Re: [Last-Call] [sfc] Last Call: <draft-ietf-sfc-oam-framework-11.txt> ICMP in SFC OAM (Service Function Chaining (SFC) Operations, Administration and Maintenance (OAM) Framework) to Informational RFC

Greg Mirsky <gregimirsky@gmail.com> Mon, 13 April 2020 02:41 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A09253A0CD8; Sun, 12 Apr 2020 19:41:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r__ym7mRrlDI; Sun, 12 Apr 2020 19:41:19 -0700 (PDT)
Received: from mail-lj1-x236.google.com (mail-lj1-x236.google.com [IPv6:2a00:1450:4864:20::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F1063A0C4D; Sun, 12 Apr 2020 19:41:10 -0700 (PDT)
Received: by mail-lj1-x236.google.com with SMTP id y4so1184841ljn.7; Sun, 12 Apr 2020 19:41:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to:cc; bh=M/TBGtV8e3TEYYUx5yz0jkH8SkinP2eF+E+vydDIP3s=; b=C1x4XXGeBhBP1/1u2fLCc4ep3GRpMgKoNZVBw518h1ruITb3T9SkuhZFqOk66a1Jky VL+8RPu62/E8aF8rD5St8B9TnnwCv6uea1IZnYElVz7W6Lo9JuvS3fYaTIZzAwrH41Aq OB9Z9fMgHuS3ZZJKa26g3joMJz4ihbIUWpDkqlHLaQduTXO0geaVBQCiobtPODU+Ru5c OWC476qhBUdZiuFBr8esBNXCIivmFy614YIWA9kYnMjKe4yHp2k1ChIjOViPpw+frrUG 3ZMncdhEd+sYLd5OcQHYjzMPwFOMSppUBZeRN1q6R33ZeU8q4muKdGVYzgOmMq22y+IE EE6w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=M/TBGtV8e3TEYYUx5yz0jkH8SkinP2eF+E+vydDIP3s=; b=fEaypkP49V+ZwUs1bvrjzkyFUDekxkres/XlF+RvT7kyIOzgWnv4Dk6XsxgOVRIGzx 4o1lbKByphumFHZoA7TAM/4jkV+RJ+tKRz/+sG4Djgw+OUZH1jX4cY3Cv/iuK8Cpan4F /aymxs8IK7RJ0f/3ITOwVr4cKyACrChko77VcIIIzBFP562xXaVbWMiN4r4j/cGNHeeP emHH+6FenGmvxUg0Sg7RgeLdd+4E3wo1d527KGOQouNV1i0LXOL6iuQ8+0otuP2bRYXW ZpMkXrAVqhCksZosIZhO97sXs4q65XHFLI+Sjdv417Rq0JQ8YoD26dWyjkiL8VJ2agOu UfHA==
X-Gm-Message-State: AGi0PuZStqI1/riPiSs8tXOUFmHzMGnwlWLvLvQTUycsTW7sFZABhbBJ mZzbrL768G75p7IrL4fEQ7NGoxCoJhy/Pa55tcw=
X-Google-Smtp-Source: APiQypK1cwRP9Nbp/BA2MQS18wVyGpJusxSfHlwmV//GTMdPS9Mx6O69wVPPIXhzb10d7ieedi/cm4FcJaYUoF2dEAI=
X-Received: by 2002:a2e:b177:: with SMTP id a23mr9389972ljm.174.1586745668280; Sun, 12 Apr 2020 19:41:08 -0700 (PDT)
MIME-Version: 1.0
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Sun, 12 Apr 2020 19:40:56 -0700
Message-ID: <CA+RyBmXays_kyJ9yXtxHW9QR-t0YXVJ-d3j+ajqW4kPf4eaeBA@mail.gmail.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Cc: "last-call@ietf.org" <last-call@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "draft-ietf-sfc-oam-framework@ietf.org" <draft-ietf-sfc-oam-framework@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e825e505a32303e3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/vjuNSAebfHXdZED-kYQcmNPip_Y>
Subject: Re: [Last-Call] [sfc] Last Call: <draft-ietf-sfc-oam-framework-11.txt> ICMP in SFC OAM (Service Function Chaining (SFC) Operations, Administration and Maintenance (OAM) Framework) to Informational RFC
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Apr 2020 02:41:23 -0000

Dear Carlos,
here's another thread to continue the discussion of the applicability of
ICMP in SFC OAM.
