Re: [nvo3] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London

Greg Mirsky <gregimirsky@gmail.com> Thu, 19 April 2018 17:26 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55B5E1200F1; Thu, 19 Apr 2018 10:26:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level:
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xkOkszDu9Ts2; Thu, 19 Apr 2018 10:26:40 -0700 (PDT)
Received: from mail-lf0-x235.google.com (mail-lf0-x235.google.com [IPv6:2a00:1450:4010:c07::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C915D1200C5; Thu, 19 Apr 2018 10:26:39 -0700 (PDT)
Received: by mail-lf0-x235.google.com with SMTP id z130-v6so1304823lff.5; Thu, 19 Apr 2018 10:26:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=rTpllG5fD8EBdmzlV5NbG3faT5Fm2ZLhDJ7v2x3zKe4=; b=H/vfP+O8W8RDJ5KvYA44AoagXkA6SvzQj0RaoRhimepgGwyv7k6mpT0PIx0dWuTVH9 8eygVI8nM7cEMDG4ggL1anXi1gsjHXV2k+rHX1FdbS/nAK6x9z8g1Ub0WQ38G5Yzt5PZ eUakMECtIgyshkzW6G+oVnljVV7liUQZUa0ECMrr0uj/QYvV+vKBk1VU1IjL82PxcqZY NsVXoXnwD2rcTLW/IkX4n/OsL4Rx4jA3VBTkfqu2rtbMk3WBT+d7IeXK1hBJKfXVsNkX 7XVn5mTJl+5P9SPepmoAekrZi15thuafuoP/OPCMx5Mci/ubVt2A728sPuWBaVlfZSfG yO0Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=rTpllG5fD8EBdmzlV5NbG3faT5Fm2ZLhDJ7v2x3zKe4=; b=T1ARVY28s8togBcOpO6OgyefWETAz2IA+CFZlibkWibeRcQGriMJFOZ7NQxOfYX3k/ kkiBSyTLV1W4APEwFRwTtngtaIuMmt3h6AxArV6UeqUvR+d6DUIE9eRZ1NXHz5aQdzOC uX/kdO46b/RiF/WY7UlSWu+hv5hutDwP2CdTi9PLW+YTINhr+YFtm10CpWeHPCoqn8a4 ZaSwxQ0MYjUBp38VNqYLsgH3cLQNFiWdr6M6SdV0iHYpszyZPKlJatCz9dTrTsmnCBon ZSeCntSfKZgBLPQEzBOfYDzumxWOny15Bm20M7v+n+FaGT8BwKur8D9Yrk44vYA1Gxhw wDkA==
X-Gm-Message-State: ALQs6tBJNXQB3KsodPEvBn5o8Wyv41DSspYtk65X97sSlEQEmQ+XR9O8 IDNmZIXP+t/ABDhkc1Q81o3HYrWJQ3WDZd2UkQ133b+5
X-Google-Smtp-Source: AB8JxZoTlE7Mb4U4Cy0brXwyfUbc+Hdi968X0ZHQISUFZ05SAIO0yV6PkiLYMpQ7vRTd86DJ48vVJ82ob5XUkIhXgP0=
X-Received: by 2002:a19:9d4b:: with SMTP id g72-v6mr522895lfe.7.1524158797930; Thu, 19 Apr 2018 10:26:37 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.46.73.66 with HTTP; Thu, 19 Apr 2018 10:26:37 -0700 (PDT)
In-Reply-To: <81b2598c54944ba887248cbce2f66575@XCH-RCD-008.cisco.com>
References: <ff0c9182d1f14ec48b352e41fedaf58e@XCH-RCD-008.cisco.com> <CA+RyBmWKyv+iDsQdAum0xP5FbEb5hvc7AQm+SOvt5b7myjBtHg@mail.gmail.com> <81b2598c54944ba887248cbce2f66575@XCH-RCD-008.cisco.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Thu, 19 Apr 2018 10:26:37 -0700
Message-ID: <CA+RyBmXNdcKGhyRvwb5cfZECZTMPEOy_D4umNU4ww+1-nTAfcQ@mail.gmail.com>
To: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
Cc: IETF IPPM WG <ippm@ietf.org>, NVO3 <nvo3@ietf.org>, Service Function Chaining IETF list <sfc@ietf.org>, "int-area@ietf.org" <int-area@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000bb66b8056a36dfcd"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nvo3/Cyb53Ql7ehf2acJhuC8H72s2mfc>
Subject: Re: [nvo3] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Apr 2018 17:26:42 -0000

Hi Frank,
thank you for your expedient response. Yes, clarification and consistent
terminology, of course as different encapsulations allow that, will help.
What I'm looking through the iOAM encapsulation drafts is the answer to
this question How a system that is not using iOAM can get to the data
payload that follows the iOAM message? Is there the field in the iOAM shim
that allows the system to skip over the iOAM message (by iOAM message I
mean iOAM shim and iOAM data)? Would such system be required to parse other
than iOAM shim constructs? I couldn't find this scenario being discussed in
any of iOAM encapsulation drafts. Have I missed it?

