Re: [Last-Call] [sfc] Last Call: <draft-ietf-sfc-oam-framework-11.txt> Availability in SFC OAM (Service Function Chaining (SFC) Operations, Administration and Maintenance (OAM) Framework) to Informational RFC

Greg Mirsky <gregimirsky@gmail.com> Mon, 13 April 2020 02:40 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D73E3A0ADE; Sun, 12 Apr 2020 19:40:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 24qpSyw5Zrbf; Sun, 12 Apr 2020 19:40:30 -0700 (PDT)
Received: from mail-lf1-x12f.google.com (mail-lf1-x12f.google.com [IPv6:2a00:1450:4864:20::12f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C5513A0ADC; Sun, 12 Apr 2020 19:40:28 -0700 (PDT)
Received: by mail-lf1-x12f.google.com with SMTP id u10so4352662lfo.8; Sun, 12 Apr 2020 19:40:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=5lAMVMxhULqRSurp/KNgMkiMa1Thx2+QiC/tkUFsy54=; b=h/MMHSWu6pyJ5C0XPqHG+a9wNgvETfKQ2oxM0N65hD+khaz3+Oa2N2hnGSlZooN3Kg QrCpNoV1Upgm1KQBbNQXnfpv8uynuASdkPQQ/Ls6UTzacGq8WjefvXihInzfWd9wMmHj KeK/noWcZKPNFvwecl95RSV7Z08UFRlqUapbPGfeX9fugNuSAR1JdVxzk9zFxL+1lmbS axn4hB3sZtN9Tmpc1sm7d6cGYj1udrKAO56+wKwWt6PrpfxGTFPP9WmKYJTV4b7H+RJm 6svoD1N5Zchg343BUM0eRFdLUOm2rbQZTESER+DXpCEqeShQ7dMbd5Tb0tzG4yzdxZMe mcWQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=5lAMVMxhULqRSurp/KNgMkiMa1Thx2+QiC/tkUFsy54=; b=R96espBlGclbSw0tUXN4EWHSLv9HiOpiBEWoYQlI/FlCjpIN9GZvTx5+tQ9G4hcELv 9HAIRPq5Q8pOUAHak5nsEbUMh4ZFWv83qXIgifKBCZh3J+b55ztjM9LdVlkXJ1iaqdCo L3UP+2z+NZZa1UtKaoXy01P1Cf7g3F2eb7i0mdS2kShmxbHp3EnEJXyRQao9S1QVhasv 2HCidrt7SOy55PVIPJGIWBHegZ4jOVzfiYVrV5RtjaHP870fWH//kUUe2Nqqt2N6RWNt YPL+B0lEQHZPQCY6CFaKbm5iOdKMS4/FQVLo7j5TxUqnizj5fv5hElTwx3iw2F87c4XF 0iiQ==
X-Gm-Message-State: AGi0Pua234h/KUvcyUope1DVk3q49nkXNi2lBI+S1ASFUMPhwJ9ARIDs l2SyWaTGDJ6kem12p5RKJspsalX7sWkwm0YaC+hRXw==
X-Google-Smtp-Source: APiQypL3n0TztvDA7kVSB2RJTyktAfrU9FzB2vQRL9xY3j+hJr3NBparXrdS+b1vhEGz2rXupoYVaVvcjN7q2e6W3HE=
X-Received: by 2002:a05:6512:695:: with SMTP id t21mr9127115lfe.158.1586745626969; Sun, 12 Apr 2020 19:40:26 -0700 (PDT)
MIME-Version: 1.0
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Sun, 12 Apr 2020 19:40:15 -0700
Message-ID: <CA+RyBmUdVPtFfg+2mO+4RHx5UPFqZPtsaQXXvdMksYi+UvqthQ@mail.gmail.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Cc: "last-call@ietf.org" <last-call@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "draft-ietf-sfc-oam-framework@ietf.org" <draft-ietf-sfc-oam-framework@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000071c8e505a32301bb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/Hm4tY76DBD_dx4sSqW11TUvkFqg>
Subject: Re: [Last-Call] [sfc] Last Call: <draft-ietf-sfc-oam-framework-11.txt> Availability in SFC OAM (Service Function Chaining (SFC) Operations, Administration and Maintenance (OAM) Framework) to Informational RFC
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Apr 2020 02:40:34 -0000

