Re: Request for comments: draft-jain-nvo3-overlay-oam-01.txt

"S. Davari" <davarish@yahoo.com> Fri, 28 February 2014 03:48 UTC

Return-Path: <davarish@yahoo.com>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7EFFE1A02D9 for <l2vpn@ietfa.amsl.com>; Thu, 27 Feb 2014 19:48:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.544
X-Spam-Level:
X-Spam-Status: No, score=-2.544 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.547] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id biOkD0guIpda for <l2vpn@ietfa.amsl.com>; Thu, 27 Feb 2014 19:48:11 -0800 (PST)
Received: from nm42-vm5.bullet.mail.bf1.yahoo.com (nm42-vm5.bullet.mail.bf1.yahoo.com [216.109.114.204]) by ietfa.amsl.com (Postfix) with ESMTP id 022961A02DF for <l2vpn@ietf.org>; Thu, 27 Feb 2014 19:48:10 -0800 (PST)
Received: from [98.139.212.149] by nm42.bullet.mail.bf1.yahoo.com with NNFMP; 28 Feb 2014 03:48:09 -0000
Received: from [68.142.230.78] by tm6.bullet.mail.bf1.yahoo.com with NNFMP; 28 Feb 2014 03:48:09 -0000
Received: from [127.0.0.1] by smtp235.mail.bf1.yahoo.com with NNFMP; 28 Feb 2014 03:48:09 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1393559289; bh=MvBz+0JEPFGd+dZ8UUks1GBKRhCh1KSiYsp/7FqIXMQ=; h=X-Yahoo-Newman-Id:X-Yahoo-Newman-Property:X-YMail-OSG:X-Yahoo-SMTP:X-Rocket-Received:References:Mime-Version:In-Reply-To:Content-Type:Content-Transfer-Encoding:Message-Id:Cc:X-Mailer:From:Subject:Date:To; b=y0QNqI8RPsuEEYU12ZtUAP22UFGLMNGx7IxU9jzvV4unPYOPzL2MSxLXqZc3Gt6ejuGNdBI41XwVGSmZuq5N7mqjQzzqrenoEakR31FYY6TW8QiihW9NtMU+H7mQ6t6+bJ9B+75TC0KRZ80HSUsyTX6a0hyDeTmTIPCfGwC9Drg=
X-Yahoo-Newman-Id: 117606.92077.bm@smtp235.mail.bf1.yahoo.com
X-Yahoo-Newman-Property: ymail-3
X-YMail-OSG: CS87ehIVM1lcm.l4UB8H4p5g9w1BTAmEqycZTEN2G_8gwA3 p.eS3FfetxgCMK3lPxJIk1VPNlZkreMb7L524yLzQtffOkJ0eVgPlYsodtXR ekL7HnjXLR9WI7bf9E5JiTg4pAyjw4G_9BrR1hUuBOJ.MT8IRydx6VWjAY_5 D0BdG_hAsJCxLkgL8rrGnlTbQMwUfNtSjrLVFxdXUIAURekKj.Z8HjmCu.Sd KlVh9PDCrXkNgDT8ujRZQiurYzhfYsEChoTOzARHs3cHFdvdp_cIdCt628qR 6CRpCOmoa9jPozUi4cZqJjWE5Q36oRWKI8XIc_7ptQaKJA.n9FZOLBHjFAxl HJtcPdQmN4W7YuqKv4ti13HCFX3XnqfkgXiQmwSehX16c5RkxXd3rs6ur3XO yJDisazZbqJNZyBU2NIzsdYN9busWZ87voyF_n5aaiMg0Ur6SBe2NY78_N8l WvfV9vhWhZir5E16pgGsDFuujf3v4yIaKryspQ.XyY0GAN5GT5rMpbdmQw2F gL6ATMhj2r7jn8_z7wQGG1BnwO6Kn226cq5p9bRvRJk2fW7lJWPwhKDU-
X-Yahoo-SMTP: ygPrP9CswBCWPbPtKJlJyLY0KMlg
X-Rocket-Received: from [10.0.0.3] (davarish@69.181.137.230 with xymcookie [66.196.81.168]) by smtp235.mail.bf1.yahoo.com with SMTP; 28 Feb 2014 03:48:09 +0000 UTC
References: <CAPCgso32vYqPEq4upa1FG78quZwBOJpzsCSCYTX2R7XgHzLiNA@mail.gmail.com> <B23247FA-7CED-4F78-8858-076CA83F613C@broadcom.com> <CF351FD5.B21EA%wim.henderickx@alcatel-lucent.com> <D26A6EDE-42D3-45A6-8FFC-3B1850433722@lucidvision.com> <CF34C0FC.7D7B%alohiya@juniper.net> <4A6CE49E6084B141B15C0713B8993F281BFCD485@SJEXCHMB12.corp.ad.broadcom.com> <CAPCgso0O4n+4cZvbc4Mb_CSoDgYnUMG2axVM9K9nA4jpVy2Qhw@mail.gmail.com>
Mime-Version: 1.0 (1.0)
In-Reply-To: <CAPCgso0O4n+4cZvbc4Mb_CSoDgYnUMG2axVM9K9nA4jpVy2Qhw@mail.gmail.com>
Content-Type: multipart/alternative; boundary=Apple-Mail-80D599F2-2F49-4974-A51F-53FDE3C335E6
Content-Transfer-Encoding: 7bit
Message-Id: <2BC895F1-6364-447A-9C3C-3630CF05E60A@yahoo.com>
X-Mailer: iPhone Mail (11B651)
From: "S. Davari" <davarish@yahoo.com>
Subject: Re: Request for comments: draft-jain-nvo3-overlay-oam-01.txt
Date: Thu, 27 Feb 2014 19:48:05 -0800
To: Kanwar Singh <kanwar@nuagenetworks.net>
Archived-At: http://mailarchive.ietf.org/arch/msg/l2vpn/b10kOnXV14PVUCQEug2omWPsAWo
Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>, Vinay Bannai <vbannai@paypal.com>, Ravi Shekhar <rshekhar@juniper.net>
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Layer 2 Virtual Private Networks <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn/>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Feb 2014 03:48:14 -0000