Regards,
Greg

On Thu, Apr 19, 2018 at 9:54 AM, Frank Brockners (fbrockne) <
fbrockne@cisco.com> wrote:

> Hi Greg,
>
>
>
> good catch – there is a bit of loose language in some of the drafts. We’ll
> make things crisper in the next rev. Note that there is no generic “IOAM
> header” but that definition is always within the context of a particular
> encapsulation protocol. draft-weis-ippm-ioam-gre-00 already has a
> definition of the IOAM header (for GRE) – see section 3. For the other
> drafts, we use language like “The IOAM related fields in VXLAN-GPE are
> defined as follows” or “The fields related to the encapsulation of IOAM
> data fields in Geneve are defined as follows”, i.e. the information that is
> required to perform the encapsulation into the parent protocol, along with
> the actual IOAM data fields. Moving forward, we can be crisper and split
> things into an “encapsulation dependent part” and a “data part”.
>
>
>
> Frank
>
>
>
> *From:* Greg Mirsky <gregimirsky@gmail.com>
> *Sent:* Donnerstag, 19. April 2018 18:15
> *To:* Frank Brockners (fbrockne) <fbrockne@cisco.com>
> *Cc:* IETF IPPM WG <ippm@ietf.org>; NVO3 <nvo3@ietf.org>; Service
> Function Chaining IETF list <sfc@ietf.org>; int-area@ietf.org
> *Subject:* Re: [ippm] encapsulation of IOAM data in various protocols -
> follow up from WG discussion in London
>
>
>
> Hi Frank, et. al,
>
> we have a very good discussion, thank you. I have a question and
> appreciate your consideration:
>
>    - encapsulation documents refer to IOAM HDR, its length is reflected
>    in the field labeled either Length or IOAM HDR len. But I cannot find the
>    definition of IOAM HDR. What is the IOAM HDR?
>
>
>
> Regards,
>
> Greg
>
>
>
>
>
> On Wed, Apr 11, 2018 at 3:02 AM, Frank Brockners (fbrockne) <
> fbrockne@cisco.com> wrote:
>
> Back at the IPPM meeting in London, we discussed several drafts dealing
> with the encapsulation of IOAM data in various protocols
> (draft-brockners-ippm-ioam-vxlan-gpe-00, draft-brockners-ippm-ioam-geneve-00,
> draft-weis-ippm-ioam-gre-00). One discussion topic that we decided to take
> to the list was the question on whether draft-ooamdt-rtgwg-ooam-header
> could be leveraged.  After carefully considering draft-ooamdt-rtgwg-ooam-header,
> I came to the conclusion that the “OOAM header” does not meet the needs of
> IOAM:
>
> * Efficiency: IOAM adds data to live user traffic. As such, an
> encapsulation needs to be as efficient as possible. The “OOAM header” is 8
> bytes long. The approach for IOAM data encapsulation in the above mentioned
> drafts only requires 4 bytes. Using the OOAM header approach would add an
> unnecessary overhead of 4 bytes – which is significant.
>
> * Maturity: IOAM has several implementations, which were also shown at
> recent IETF hackathons – and we’re expecting additional implementations to
> be publicized soon. Interoperable implementations need timely
> specifications. Despite the question being asked, the recent thread on OOAM
> in the NVO3 list hasn’t revealed any implementation of the OOAM header. In
> addition, the thread revealed that several fundamental questions about the
> OOAM header are still open, such as whether or how active OAM mechanisms
> within protocols such as Geneve would apply to the OOAM header. This
> ultimately means that we won’t get to a timely specification.
>
> * Scope: It isn’t entirely clear to which protocols the OOAM header would
> ultimately apply to. The way the OOAM header is defined, OOAM uses a 8-bit
> field for “Next Prot”, the next protocol. Some protocols that IOAM data
> needs to be encapsulated into use 16-bits for their next protocol code
> points. See e.g. the GRE encapsulation – as specified in
> draft-weis-ippm-ioam-gre-00.
>
> With the above in mind, I’d suggest that the WG moves forward with
> specific definitions for encapsulating IOAM data into protocols – per the
> above mentioned drafts.
>
>
>
> Regards, Frank
>
>
> _______________________________________________
> ippm mailing list
> ippm@ietf.org
> https://www.ietf.org/mailman/listinfo/ippm
>
>
>