Re: [Last-Call] [sfc] Last Call: <draft-ietf-sfc-oam-framework-11.txt> Availability in SFC OAM (Service Function Chaining (SFC) Operations, Administration and Maintenance (OAM) Framework) to Informational RFC

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Mon, 13 April 2020 03:13 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4AFC53A0BB7; Sun, 12 Apr 2020 20:13:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.619
X-Spam-Level:
X-Spam-Status: No, score=-9.619 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=nAIyxXnl; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=VUePUdgC
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4vIUx7Pgzc8m; Sun, 12 Apr 2020 20:12:57 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 201E03A0BB3; Sun, 12 Apr 2020 20:12:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=72315; q=dns/txt; s=iport; t=1586747577; x=1587957177; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=OcH4LS43sn7I9FZ8AkSktZwz7Ho0lp550hmYeY2+KFo=; b=nAIyxXnl7MrFZEzG76wPmbtGZkUaU9lDwETy9MabRhLojwvQOrdXvWrB EFps0n4vaDnunn8Flk/uosLR+IoxjKY1qsj1eD+AacPsFwb289N2H77Sx g1OIF3/Z8oezjpal43fg/yjqaNX3KPikIUYODmDGlNW+/kMxUdG0DvIfS k=;
IronPort-PHdr: 9a23:gdplGh1FI49/R84FsmDT+zVfbzU7u7jyIg8e44YmjLQLaKm44pD+JxKGt+51ggrPWoPWo7JfhuzavrqoeFRI4I3J8RVgOIdJSwdDjMwXmwI6B8vQAlX6I/jjcyUSF8VZX1gj9Ha+YgBY
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DJAAAZ2JNe/4QNJK1gBhoBAQEBAQEBAQEDAQEBAREBAQECAgEBAQGBe4ElLyQsBWwPSSAECyoKhBKDRgOKZ4I6JYEBiHGOMYFCgRADUAQKAQEBDAEBGAEKCgIEAQGERAIXgXkkOBMCAwEBCwEBBQEBAQIBBQRthSoHJQyFcAEBAQEDAQEQCAEIHQEBLAQHAQ8CAQYCEQECAQIhAQIEAwICAh8GCxQDBggCBAENBRsHgwQBgX5NAy4BDpJjkGcCgTmIYnWBMoJ/AQEFgTIBE0GCfQ0Lgg4DBoE4gmKJUxqBQT+BEAEnDBCBT0k1PoIeSQEBAgEBgScFARIBEQ8hBgcJglwygiyOGIJ/hgqKRI50MkkKgkGHfogdgnKEQh2CU4hFhGWMKY9RiTGCPY0fbYJOAgQCBAUCDgEBBYFpImdwcBUaISoBggoBATI+EhgNiyeBfDiDO4UUHIUldAKBJ40vAYEPAQE
X-IronPort-AV: E=Sophos;i="5.72,377,1580774400"; d="scan'208,217";a="663830235"
Received: from alln-core-10.cisco.com ([173.36.13.132]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 13 Apr 2020 03:12:54 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 03D3CsLA031382 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 13 Apr 2020 03:12:54 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sun, 12 Apr 2020 22:12:54 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sun, 12 Apr 2020 22:12:54 -0500
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Sun, 12 Apr 2020 23:12:53 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=V2XR2xVeeJFkYbpeO+jzhTV+cD7A3lGqpF4oRmaHejKKX5Zbkkf8Tl3kASLbmF0XlAt2Rdot6qgn4lAauwUS65TIM0nPQV9GN41PhbuZ1w/Y/nC6m9/FfXqKkguCXsm9h+e/uSSd+MCK28pioUQ9yaddDh1qQi0LWi9BA35mzRb6NQ+RXSBkjZDhfhOQZx1nmi54nns6yJBW4Um4JA40mzvp2ZRaqCRPmWAe5OkGZNe3NHk/AR0Kkt6TKAEWgWGlaRO5cYvKG2e/tRV7oHh9X9vLnpNp6QTsTKFLus1rivPik9e3mZbatyPVv9sv+7KoPAfr3CFjQEOnywOytffDRQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OcH4LS43sn7I9FZ8AkSktZwz7Ho0lp550hmYeY2+KFo=; b=Dt09hLXKydad+VBLM17q0Z+MivfNZmC/QurWiU28B6J2MEzxGr0N/CH8rLNxses1zIOhy8ufsSWBTvtBHnHj9rBskpNIHV+mrvq3/FBj8ANCc7TnEsoREjNbQId46ggRxH1wqWP4zcu3lQJdffXoWYQyXQ9VbjxSRN0U5JYgkVZnRWhGPrM89qDE6F4uqO1AhwB56w/xZxg2vVBF4RsJ+G0EZ4vn2odcryi7Zeq7SRex2KQCuSAffSPlWffXskUgbzGLf5CdA8sSxHTY7CjDaP/v1BFrX5zw4/Lb2sw76e8ODnT7ICZkGitKcx78LCTqkYL86G7/epZVAjbosJmtEw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OcH4LS43sn7I9FZ8AkSktZwz7Ho0lp550hmYeY2+KFo=; b=VUePUdgCzBEta9cErZRJIKhciBF1Hz8PuqFQIa1REr2drBkQ1/p9y1TWHWfCzQqIu3LE76f98ARLazeGqgLrznc7iA1QIK35MonEjNgTtTU77VtN9oDXUbtjivRKmeoOjK7qK1VrHChEe3k+NQxLA7l1ftKSLt6QsxuDq83KkCk=
