Re: [nvo3] Comments on draft-ietf-nvo3-vxlan-gpe

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Wed, 17 April 2019 19:44 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6B7712014F; Wed, 17 Apr 2019 12:44:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level:
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fRWaGj_-FfAV; Wed, 17 Apr 2019 12:44:33 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A72B1120104; Wed, 17 Apr 2019 12:44:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=9390; q=dns/txt; s=iport; t=1555530272; x=1556739872; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=pQFAg3yFutG8O9ctq30lgU6KxSctZhtueHH02y3v/vQ=; b=UwQhoF4TFDfqqHho+70DvCYZ6d0X9KhvQ/OOKlsgwaknrlRUOhCs1lxV hxcBPsSODkS1Eu7ZBaNpUpxxA0qy0osLKJE5k2EChvMcUpZYMS/Zd0nZu DCqMRWUZSE0cnlT4AOq+gnUjP0A631J9gTYbJ2uNxlZkYRsLLj8XTxJNI w=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AHAAD4gLdc/5hdJa1cChkBAQEBAQEBAQEBAQEHAQEBAQEBgVMCAQEBAQELAYFhBSpogQQoCoQElRAliTqPEBSBZw4BARgLhEoCF4V+IzYHDgEDAQEEAQIBAm0cDIVKAQEBAwEBASEROgsFCwIBCBgCAiYCAgIfBgsVEAIEDgWDIgGBaQMNDw+qTYEvh38NghsGgQsnAYtJF4FAP4ERJwwTgU5+PoIaRwEBgSkNFRUBgwoxgiYEjSmMIYwQLDcJAoIGil2Dd4NKG4IJhh2DZ4hwjQ+GWIk8gnUCERWBMCYDLoFWcBU7KgGCQT6CdAECh1yFP0Exj1GBIQEB
X-IronPort-AV: E=Sophos;i="5.60,363,1549929600"; d="scan'208";a="463041419"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 17 Apr 2019 19:44:31 +0000
Received: from XCH-RTP-017.cisco.com (xch-rtp-017.cisco.com [64.101.220.157]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id x3HJiVcI005890 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 17 Apr 2019 19:44:31 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-017.cisco.com (64.101.220.157) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 17 Apr 2019 15:44:30 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1473.003; Wed, 17 Apr 2019 15:44:30 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: "draft-ietf-nvo3-vxlan-gpe@ietf.org" <draft-ietf-nvo3-vxlan-gpe@ietf.org>, NVO3 <nvo3@ietf.org>, IETF IPPM WG <ippm@ietf.org>
Thread-Topic: [nvo3] Comments on draft-ietf-nvo3-vxlan-gpe
Thread-Index: AQHU8Pwb4PQUm0Sk6kyANyiY2S4odqY4th6AgAhKgYCAAAxngA==
Date: Wed, 17 Apr 2019 19:44:30 +0000
Message-ID: <3AFD4751-CF3A-4939-A49A-FB981C68CADF@cisco.com>
References: <CA+RyBmV5R+jsPNn9-HooGcJzobD5mrxEwjbxn_o+hn2QcoiZNQ@mail.gmail.com> <12ACA02A-BB51-4214-A72B-1AEFCCB914AC@cisco.com> <CA+RyBmUgQdq-oHQFveGV3avStL=4B+=qxMU+epk6mHdAqhRR0w@mail.gmail.com>
In-Reply-To: <CA+RyBmUgQdq-oHQFveGV3avStL=4B+=qxMU+epk6mHdAqhRR0w@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3445.104.8)
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.118.116.132]
Content-Type: text/plain; charset="utf-8"
Content-ID: <9462EB032C2F0A489DE451FFA12FE189@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.157, xch-rtp-017.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/nvo3/FAeWbZE0fyYZgwxZMsNct9gUWpI>
Subject: Re: [nvo3] Comments on draft-ietf-nvo3-vxlan-gpe
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Apr 2019 19:44:36 -0000

Hi, Greg,

Adding the IPPM mailing list, since you reference it below, and point to RFC 7799.

Please see inline.