The draft suggests that by managing TTL in NSH one can trace SFFs of the
given SPI. My first concern with the proposed method of using ICMP in SFC
is that RFC 8300 requires SFF to decrement TTL before doing NSH lookup. And
then it clarifies:
   NSH packets, as described above, are discarded when an SFF decrements
the TTL to 0.
True, there's no normative language but the interpretation might be
ambiguous and some implementations might not allow controlling the case of
TTL=0.
Furthermore, if we assume that NSH packet TTL=0 is punted to the control
plane, wouldn't it be forwarded over IP, as the destination IP address is
of the last SFF?
Perhaps I've missed something in the draft. I appreciate it if you can
clarify the mechanism that allows the use of ICMP in SFC as tracing the OAM
tool.

Regards,
Greg

On Fri, Apr 10, 2020 at 10:31 AM Carlos Pignataro (cpignata) <
cpignata@cisco.com> wrote:

> Dear Greg,
>
> Let me first share a top-post comment, followed by inlined responses.
>
> Scanning through your extensive set of review comments below, it seems to
> me that several of these are issues that you brought up in the past already
> at SFC, including during WGLC, and the SFC chairs declared consensus on
> their disposition. Many of the comments below are repetition to the
> previous extensive reviews you shared, and not additional or incremental
> comments. Repeating them again will not change the responses.
>
> In this context, please see:
> https://mailarchive.ietf.org/arch/msg/sfc/mDkO4jSkyxJ6ofup-YbBpIF5BEs/
> Which was not responded to by you.
>
> Please see inline with:
> *CMP: bold hopeful underlined green*.
>
>
> 2020/04/09 午後6:04、Greg Mirsky <gregimirsky@gmail.com>のメール:
>
> Dear All,
> I have reviewed the draft and wanted to share my comments on the
> draft-ietf-sfc-oam-framework. Please find them organized into two sections
> - general and according to the text of the draft.
> General:
>
>    - SFC OAM Architecture
>
> *CMP: No. This document does not use the phrase "SFC OAM **Architecture”,
> nor it defines it.*
>
> The document includes three components in the SFC OAM architecture:
>
>
> *CMP: No. The document explains**:*
>
>    For the purpose of defining
>    the OAM framework, the service layer is broken up into three distinct
>    components:
>
>
> Service Function (SF), Service Function Chain (SFC), which is equivalent
> to the collection of all SFPs, and Classifier. Firstly, making SFC OAM a
> component of SFC OAM appears as an unfortunate selection of terminology
> that might be a source of confusion and misinterpretation (how one
> identifies the context of using "SFC OAM"?).
>
>
> *CMP: First, frankly I am unclear of what exactly you mean. It seems to me
> you are creating the confusion. "SFC OAM" is not a component. SFC is the
> component (S3.1) containing OAM Functions.*
>
> *CMP: Second, Greg, you say "**might be a source of confusion and
> misinterpretation**”. However, to our knowledge, there has not been any
> confusion or misinterpretation.*
>
> *CMP: Third, Please see*
> https://mailarchive.ietf.org/arch/msg/sfc/fTsNNMAoHe6D6Vnrox6oQJJ5JO8/
>
> The inclusion of an SF in the SFC OAM reference model is to provide the
> ability to verify "whether the SF is providing its intended service". Such
> a goal appears as a layer violation, in part of OAM, since the verification
> of the correctness of a service provided by the SFC is in the scope of
> Service OAM to which SFC OAM plays the role of transport OAM.