Received: from BN8PR11MB3635.namprd11.prod.outlook.com (2603:10b6:408:86::20) by BN8PR11MB3825.namprd11.prod.outlook.com (2603:10b6:408:8f::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2900.28; Mon, 13 Apr 2020 03:12:53 +0000
Received: from BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::9981:86d4:ca20:ff96]) by BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::9981:86d4:ca20:ff96%7]) with mapi id 15.20.2900.028; Mon, 13 Apr 2020 03:12:52 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>, Tal Mizrahi <tal.mizrahi.phd@gmail.com>
CC: "last-call@ietf.org" <last-call@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "draft-ietf-sfc-oam-framework@ietf.org" <draft-ietf-sfc-oam-framework@ietf.org>
Thread-Topic: [Last-Call] [sfc] Last Call: <draft-ietf-sfc-oam-framework-11.txt> Availability in SFC OAM (Service Function Chaining (SFC) Operations, Administration and Maintenance (OAM) Framework) to Informational RFC
Thread-Index: AQHWETzpERAEPLMI3EKGx4Kanpb896h2YFuA
Date: Mon, 13 Apr 2020 03:12:52 +0000
Message-ID: <B448F3BF-5340-4AFF-B147-B1E7DED4E2F9@cisco.com>
References: <CA+RyBmUdVPtFfg+2mO+4RHx5UPFqZPtsaQXXvdMksYi+UvqthQ@mail.gmail.com>
In-Reply-To: <CA+RyBmUdVPtFfg+2mO+4RHx5UPFqZPtsaQXXvdMksYi+UvqthQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.80.23.2.2)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cpignata@cisco.com;
x-originating-ip: [173.38.117.84]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: dd09c6b2-6056-47e8-b5b9-08d7df588e0c
x-ms-traffictypediagnostic: BN8PR11MB3825:
x-microsoft-antispam-prvs: <BN8PR11MB3825DE363DEC1E320A0E0FF7C7DD0@BN8PR11MB3825.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 037291602B
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN8PR11MB3635.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(10009020)(4636009)(136003)(376002)(396003)(39860400002)(366004)(346002)(316002)(54906003)(110136005)(33656002)(2906002)(6506007)(26005)(86362001)(53546011)(4326008)(6512007)(36756003)(6486002)(186003)(66446008)(8936002)(8676002)(71200400001)(66476007)(66556008)(64756008)(2616005)(30864003)(81156014)(966005)(5660300002)(66574012)(76116006)(478600001)(66946007)(91956017); DIR:OUT; SFP:1101;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 9WZ8DYuyNaxQ46QixLij8RyfDpJcimGDKTXUxaD5ns/V1n6BwMbTS7k/EbQSltV3x/wlgNIs2sSBxCBIzNSmubi6g2ZIFS+3dKJCCq/gkCAMThouxd46XP/LZyZj3KVUJ37DR11mKYj+UVtLOHOUiA==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_B448F3BF53404AFFB147B1E7DED4E2F9ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: dd09c6b2-6056-47e8-b5b9-08d7df588e0c
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Apr 2020 03:12:52.7609 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: L0ZwxWWZ465OV9Ifs9ipaVJ3j9KmS0o9t3PxZgg6mpS8dC9fOEfKyU8vs3mimNbl4LyKuryvoqT9NF35sFvM1w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3825
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.13, xch-rcd-003.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/UCf8fBWGuGJKf5DJ5xxHOHJsw3c>
Subject: Re: [Last-Call] [sfc] Last Call: <draft-ietf-sfc-oam-framework-11.txt> Availability in SFC OAM (Service Function Chaining (SFC) Operations, Administration and Maintenance (OAM) Framework) to Informational RFC
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Apr 2020 03:13:02 -0000

