Re: [ippm] draft-zhang-ippm-ioam-mp

"zhangli (CE)" <zhangli344@huawei.com> Wed, 20 March 2024 00:25 UTC

Return-Path: <zhangli344@huawei.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33C50C151093 for <ippm@ietfa.amsl.com>; Tue, 19 Mar 2024 17:25:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.203
X-Spam-Level:
X-Spam-Status: No, score=-4.203 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WGwfzKEb1YKb for <ippm@ietfa.amsl.com>; Tue, 19 Mar 2024 17:25:32 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E4F1C15109D for <ippm@ietf.org>; Tue, 19 Mar 2024 17:25:32 -0700 (PDT)
Received: from mail.maildlp.com (unknown [172.18.186.231]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4Tzq9G3dLbz6JB2t for <ippm@ietf.org>; Wed, 20 Mar 2024 08:24:50 +0800 (CST)
Received: from lhrpeml500005.china.huawei.com (unknown [7.191.163.240]) by mail.maildlp.com (Postfix) with ESMTPS id 0106C140B63 for <ippm@ietf.org>; Wed, 20 Mar 2024 08:25:29 +0800 (CST)
Received: from dggpemm500005.china.huawei.com (7.185.36.74) by lhrpeml500005.china.huawei.com (7.191.163.240) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Wed, 20 Mar 2024 00:25:27 +0000
Received: from dggpemm500019.china.huawei.com (7.185.36.180) by dggpemm500005.china.huawei.com (7.185.36.74) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Wed, 20 Mar 2024 08:25:25 +0800
Received: from dggpemm500019.china.huawei.com ([7.185.36.180]) by dggpemm500019.china.huawei.com ([7.185.36.180]) with mapi id 15.01.2507.035; Wed, 20 Mar 2024 08:25:25 +0800
From: "zhangli (CE)" <zhangli344@huawei.com>
To: "Thomas.Graf@swisscom.com" <Thomas.Graf@swisscom.com>, "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: draft-zhang-ippm-ioam-mp
Thread-Index: Adp6XQOjo16mgpsWS2iRwMyUbh+Z/A==
Date: Wed, 20 Mar 2024 00:25:25 +0000
Message-ID: <718344ed589c4808bac19be3ba1def32@huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.126.202.44]
Content-Type: multipart/alternative; boundary="_000_718344ed589c4808bac19be3ba1def32huaweicom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/yWHOOHkcKTrS0zYXqYg5qWeFCzM>
Subject: Re: [ippm] draft-zhang-ippm-ioam-mp
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Mar 2024 00:25:37 -0000

Dear Thomas,

Thanks for your kindly feedback, my feedback is shown in yellow color.

Thanks a lot for sharing operator network analytical use cases with me, and I am always available for the discussion.

Best regards
Li
发件人: Thomas.Graf@swisscom.com <Thomas.Graf@swisscom.com>
发送时间: 2024年3月19日 16:25
收件人: zhangli (CE) <zhangli344@huawei.com>; ippm@ietf.org
抄送: Tianran Zhou <zhoutianran@huawei.com>
主题: RE: draft-zhang-ippm-ioam-mp

Dear Li,


Thanks a lot for the feedback. I do understand that your objective is to apply this feature only for Hybrid Type II active probing as described in RFC 7799. However I do not concur with your security assessment described in section 5 (https://datatracker.ietf.org/doc/html/draft-zhang-ippm-ioam-mp-00#section-5). You did not describe what measurements should be taken to prevent that this option is being abused.



Li>correct, thanks for your comments, I will provide more detail description in section5.



To come back to my original statement. I quote


https://datatracker.ietf.org/doc/html/rfc9232#section-2.4
It is worth noting that a network telemetry system should not be intrusive to normal network operations by avoiding the pitfall of the "observer effect". That is, it should not change the network behavior and affect the forwarding performance.

Network Telemetry protocols are designed so that they are passive measuring networks with the least amount interference with the connectivity service. Hybrid Type I and II  however augment the packet with additional tracing information. Therefore we the IETF community need to pay close attention that such protocols are not going one step further and influencing the forwarding of the in-flight (customer) packets. There I see that your proposed crosses a red line and I object in the interest of Network Telemetry not being intrusive which is key for me as network operator since we receive push backs from colleagues in network operation or in software development on network vendor side when introducing Network Telemetry features in the forwarding and in the control plane of networks. Introducing such features would make it even harder to get adoption in the industry.

>ok, I understand, it is an interesting background.

As Greg and I described. With flow label in IPv6 or entropy label in MPLS we have mechanism in the data plane already which can be applied in probing application to steer the traffic in multipathing scenarios. However I do understand the challenges there.

>if I understand correctly, you mean change the IPv6 flow label or MPLS entropy label of probe packets dynamically to cover different paths. If right there are still some challenges because of the  hash algorithm, it is not guaranteed that the probe packets can discover all paths.

I am available this week at IETF and would like to take the opportunity to share with you some operator network analytical use cases and put your work in perspective and might be able to suggest some alternative options.

>Thank you very much, I will be glad to learn the use cases and discuss the alternative options.

Best wishes
Thomas

From: zhangli (CE) <zhangli344@huawei.com<mailto:zhangli344@huawei.com>>
Sent: Tuesday, March 19, 2024 3:33 PM
To: Graf Thomas, INI-NET-VNC-HCS <Thomas.Graf@swisscom.com<mailto:Thomas.Graf@swisscom.com>>; ippm@ietf.org<mailto:ippm@ietf.org>
Cc: Tianran Zhou <zhoutianran@huawei.com<mailto:zhoutianran@huawei.com>>
Subject: RE: draft-zhang-ippm-ioam-mp


Be aware: This is an external email.


Hi Thomas,

Thanks for your kindly comments.
Yes, your understanding is correct, but this extended flag only takes effect when using IOAM to do active measurements, so from my point of view, this extension will not impact normal In-suit OAM. And yes, this extension can also be used with STAMP.
I have a look at RFC 643 roughly, from my understanding, the usage of flow label is to enable efficient IPv6 flow classification, and make the load balance performance better. Our object is to collect every path’s information, so there's not much correlation between them.

Best Regards
Li

发件人: ippm <ippm-bounces@ietf.org<mailto:ippm-bounces@ietf.org>> 代表 Thomas.Graf@swisscom.com<mailto:Thomas.Graf@swisscom.com>
发送时间: 2024年3月19日 9:05
收件人: ippm@ietf.org<mailto:ippm@ietf.org>
主题: [ippm] draft-zhang-ippm-ioam-mp

Dear Li,

Thanks a lot for your presentation at IPPM.

If I understood correctly, the document proposes to clone a packet based on an IOAM flag. As a network operator I like to raise my concern. Network Telemetry protocols shall not be intrusive in the packet forwarding. I believe the objective of this work should be part of the probing protocol like STAMP or data plane protocol like IPv6. In IPv6 the flow label is defined in RFC 6437 to influence multipathing.

Best wishes
Thomas