Cloud provider could easily inject and remove BFD packets encapsulated as overlay. This can easily be done with some reserved MAC or IP address. 

Regards,
Shahram


> On Feb 27, 2014, at 6:25 PM, Kanwar Singh <kanwar@nuagenetworks.net> wrote:
> 
> Hi Shahram,
> 
>  
> 
> Regarding BFD for Inner IP, it seems you are suggesting that BFD needs to be running in between two End-System(s) (i.e. Guest VM/Tenant) using the Overlay. But, Cloud providers would  not necessarily want to rely on applications running in Guest OS/Tenant  to verify connectivity of their Networks. In-fact, in most cases Cloud Providers won’t even have access to Guest / Tenant VMs to launch such applications. 
> 
>  
> 
> Thanks,
> 
> Kanwar
> 
> 
> 
>> On Thu, Feb 27, 2014 at 11:19 AM, Shahram Davari <davari@broadcom.com> wrote:
>> Anil,
>> 
>>  
>> 
>> I don’t agree. If you use for example BFD for inner IP, and if BFD says connectivity is OK, this implies that the Overlay connectivity is also OK, since BFD is inside the overlay.
>> 
>> Also I am not sure why you are adding the VNI, VSID, etc in the message as TLV, since these value are already in the packet header.
>> 
>>  
>> 
>> Thx
>> Shahram
>> 
>>  
>> 
>> From: L2vpn [mailto:l2vpn-bounces@ietf.org] On Behalf Of Anil Lohiya
>> Sent: Thursday, February 27, 2014 10:19 AM
>> To: Thomas Nadeau; Henderickx, Wim (Wim)
>> Cc: l2vpn@ietf.org; Pradeep Jain; Vinay Bannai; Ravi Shekhar
>> Subject: Re: Request for comments: draft-jain-nvo3-overlay-oam-01.txt
>> 
>>  
>> 
>>  
>> 
>> Existing ping/traceroute mechanisms don't work in the virtualized environment e.g. ping may report that IP reachability between the ingress and egress tunnel endpoints is fine but the end systems (i.e. VM, physical server etc.) connectivity for a tenant could still be broken. This is because ping only verifies basic connectivity between two endpoints in the underlay but NOT in the context of overlay segments. Hence, we need debugging tools that work in the overlay environment. Think why there was a need to have lsp ping … requirement with IP overlays is not much different.
>> 
>>  
>> 
>> Question is not whether applications are resilient or not… One can not ignore the fact that operators have to think about having the right tools when that "inevitable" call  comes from their customer about deteriorating application performance or traffic blackhole and there are no tools today specific to overlay network debugging.
>> 
>>  
>> 
>> - Anil
>> 
>>  
>> 
>> From: Thomas Nadeau <tnadeau@lucidvision.com>
>> Date: Thursday, February 27, 2014 8:05 AM
>> To: "Henderickx, Wim (Wim)" <wim.henderickx@alcatel-lucent.com>
>> Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>rg>, Pradeep Jain <pradeep@nuagenetworks.net>et>, Vinay Bannai <vbannai@paypal.com>om>, Ravi Shekhar <rshekhar@juniper.net>
>> Subject: Re: Request for comments: draft-jain-nvo3-overlay-oam-01.txt
>> 
>>  
>> 
>>  
>> 
>> The question is, and perhaps the draft could explain this, is why existing tools a) are insufficient and b) cannot be modified. 
>> 
>> Operationally speaking, b is preferred if you ask me as learning a new tool/model for diagnosis and trouble-shooting is expensive and painful.