Dear Greg,

This thread would be to discuss the interpretation of availability in draft-ietf-sfc-oam-requirements.

Thank you for insisting, but, again, https://mailarchive.ietf.org/arch/msg/sfc/1r8s3iB139-ETZtGskpocWxC3Ao/. Instead of re-repeating, I’d kindly request you look at my previous responses.

Thank you also for bringing up an ITU definition, but I will pass :-)

Dear Tal,

From my perspective this topic was already closed two threads ago.

As document shepherd, I let you take it from here and work with Jim, Joel, and Martin as needed.

Please do let us know as shepherd if this needs further cycles from the authors.

Thanks,

Carlos.

2020/04/12 午後10:40、Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>のメール:

Dear Carlos,
thank you for your response. I think that it will make easier to follow the discussion if we split into several threads. Please let me know if you would prefer to keep the single thread.
This thread would be to discuss the interpretation of availability in draft-ietf-sfc-oam-requirements.

First, is the definition of the availability of constant bit-rate digital paths and connections as documented in ITU-T's G.826 (apologies for a lengthy quote):

  *   the definition uses Severely Errored Seconds (SES) (this definition for paths, the definition for connections is somewhat different): A one-second period which contains ≥30% errored blocks
or at least one defect. SES is a subset of ES (errored seconds).
  *   Now we can check the definitions of unavailable and available time:

A period of unavailable time begins at the onset of ten consecutive SES events. These ten seconds
are considered to be part of unavailable time. A new period of available time begins at the onset of
ten consecutive non-SES events. These ten seconds are considered to be part of the available time.

Is this definition close to the interpretation of the term "availability" in the draft? What constitutes the unavailability of an SF or an SFF?
I hope that with the ITU's definition of the term in front of us (I don't know of any other definition by an SDO) the interpretation of the term in this draft might be easier to formulate.

Regards,
Greg

On Fri, Apr 10, 2020 at 10:31 AM Carlos Pignataro (cpignata) <cpignata@cisco.com<mailto:cpignata@cisco.com>> wrote:
Dear Greg,

Let me first share a top-post comment, followed by inlined responses.

Scanning through your extensive set of review comments below, it seems to me that several of these are issues that you brought up in the past already at SFC, including during WGLC, and the SFC chairs declared consensus on their disposition. Many of the comments below are repetition to the previous extensive reviews you shared, and not additional or incremental comments. Repeating them again will not change the responses.

In this context, please see:
https://mailarchive.ietf.org/arch/msg/sfc/mDkO4jSkyxJ6ofup-YbBpIF5BEs/
Which was not responded to by you.