>
>
> *CMP: Apologies, I read this a few times and I am not sure what is meant.
> If you mean "why does the WG document include SF?", then this was discussed
> in your previous review.*
>
> In addition, the document notes that the fact of existing and deployed SFs
> is likely to leave SF OAM being implementation-specific. Combining these
> two aspects, the inclusion of the SF OAM component in the SFC OAM reference
> model is questionable as it doesn't seem to provide a good opportunity for
> the standardization given, on one hand, the lack drafts and, on the other
> hand, the growing number of deployed implementations. Figure 2 that
> illustrates SFC OAM components does not provide clarity to the
> relationships between SFC OAM and SF OAM components of the reference model
> as SF OAM is depicted both as the separate entity as well as part of SFC
> OAM component.
>
>
>
>    - The interpretation of 'availability' in SFC OAM
>
> The document extensively discusses an SFC OAM characteristic, availability
> sections on SF and SFC availability, as well as references to the
> particular OAM tool as being capable to check the availability).
> Availability is well-defined for some technologies, e.g. constant bit-rate
> paths, while not being used at all in many other networking technologies,
> e.g., packet switching networks. The definition of the availability for the
> constant bit-rate paths can be found in G.826. The specification firstly
> defines the opposite, the state of unavailability. Also, note that both
> states of unavailability and availability are defined as being continuous
> in time, at least 10 seconds interval long. I couldn't find any definition
> of the availability in IETF documents I'm familiar with. The most
> comprehensive IETF document on OAM, RFC 7276, doesn't use the availability
> as one of the OAM states or performance metrics detected or measured by OAM
> methods analyzed in it. The draft-ietf-sfc-oam-framework uses the term
> 'availability' in many places referring to the availability of SFC elements
> like SFF and SF without providing the definition. As a result, it is not
> clear what the availability of SFC OAM is and how it can be detected or
> measured. It appears that the term in this document is being used
> colloquially rather than as the technical terminology. Such a manner of
> using terminology does affect the technical accuracy of the document and
> very likely leave a reader familiar with the existing definitions of the
> term in a state of confusion.
>
>
> *CMP: Greg, please see: *
> https://mailarchive.ietf.org/arch/msg/sfc/1r8s3iB139-ETZtGskpocWxC3Ao/*.
> That email **from the chairs** went unanswered.*
>
>
> Going through the text:
>
>    - section 3.1.1 in the last paragraph states:
>
>    This framework document provides a RECOMMENDED framework where a
>    generalized approach is taken to verify that a SF is sufficiently
>    available (i.e., an adequate granularity to provide a basic SF
>    service).
>
> That "RECOMMENDED framework" seems like a deviation from the scope of the
> document defined in the Abstract and Document Scope:
>    The focus of this document is to provide an architectural framework
>    for SFC OAM, particularly focused on the aspect of the Operations
>    component within OAM.
>
>
>
> *CMP: Good point, Martin noted the same issue and it is addressed in a
> forthcoming revision.*
>
>
>    - the definition of connectivity in Section 4.1 appears as using
>    circular logic by defining itself through connectivity verification whereas
>    it is a composition of verifying that packets that belong to the monitored
>    flow are reaching the egress node and only packets that belong to that flow
>    are received by the egress (the case when a packet that belongs to a
>    different flow is detected constitutes miscommunication defect and may lead
>    to miscommunication state).