Dear Carlos,
thank you for your response. I think that it will make easier to follow the
discussion if we split into several threads. Please let me know if you
would prefer to keep the single thread.
This thread would be to discuss the interpretation of availability in
draft-ietf-sfc-oam-requirements.

First, is the definition of the availability of constant bit-rate digital
paths and connections as documented in ITU-T's G.826 (apologies for a
lengthy quote):

   - the definition uses Severely Errored Seconds (SES) (this definition
   for paths, the definition for connections is somewhat different): A
   one-second period which contains ≥30% errored blocks
   or at least one defect. SES is a subset of ES (errored seconds).
   - Now we can check the definitions of unavailable and available time:

A period of unavailable time begins at the onset of ten consecutive SES
events. These ten seconds
are considered to be part of unavailable time. A new period of available
time begins at the onset of
ten consecutive non-SES events. These ten seconds are considered to be part
of the available time.

Is this definition close to the interpretation of the term "availability"
in the draft? What constitutes the unavailability of an SF or an SFF?
I hope that with the ITU's definition of the term in front of us (I don't
know of any other definition by an SDO) the interpretation of the term in
this draft might be easier to formulate.

Regards,
Greg

On Fri, Apr 10, 2020 at 10:31 AM Carlos Pignataro (cpignata) <
cpignata@cisco.com> wrote:

> Dear Greg,
>
> Let me first share a top-post comment, followed by inlined responses.
>
> Scanning through your extensive set of review comments below, it seems to
> me that several of these are issues that you brought up in the past already
> at SFC, including during WGLC, and the SFC chairs declared consensus on
> their disposition. Many of the comments below are repetition to the
> previous extensive reviews you shared, and not additional or incremental
> comments. Repeating them again will not change the responses.
>
> In this context, please see:
> https://mailarchive.ietf.org/arch/msg/sfc/mDkO4jSkyxJ6ofup-YbBpIF5BEs/
> Which was not responded to by you.
>
> Please see inline with:
> *CMP: bold hopeful underlined green*.
>
>
> 2020/04/09 午後6:04、Greg Mirsky <gregimirsky@gmail.com>のメール:
>
> Dear All,
> I have reviewed the draft and wanted to share my comments on the
> draft-ietf-sfc-oam-framework. Please find them organized into two sections
> - general and according to the text of the draft.
> General:
>
>    - SFC OAM Architecture
>
> *CMP: No. This document does not use the phrase "SFC OAM **Architecture”,
> nor it defines it.*
>
> The document includes three components in the SFC OAM architecture:
>
>
> *CMP: No. The document explains**:*
>
>    For the purpose of defining
>    the OAM framework, the service layer is broken up into three distinct
>    components:
>
>
> Service Function (SF), Service Function Chain (SFC), which is equivalent
> to the collection of all SFPs, and Classifier. Firstly, making SFC OAM a
> component of SFC OAM appears as an unfortunate selection of terminology
> that might be a source of confusion and misinterpretation (how one
> identifies the context of using "SFC OAM"?).
>
>
> *CMP: First, frankly I am unclear of what exactly you mean. It seems to me
> you are creating the confusion. "SFC OAM" is not a component. SFC is the
> component (S3.1) containing OAM Functions.*
>
> *CMP: Second, Greg, you say "**might be a source of confusion and
> misinterpretation**”. However, to our knowledge, there has not been any
> confusion or misinterpretation.*
>
> *CMP: Third, Please see*
> https://mailarchive.ietf.org/arch/msg/sfc/fTsNNMAoHe6D6Vnrox6oQJJ5JO8/
>
> The inclusion of an SF in the SFC OAM reference model is to provide the
> ability to verify "whether the SF is providing its intended service". Such
> a goal appears as a layer violation, in part of OAM, since the verification
> of the correctness of a service provided by the SFC is in the scope of
> Service OAM to which SFC OAM plays the role of transport OAM.
>
>
> *CMP: Apologies, I read this a few times and I am not sure what is meant.
> If you mean "why does the WG document include SF?", then this was discussed
> in your previous review.*
>
> In addition, the document notes that the fact of existing and deployed SFs
> is likely to leave SF OAM being implementation-specific. Combining these
> two aspects, the inclusion of the SF OAM component in the SFC OAM reference
> model is questionable as it doesn't seem to provide a good opportunity for
> the standardization given, on one hand, the lack drafts and, on the other
> hand, the growing number of deployed implementations. Figure 2 that
> illustrates SFC OAM components does not provide clarity to the
> relationships between SFC OAM and SF OAM components of the reference model
> as SF OAM is depicted both as the separate entity as well as part of SFC
> OAM component.
>
>
>
>    - The interpretation of 'availability' in SFC OAM
>
> The document extensively discusses an SFC OAM characteristic, availability
> sections on SF and SFC availability, as well as references to the
> particular OAM tool as being capable to check the availability).
> Availability is well-defined for some technologies, e.g. constant bit-rate
> paths, while not being used at all in many other networking technologies,
> e.g., packet switching networks. The definition of the availability for the
> constant bit-rate paths can be found in G.826. The specification firstly
> defines the opposite, the state of unavailability. Also, note that both
> states of unavailability and availability are defined as being continuous
> in time, at least 10 seconds interval long. I couldn't find any definition
> of the availability in IETF documents I'm familiar with. The most
> comprehensive IETF document on OAM, RFC 7276, doesn't use the availability
> as one of the OAM states or performance metrics detected or measured by OAM
> methods analyzed in it. The draft-ietf-sfc-oam-framework uses the term
> 'availability' in many places referring to the availability of SFC elements
> like SFF and SF without providing the definition. As a result, it is not
> clear what the availability of SFC OAM is and how it can be detected or
> measured. It appears that the term in this document is being used
> colloquially rather than as the technical terminology. Such a manner of