Please see inline with:
CMP: bold hopeful underlined green.


2020/04/09 午後6:04、Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>のメール:

Dear All,
I have reviewed the draft and wanted to share my comments on the draft-ietf-sfc-oam-framework. Please find them organized into two sections - general and according to the text of the draft.
General:

  *   SFC OAM Architecture

CMP: No. This document does not use the phrase "SFC OAM Architecture”, nor it defines it.

The document includes three components in the SFC OAM architecture:

CMP: No. The document explains:


   For the purpose of defining
   the OAM framework, the service layer is broken up into three distinct
   components:

Service Function (SF), Service Function Chain (SFC), which is equivalent to the collection of all SFPs, and Classifier. Firstly, making SFC OAM a component of SFC OAM appears as an unfortunate selection of terminology that might be a source of confusion and misinterpretation (how one identifies the context of using "SFC OAM"?).

CMP: First, frankly I am unclear of what exactly you mean. It seems to me you are creating the confusion. "SFC OAM" is not a component. SFC is the component (S3.1) containing OAM Functions.

CMP: Second, Greg, you say "might be a source of confusion and misinterpretation”. However, to our knowledge, there has not been any confusion or misinterpretation.

CMP: Third, Please see https://mailarchive.ietf.org/arch/msg/sfc/fTsNNMAoHe6D6Vnrox6oQJJ5JO8/

The inclusion of an SF in the SFC OAM reference model is to provide the ability to verify "whether the SF is providing its intended service". Such a goal appears as a layer violation, in part of OAM, since the verification of the correctness of a service provided by the SFC is in the scope of Service OAM to which SFC OAM plays the role of transport OAM.

CMP: Apologies, I read this a few times and I am not sure what is meant. If you mean "why does the WG document include SF?", then this was discussed in your previous review.

In addition, the document notes that the fact of existing and deployed SFs is likely to leave SF OAM being implementation-specific. Combining these two aspects, the inclusion of the SF OAM component in the SFC OAM reference model is questionable as it doesn't seem to provide a good opportunity for the standardization given, on one hand, the lack drafts and, on the other hand, the growing number of deployed implementations. Figure 2 that illustrates SFC OAM components does not provide clarity to the relationships between SFC OAM and SF OAM components of the reference model as SF OAM is depicted both as the separate entity as well as part of SFC OAM component.


  *   The interpretation of 'availability' in SFC OAM

The document extensively discusses an SFC OAM characteristic, availability sections on SF and SFC availability, as well as references to the particular OAM tool as being capable to check the availability). Availability is well-defined for some technologies, e.g. constant bit-rate paths, while not being used at all in many other networking technologies, e.g., packet switching networks. The definition of the availability for the constant bit-rate paths can be found in G.826. The specification firstly defines the opposite, the state of unavailability. Also, note that both states of unavailability and availability are defined as being continuous in time, at least 10 seconds interval long. I couldn't find any definition of the availability in IETF documents I'm familiar with. The most comprehensive IETF document on OAM, RFC 7276, doesn't use the availability as one of the OAM states or performance metrics detected or measured by OAM methods analyzed in it. The draft-ietf-sfc-oam-framework uses the term 'availability' in many places referring to the availability of SFC elements like SFF and SF without providing the definition. As a result, it is not clear what the availability of SFC OAM is and how it can be detected or measured. It appears that the term in this document is being used colloquially rather than as the technical terminology. Such a manner of using terminology does affect the technical accuracy of the document and very likely leave a reader familiar with the existing definitions of the term in a state of confusion.

CMP: Greg, please see: https://mailarchive.ietf.org/arch/msg/sfc/1r8s3iB139-ETZtGskpocWxC3Ao/. That email from the chairs went unanswered.