>
>
> *CMP: Apologies it is hard for me to follow. However, combining *
> https://mailarchive.ietf.org/arch/msg/sfc/mDkO4jSkyxJ6ofup-YbBpIF5BEs/
> * with *
> https://mailarchive.ietf.org/arch/msg/sfc/fTsNNMAoHe6D6Vnrox6oQJJ5JO8/*,
> please provide suggested text for an improved definition.*
>
>
>    - also in Section 4.1, the path MTU discovery and monitoring, packet
>    re-ordering and/or corruption, arbitrary path monitoring are misattributed
>    to connectivity verification function
>
> *CMP: Same as above.*
>
>
>    - notification to other application (Section 4.2) is not part of OAM
>    and is implementation-specific
>
> *CMP: I assume this refers to:*
>
>    o  Notifying the detected failures to other OAM functions or
>       applications to take appropriate action.
>
>
>
> *CMP: If so, do you suggest that OAM detects failures but notifies noone?*
>
>
>    - 'PM' in PM OAM is usually expanded as 'Performance Monitoring',
>    sometimes 'Performance Measurement". Used in the document "Performance
>    Management" is extremely unusual, if not misleading.
>
>
> *CMP: We can change "Performance Management" to "Performance Measurement".*
>
>
>    - In Section 4.4 delay variance (variation)/jitter is listed as a
>    measurable performance metric even though it can be only calculated using a
>    set of delay measurements. On the other hand, most performance monitoring
>    active OAM protocols are well-equipped to detect packet re-ordering,
>    unwarranted packet duplication.
>
> *CMP: I am sorry I do not follow what you are asking here. What would you
> like to see?*
>
>
>    - Further in Section 4, jitter, i.e. delay variation is being
>    mentioned as a measurable performance metric. That is not the case.
>    Latency, i.e. delay, is a measurable metric but jitter (delay variation)
>    can only be calculated.
>
> *CMP: The text says "**could also be calculated**"*
>
>
>    - Table 3 in Section 5.1 raises several questions:
>       - Is listing E-OAM is to suggest that an overlay network supporting
>       SFC NSH can be instantiated directly over the Ethernet network? Can you
>       illustrate that with an example?
>
> *CMP: See...* https://tools.ietf.org/html/rfc8300#section-10.1
>
>
>    - It appears that some of the information presented in Table 3
>       contradicts other material in the draft, for example, Section 6.4.1. The
>       section indicates that ICMP may be used as a connectivity verification tool
>       for both SF and SFC OAM.
>
> *CMP: I do not see a contradiction. Do you have specifics?*
>
>
>    - In Section 6.4.1 ICMP is positioned as a suitable mechanism to "test
>    the network reachability" (that seems like a new OAM function being
>    introduced in the section). Because SFC can be realized over a number of
>    combinations of underlay and overlay technologies, I believe, an example
>    (or a couple of examples would be much better) demonstrating the
>    encapsulation of an ICMP message and, particularly, triggering ICMP Echo
>    Reply on the proper element of the SFP. I have to admit, I couldn't imagine
>    the encapsulation that would make ICMP-over-SFC work as IP Ping/traceroute.
>
> *CMP: What exactly are you requesting or is the concern? The section
> describes already what you ask.*
>
>
>    - Section 6.4.2 makes the positioning statement for BFD and S-BFD as
>    follows:
>
> BFD or S-BFD could be leveraged to perform continuity function for SF or
> SFC.
> The statement, in regard to BFD, contradicts with RFC 5880 which explains
> the goal of BFD as follows:
>    ... a protocol intended to detect faults in the
>    bidirectional path between two forwarding engines, including
>    interfaces, data link(s), and to the extent possible the forwarding
>    engines themselves ...
> And the text in the second paragraph on Section 6.4.2 appears to describe
> a way of using S-BFD, not of BFD.
>
>
>
> *CMP: It describes BFD, which can be used to verify continuity in
> connectivity.*
>
>
>    - Section 6.4.3 suggests that iOAM could be used "perform SF
>    availability and SFC availability or performance measurement". I agree with
>    that statement in part of performance measurement but the references to the
>    "SF availability and SFC availability", without the definition of
>    availability in the context of SFC OAM, appear as not sufficiently
>    justified.
