind the regular payload? Or is there a problem for the hw to manipulate information that far into the packet (I also imagine this will considerably lower the forwarding performance of IOAM packets on IOAM aware platforms).

...FB2: There are quite a few folks with hardware background that co-author the IOAM drafts. Parsing capability differs between chips, as does the ability to deal with new/flexible headers and the ability to modify data in the extension headers. So the unfortunate answer to that question is "it depends" (what information do you gather, how large is your domain, what are the capabilities of your hardware/software forwarder, etc.), but I do expect that for specific deployment domains (e.g. DC, Enterprise) - but also for overlay networks / VPNs - we'll see an increasing amount of chips that are well suited for processing large extension header.

Cheers, Frank

-- 
Mikael Abrahamsson    email: swmike@swm.pp.se