Going through the text:

  *   section 3.1.1 in the last paragraph states:

   This framework document provides a RECOMMENDED framework where a
   generalized approach is taken to verify that a SF is sufficiently
   available (i.e., an adequate granularity to provide a basic SF
   service).
That "RECOMMENDED framework" seems like a deviation from the scope of the document defined in the Abstract and Document Scope:
   The focus of this document is to provide an architectural framework
   for SFC OAM, particularly focused on the aspect of the Operations
   component within OAM.


CMP: Good point, Martin noted the same issue and it is addressed in a forthcoming revision.

  *   the definition of connectivity in Section 4.1 appears as using circular logic by defining itself through connectivity verification whereas it is a composition of verifying that packets that belong to the monitored flow are reaching the egress node and only packets that belong to that flow are received by the egress (the case when a packet that belongs to a different flow is detected constitutes miscommunication defect and may lead to miscommunication state).

CMP: Apologies it is hard for me to follow. However, combining https://mailarchive.ietf.org/arch/msg/sfc/mDkO4jSkyxJ6ofup-YbBpIF5BEs/ with https://mailarchive.ietf.org/arch/msg/sfc/fTsNNMAoHe6D6Vnrox6oQJJ5JO8/, please provide suggested text for an improved definition.


  *   also in Section 4.1, the path MTU discovery and monitoring, packet re-ordering and/or corruption, arbitrary path monitoring are misattributed to connectivity verification function

CMP: Same as above.

  *   notification to other application (Section 4.2) is not part of OAM and is implementation-specific

CMP: I assume this refers to:


   o  Notifying the detected failures to other OAM functions or
      applications to take appropriate action.

CMP: If so, do you suggest that OAM detects failures but notifies noone?

  *   'PM' in PM OAM is usually expanded as 'Performance Monitoring', sometimes 'Performance Measurement". Used in the document "Performance Management" is extremely unusual, if not misleading.

CMP: We can change "Performance Management" to "Performance Measurement".

  *   In Section 4.4 delay variance (variation)/jitter is listed as a measurable performance metric even though it can be only calculated using a set of delay measurements. On the other hand, most performance monitoring active OAM protocols are well-equipped to detect packet re-ordering, unwarranted packet duplication.

CMP: I am sorry I do not follow what you are asking here. What would you like to see?

  *   Further in Section 4, jitter, i.e. delay variation is being mentioned as a measurable performance metric. That is not the case. Latency, i.e. delay, is a measurable metric but jitter (delay variation) can only be calculated.

CMP: The text says "could also be calculated"


  *   Table 3 in Section 5.1 raises several questions:
     *   Is listing E-OAM is to suggest that an overlay network supporting SFC NSH can be instantiated directly over the Ethernet network? Can you illustrate that with an example?

CMP: See... https://tools.ietf.org/html/rfc8300#section-10.1

     *   It appears that some of the information presented in Table 3 contradicts other material in the draft, for example, Section 6.4.1. The section indicates that ICMP may be used as a connectivity verification tool for both SF and SFC OAM.

CMP: I do not see a contradiction. Do you have specifics?

  *   In Section 6.4.1 ICMP is positioned as a suitable mechanism to "test the network reachability" (that seems like a new OAM function being introduced in the section). Because SFC can be realized over a number of combinations of underlay and overlay technologies, I believe, an example (or a couple of examples would be much better) demonstrating the encapsulation of an ICMP message and, particularly, triggering ICMP Echo Reply on the proper element of the SFP. I have to admit, I couldn't imagine the encapsulation that would make ICMP-over-SFC work as IP Ping/traceroute.

CMP: What exactly are you requesting or is the concern? The section describes already what you ask.

  *   Section 6.4.2 makes the positioning statement for BFD and S-BFD as follows:

BFD or S-BFD could be leveraged to perform continuity function for SF or SFC.
The statement, in regard to BFD, contradicts with RFC 5880 which explains the goal of BFD as follows:
   ... a protocol intended to detect faults in the
   bidirectional path between two forwarding engines, including
   interfaces, data link(s), and to the extent possible the forwarding
   engines themselves ...
And the text in the second paragraph on Section 6.4.2 appears to describe a way of using S-BFD, not of BFD.