>> 
>> For example, if we took the tact of reinventing say IP ping for every underlying transport, then we'd have 50 tools by now.
>> 
>>  
>> 
>> --Tom
>> 
>>  
>> 
>>  
>> 
>>  
>> 
>> On Feb 27, 2014:11:02 AM, at 11:02 AM, Henderickx, Wim (Wim) <wim.henderickx@alcatel-lucent.com> wrote:
>> 
>> 
>> 
>> 
>> Because we also need to trace L2 endpoints besides IP endpoint.
>> 
>>  
>> 
>> From: Shahram Davari <davari@broadcom.com>
>> Date: Thursday 27 February 2014 16:58
>> To: Kanwar Singh <kanwar@nuagenetworks.net>
>> Cc: "l2vpn@ietf.org" <l2vpn@ietf.org>rg>, Pradeep Jain <pradeep@nuagenetworks.net>et>, Vinay Bannai <vbannai@paypal.com>om>, Ravi Shekhar <rshekhar@juniper.net>
>> Subject: Re: Request for comments: draft-jain-nvo3-overlay-oam-01.txt
>> 
>>  
>> 
>> Hi
>> 
>>  
>> 
>> Why don't you use existing IP based OAM messages such as BFD, OWAMP, TWAMP, etc.
>> 
>> Regards,
>> 
>> Shahram
>> 
>>  
>> 
>> 
>> On Feb 27, 2014, at 7:46 AM, "Kanwar Singh" <kanwar@nuagenetworks.net> wrote:
>> 
>> Dear All,
>> 
>>  
>> 
>> We have submitted the below draft that proposes Generic OAM and Datapath Failure Detection Mechanism(s) for Overlay Networks.
>> 
>>  
>> 
>> We would like to solicit inputs from the members of L2VPN WG.
>> 
>>  
>> 
>> Please review the same and update us with your inputs/feedback.
>> 
>>  
>> 
>> Warm Regards
>> - Kanwar
>>  
>>  
>> A new version of I-D, draft-jain-nvo3-overlay-oam-01.txt has been successfully submitted by Kanwar Singh and posted to the
>> IETF repository.
>> 
>> Name:           draft-jain-nvo3-overlay-oam
>> Revision:       01
>> Title:          Generic Overlay OAM and Datapath Failure Detection
>> 
>> Document date:  2014-02-12
>> Group:          Individual Submission
>> Pages:          44
>> URL:            http://www.ietf.org/internet-drafts/draft-jain-nvo3-overlay-oam-01.txt
>> 
>> Status:         https://datatracker.ietf.org/doc/draft-jain-nvo3-overlay-oam/
>> 
>> Htmlized:      http://tools.ietf.org/html/draft-jain-nvo3-overlay-oam-01
>> 
>> Diff:              http://www.ietf.org/rfcdiff?url2=draft-jain-nvo3-overlay-oam-01
>> 
>> 
>> Abstract:
>>    This proposal describes a mechanism that can be used to detect Data
>>    Path Failures of various overlay technologies as VXLAN, NVGRE,
>>    MPLSoGRE and MPLSoUDP and verifying/sanity of their Control and Data
>> 
>>    Plane for given Overlay Segment.  This document defines the following
>>    for each of the above Overlay Technologies:
>> 
>>    o  Encapsulation of OAM Packet, such that it has same Outer and
>>       Overlay Header as any End-System's data going over the same
>> 
>>       Overlay Segment.
>> 
>>    o  The mechanism to trace the Underlay that is exercised by any
>>       Overlay Segment.
>> 
>>    o  Procedure to verify presence of any given Tenant VM or End-System
>>       within a given Overlay Segment at Overlay End-Point.
>> 
>> 
>>    Even though the present proposal addresses Overlay OAM for VXLAN,
>>    NVGRE, MPLSoGRE and MPLSoUDP, but the procedures described are
>>    generic enough to accommodate OAM for any other Overlay Technology.
>