> using terminology does affect the technical accuracy of the document and
> very likely leave a reader familiar with the existing definitions of the
> term in a state of confusion.
>
>
> *CMP: Greg, please see: *
> https://mailarchive.ietf.org/arch/msg/sfc/1r8s3iB139-ETZtGskpocWxC3Ao/*.
> That email **from the chairs** went unanswered.*
>
>
> Going through the text:
>
>    - section 3.1.1 in the last paragraph states:
>
>    This framework document provides a RECOMMENDED framework where a
>    generalized approach is taken to verify that a SF is sufficiently
>    available (i.e., an adequate granularity to provide a basic SF
>    service).
>
> That "RECOMMENDED framework" seems like a deviation from the scope of the
> document defined in the Abstract and Document Scope:
>    The focus of this document is to provide an architectural framework
>    for SFC OAM, particularly focused on the aspect of the Operations
>    component within OAM.
>
>
>
> *CMP: Good point, Martin noted the same issue and it is addressed in a
> forthcoming revision.*
>
>
>    - the definition of connectivity in Section 4.1 appears as using
>    circular logic by defining itself through connectivity verification whereas
>    it is a composition of verifying that packets that belong to the monitored
>    flow are reaching the egress node and only packets that belong to that flow
>    are received by the egress (the case when a packet that belongs to a
>    different flow is detected constitutes miscommunication defect and may lead
>    to miscommunication state).
>
>
> *CMP: Apologies it is hard for me to follow. However, combining *
> https://mailarchive.ietf.org/arch/msg/sfc/mDkO4jSkyxJ6ofup-YbBpIF5BEs/
> * with *
> https://mailarchive.ietf.org/arch/msg/sfc/fTsNNMAoHe6D6Vnrox6oQJJ5JO8/*,
> please provide suggested text for an improved definition.*
>
>
>    - also in Section 4.1, the path MTU discovery and monitoring, packet
>    re-ordering and/or corruption, arbitrary path monitoring are misattributed
>    to connectivity verification function
>
> *CMP: Same as above.*
>
>
>    - notification to other application (Section 4.2) is not part of OAM
>    and is implementation-specific
>
> *CMP: I assume this refers to:*
>
>    o  Notifying the detected failures to other OAM functions or
>       applications to take appropriate action.
>
>
>
> *CMP: If so, do you suggest that OAM detects failures but notifies noone?*
>
>
>    - 'PM' in PM OAM is usually expanded as 'Performance Monitoring',
>    sometimes 'Performance Measurement". Used in the document "Performance
>    Management" is extremely unusual, if not misleading.
>
>
> *CMP: We can change "Performance Management" to "Performance Measurement".*
>
>
>    - In Section 4.4 delay variance (variation)/jitter is listed as a
>    measurable performance metric even though it can be only calculated using a
>    set of delay measurements. On the other hand, most performance monitoring
>    active OAM protocols are well-equipped to detect packet re-ordering,
>    unwarranted packet duplication.
>
> *CMP: I am sorry I do not follow what you are asking here. What would you
> like to see?*
>
>
>    - Further in Section 4, jitter, i.e. delay variation is being
>    mentioned as a measurable performance metric. That is not the case.
>    Latency, i.e. delay, is a measurable metric but jitter (delay variation)
>    can only be calculated.
>
> *CMP: The text says "**could also be calculated**"*
>
>
>    - Table 3 in Section 5.1 raises several questions:
>       - Is listing E-OAM is to suggest that an overlay network supporting
>       SFC NSH can be instantiated directly over the Ethernet network? Can you
>       illustrate that with an example?
>
> *CMP: See...* https://tools.ietf.org/html/rfc8300#section-10.1
>
>
>    - It appears that some of the information presented in Table 3
>       contradicts other material in the draft, for example, Section 6.4.1. The
>       section indicates that ICMP may be used as a connectivity verification tool
>       for both SF and SFC OAM.
>
> *CMP: I do not see a contradiction. Do you have specifics?*
>
>
>    - In Section 6.4.1 ICMP is positioned as a suitable mechanism to "test
>    the network reachability" (that seems like a new OAM function being
>    introduced in the section). Because SFC can be realized over a number of
>    combinations of underlay and overlay technologies, I believe, an example
>    (or a couple of examples would be much better) demonstrating the
>    encapsulation of an ICMP message and, particularly, triggering ICMP Echo
>    Reply on the proper element of the SFP. I have to admit, I couldn't imagine
>    the encapsulation that would make ICMP-over-SFC work as IP Ping/traceroute.
>
> *CMP: What exactly are you requesting or is the concern? The section
> describes already what you ask.*
>
>
>    - Section 6.4.2 makes the positioning statement for BFD and S-BFD as