CMP: It describes BFD, which can be used to verify continuity in connectivity.

  *   Section 6.4.3 suggests that iOAM could be used "perform SF availability and SFC availability or performance measurement". I agree with that statement in part of performance measurement but the references to the "SF availability and SFC availability", without the definition of availability in the context of SFC OAM, appear as not sufficiently justified.

CMP: Greg, please see: https://mailarchive.ietf.org/arch/msg/sfc/1r8s3iB139-ETZtGskpocWxC3Ao/. That email from the chairs went unanswered.

  *   Section 6.4.4 makes a reference to an individual draft that was last updated some four and a half years ago. It appears that such a long time is an indication of a lack of interest to work on the proposed solution by the authors or anyone else..

CMP: Greg... this was also covered multiple times already, and re-re-repeating will not change the response.

CMP: First, Internet-Drafts are "work in progress.”

CMP: Second, please see https://tools.ietf.org/html/draft-penno-sfc-trace-03#section-6
CMP: Running code seems more relevant than a non-implemented refreshed-but-not-updated I-D...


  *   Section 7 and, in particular, Table 4 seems as not closely relevant to the subject or OAM. Especially since the title of Table 4 is not reflecting the content of the table itself. RFC 6291 recommends using Mgmt acronym for Management and O&M - for OAM and Management. Acronym OAM is recommended to be expanded and used in the IETF document solely for Operations, Administration, and Maintenance.


CMP: This was again already covered, and in fact updated and moved based on your previous comments.

Summarizing my comments, I find so many problematic parts in the text that I've to question the usefulness of the requirement in the Introduction
   SFC OAM solution documents should refer to this document to indicate
   the SFC OAM component and the functionality they target.
and the value of publishing this document in its current form.


CMP: Greg, you wrote the same thing on WG Last-call, and the chairs responded to that perspective.

CMP: It was a bit hard for me to parse some of you comments. As it was requested before by the SFC chairs, if you have comments accompany them by textual suggestions.

CMP: Best,

CMP: Carlos.

Regards,
Greg


---------- Forwarded message ---------
From: The IESG <iesg-secretary@ietf.org<mailto:iesg-secretary@ietf.org>>
Date: Thu, Mar 26, 2020 at 8:47 AM
Subject: [sfc] Last Call: <draft-ietf-sfc-oam-framework-11.txt> (Service Function Chaining (SFC) Operations, Administration and Maintenance (OAM) Framework) to Informational RFC
To: IETF-Announce <ietf-announce@ietf.org<mailto:ietf-announce@ietf.org>>
Cc: <sfc-chairs@ietf.org<mailto:sfc-chairs@ietf.org>>, <draft-ietf-sfc-oam-framework@ietf.org<mailto:draft-ietf-sfc-oam-framework@ietf.org>>, <martin.vigoureux@nokia.com<mailto:martin.vigoureux@nokia.com>>, <tal.mizrahi.phd@gmail.com<mailto:tal.mizrahi.phd@gmail.com>>, <sfc@ietf.org<mailto:sfc@ietf.org>>



The IESG has received a request from the Service Function Chaining WG (sfc)
to consider the following document: - 'Service Function Chaining (SFC)
Operations, Administration and
   Maintenance (OAM) Framework'
  <draft-ietf-sfc-oam-framework-11.txt> as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org<mailto:last-call@ietf.org> mailing lists by 2020-04-09. Exceptionally, comments may
be sent to iesg@ietf.org<mailto:iesg@ietf.org> instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document provides a reference framework for Operations,
   Administration and Maintenance (OAM) for Service Function Chaining
   (SFC).





The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/ballot/

The following IPR Declarations may be related to this I-D:

   https://datatracker.ietf.org/ipr/3440/
   https://datatracker.ietf.org/ipr/3121/






_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc
--
last-call mailing list
last-call@ietf.org<mailto:last-call@ietf.org>
https://www.ietf.org/mailman/listinfo/last-call