>
> *CMP: Greg, please see: *
> https://mailarchive.ietf.org/arch/msg/sfc/1r8s3iB139-ETZtGskpocWxC3Ao/*.
> That email **from the chairs** went unanswered.*
>
>
>    - Section 6.4.4 makes a reference to an individual draft that was last
>    updated some four and a half years ago. It appears that such a long time is
>    an indication of a lack of interest to work on the proposed solution by
>    the authors or anyone else..
>
> *CMP: Greg... this was also covered multiple times already, and
> re-re-repeating will not change the response.*
>
> *CMP: First, Internet-Drafts are "work in progress.**”*
>
> *CMP: Second, please see *
> https://tools.ietf.org/html/draft-penno-sfc-trace-03#section-6
> *CMP: Running code seems more relevant than a non-implemented
> refreshed-but-not-updated I-D...*
>
>
>    - Section 7 and, in particular, Table 4 seems as not closely relevant
>    to the subject or OAM. Especially since the title of Table 4 is not
>    reflecting the content of the table itself. RFC 6291 recommends using Mgmt
>    acronym for Management and O&M - for OAM and Management. Acronym OAM is
>    recommended to be expanded and used in the IETF document solely for
>    Operations, Administration, and Maintenance.
>
>
>
> *CMP: This was again already covered, and in fact updated and moved based
> on your previous comments.*
>
> Summarizing my comments, I find so many problematic parts in the text that
> I've to question the usefulness of the requirement in the Introduction
>    SFC OAM solution documents should refer to this document to indicate
>    the SFC OAM component and the functionality they target.
> and the value of publishing this document in its current form.
>
>
> *CMP: Greg, you wrote the same thing on WG Last-call, and the chairs
> responded to that perspective.*
>
> *CMP: It was a bit hard for me to parse some of you comments. As it was
> requested before by the SFC chairs, if you have comments accompany them by
> textual suggestions.*
>
> *CMP: **Best,*
>
> *CMP: **Carlos.*
>
> Regards,
> Greg
>
>
> ---------- Forwarded message ---------
> From: The IESG <iesg-secretary@ietf.org>
> Date: Thu, Mar 26, 2020 at 8:47 AM
> Subject: [sfc] Last Call: <draft-ietf-sfc-oam-framework-11.txt> (Service
> Function Chaining (SFC) Operations, Administration and Maintenance (OAM)
> Framework) to Informational RFC
> To: IETF-Announce <ietf-announce@ietf.org>
> Cc: <sfc-chairs@ietf.org>, <draft-ietf-sfc-oam-framework@ietf.org>, <
> martin.vigoureux@nokia.com>, <tal.mizrahi.phd@gmail.com>, <sfc@ietf.org>
>
>
>
> The IESG has received a request from the Service Function Chaining WG (sfc)
> to consider the following document: - 'Service Function Chaining (SFC)
> Operations, Administration and
>    Maintenance (OAM) Framework'
>   <draft-ietf-sfc-oam-framework-11.txt> as Informational RFC
>
> The IESG plans to make a decision in the next few weeks, and solicits final
> comments on this action. Please send substantive comments to the
> last-call@ietf.org mailing lists by 2020-04-09. Exceptionally, comments
> may
> be sent to iesg@ietf.org instead. In either case, please retain the
> beginning
> of the Subject line to allow automated sorting.
>
> Abstract
>
>
>    This document provides a reference framework for Operations,
>    Administration and Maintenance (OAM) for Service Function Chaining
>    (SFC).
>
>
>
>
>
> The file can be obtained via
> https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/
>
> IESG discussion can be tracked via
> https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/ballot/
>
> The following IPR Declarations may be related to this I-D:
>
>    https://datatracker.ietf.org/ipr/3440/
>    https://datatracker.ietf.org/ipr/3121/
>
>
>
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
> --
> last-call mailing list
> last-call@ietf.org
> https://www.ietf.org/mailman/listinfo/last-call
>
>
>