>    follows:
>
> BFD or S-BFD could be leveraged to perform continuity function for SF or
> SFC.
> The statement, in regard to BFD, contradicts with RFC 5880 which explains
> the goal of BFD as follows:
>    ... a protocol intended to detect faults in the
>    bidirectional path between two forwarding engines, including
>    interfaces, data link(s), and to the extent possible the forwarding
>    engines themselves ...
> And the text in the second paragraph on Section 6.4.2 appears to describe
> a way of using S-BFD, not of BFD.
>
>
>
> *CMP: It describes BFD, which can be used to verify continuity in
> connectivity.*
>
>
>    - Section 6.4.3 suggests that iOAM could be used "perform SF
>    availability and SFC availability or performance measurement". I agree with
>    that statement in part of performance measurement but the references to the
>    "SF availability and SFC availability", without the definition of
>    availability in the context of SFC OAM, appear as not sufficiently
>    justified.
>
> *CMP: Greg, please see: *
> https://mailarchive.ietf.org/arch/msg/sfc/1r8s3iB139-ETZtGskpocWxC3Ao/*.
> That email **from the chairs** went unanswered.*
>
>
>    - Section 6.4.4 makes a reference to an individual draft that was last
>    updated some four and a half years ago. It appears that such a long time is
>    an indication of a lack of interest to work on the proposed solution by
>    the authors or anyone else..
>
> *CMP: Greg... this was also covered multiple times already, and
> re-re-repeating will not change the response.*
>
> *CMP: First, Internet-Drafts are "work in progress.**”*
>
> *CMP: Second, please see *
> https://tools.ietf.org/html/draft-penno-sfc-trace-03#section-6
> *CMP: Running code seems more relevant than a non-implemented
> refreshed-but-not-updated I-D...*
>
>
>    - Section 7 and, in particular, Table 4 seems as not closely relevant
>    to the subject or OAM. Especially since the title of Table 4 is not
>    reflecting the content of the table itself. RFC 6291 recommends using Mgmt
>    acronym for Management and O&M - for OAM and Management. Acronym OAM is
>    recommended to be expanded and used in the IETF document solely for
>    Operations, Administration, and Maintenance.
>
>
>
> *CMP: This was again already covered, and in fact updated and moved based
> on your previous comments.*
>
> Summarizing my comments, I find so many problematic parts in the text that
> I've to question the usefulness of the requirement in the Introduction
>    SFC OAM solution documents should refer to this document to indicate
>    the SFC OAM component and the functionality they target.
> and the value of publishing this document in its current form.
>
>
> *CMP: Greg, you wrote the same thing on WG Last-call, and the chairs
> responded to that perspective.*
>
> *CMP: It was a bit hard for me to parse some of you comments. As it was
> requested before by the SFC chairs, if you have comments accompany them by
> textual suggestions.*
>
> *CMP: **Best,*
>
> *CMP: **Carlos.*
>
> Regards,
> Greg
>
>
> ---------- Forwarded message ---------
> From: The IESG <iesg-secretary@ietf.org>
> Date: Thu, Mar 26, 2020 at 8:47 AM
> Subject: [sfc] Last Call: <draft-ietf-sfc-oam-framework-11.txt> (Service
> Function Chaining (SFC) Operations, Administration and Maintenance (OAM)
> Framework) to Informational RFC
> To: IETF-Announce <ietf-announce@ietf.org>
> Cc: <sfc-chairs@ietf.org>, <draft-ietf-sfc-oam-framework@ietf.org>, <
> martin.vigoureux@nokia.com>, <tal.mizrahi.phd@gmail.com>, <sfc@ietf.org>
>
>
>
> The IESG has received a request from the Service Function Chaining WG (sfc)
> to consider the following document: - 'Service Function Chaining (SFC)
> Operations, Administration and
>    Maintenance (OAM) Framework'
>   <draft-ietf-sfc-oam-framework-11.txt> as Informational RFC
>
> The IESG plans to make a decision in the next few weeks, and solicits final
> comments on this action. Please send substantive comments to the
> last-call@ietf.org mailing lists by 2020-04-09. Exceptionally, comments
> may
> be sent to iesg@ietf.org instead. In either case, please retain the
> beginning
> of the Subject line to allow automated sorting.
>
> Abstract
>
>
>    This document provides a reference framework for Operations,
>    Administration and Maintenance (OAM) for Service Function Chaining
>    (SFC).
>
>
>
>
>
> The file can be obtained via
> https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/
>
> IESG discussion can be tracked via
> https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/ballot/
>
> The following IPR Declarations may be related to this I-D:
>
>    https://datatracker.ietf.org/ipr/3440/
>    https://datatracker.ietf.org/ipr/3121/
>
>
>
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
> --
> last-call mailing list
> last-call@ietf.org
> https://www.ietf.org/mailman/listinfo/last-call
>
>
>