> On Apr 17, 2019, at 3:00 PM, Greg Mirsky <gregimirsky@gmail.com> wrote:
> 
> Hi Carlos,
> thank you for sharing your view on the design of the VXLAN-GPE protocol. Please find my comments in-line tagged GIM>>.
> 
> Regards,
> Greg
> 
> On Fri, Apr 12, 2019 at 5:23 AM Carlos Pignataro (cpignata) <cpignata@cisco.com> wrote:
> Greg,
> 
> You seem to be confusing and mixing things up.
> 
> Please see inline.
> 
> > On Apr 12, 2019, at 2:50 AM, Greg Mirsky <gregimirsky@gmail.com> wrote:
> > 
> > Dear Editors, et al.,
> > I've read the latest -07 version and would like to share my comments and questions with you:
> >       • in the earlier version of the draft, the O-bit was introduced and defined as:
> > OAM Flag Bit (O bit):  The O bit is set to indicate that the packet is an OAM packet.
> > At the same time, in the latest version, the new Next Protocol value (0x81) to identify iOAM Data was introduced. Hence are my questions:
> >       • What must be the value of the O-bit when the value of the Next Protocol field is iOAM?
> 
> The O bit “is set to indicate that the packet is an OAM packet”.
> IAOM is not an OAM packet. Hence, O bit clear if VXLAN-GPE encapsulates a non-OAM packet and adds an IOAM shim.
> GIM>> It is a very unexpected statement from you,

I would tell you ‘expect the unexpected’, but that is not the case here... :-)

If you actually read my statement, you will see "IAOM is not an OAM *packet*.” New emphasis added — it is _not_ *an OAM packet*.

I stand by it. It’s an augmented data packet of interest.

> one of the co-authors of draft-ietf-ippm-ioam-data  where the first paragraph of the Introduction section defines iOAM as Hybrid Type 1 OAM, according to RFC 7799 classification:

This is still quite consistent with that definition, which I recommend you re-read:

RFC 7799 is about metrics and methods, not packet definitions.

You will see that Active methods include a “dedicated measurement packet stream”. “Active Methods generate packet streams.”

However, Hybrid Type I leverages “Augmentation or modification of the stream of interest"

Following your logic, if you change a packet field such as TTL/HL to provide packet coloring, do you need to set the O-bit?

>    IOAM is to complement
>    mechanisms such as Ping or Traceroute, or more recent active probing
>    mechanisms as described in [I-D.lapukhov-dataplane-probe].  In terms
>    of "active" or "passive" OAM, "in-situ" OAM can be considered a
>    hybrid OAM type.  While no extra packets are sent, IOAM adds
>    information to the packets therefore cannot be considered passive.
>    In terms of the classification given in [RFC7799] IOAM could be
>    portrayed as Hybrid Type 1.
> 
> >       • Do you plan to define the Next Protocol values for active OAM protocols, e.g., Echo Request/Reply, BFD, Performance Monitoring?
> 
> I cannot speak to “plans” (replying as “et al.”, not as “editor”), but I expect OAM documents ought to have those requested, and you do not need necessarily all of those — the nex protocol IPv4 / IPv6 can encapsulate ICMP, UDP/BFD, etc., etc., etc., etc.
> GIM>> Of course, use of the well-known port number, usually it is UDP destination port, is one of the methods to demultiplex protocols. This method is broadly used, for example, in MPLS OAM. But this method has some disadvantages that were pointed out in the discussion of BFD over GENEVE in Prague by David Black (the last presentation in the minutes):
> David: I want the BFD header to be as close to the thing whose liveness I'm testing. The more headers you add in the middle, the more ways there are to break BFD without breaking the forwarding engine. The further away I move BFD from the chunk of hardware's liveness I care about, the more opportunities are for BFD and the hardware to not to tell me the same thing.
> 

Theory and practice match in theory, less so in practice — unless you are planning to update RFC 5881.

This can be argued both ways (e.g., better to have common handlers, etc.), but I take no position. I do say that in presence of deployed OAM encapsulations, there’s no basis for your your comment about defining a protocol type for “Performance Monitoring” as a protocol...


> 
> >       • How to interpret the situation when the O-bit value is 1 but the value of the Next Protocol field is, for example, NSH, i.e.., not any of OAM protocols?
> 
> I expect it means there’s OAM within that NSH (sometimes there’s no such things as “OAM Protocols”), or an unhandled OAM protocol.
> GIM>> Should that, i.e., OAM in NSH or immediately following NSH be signaled using SFC NSH methods that are already defined in draft-ietf-sfc-multi-layer-oam?


Non sequitur — I do not follow what signaling has to do with the conversation, nor how that draft might be relevant.

> Using the server layer, as you've suggested, seems as layer violation. 
> 

This is a funny statement — NVO3 is a layer violation :-) So are Pseudowires. Please do not take this statement too seriously, it is not inviting discussion.

> >       • I believe that the use of the dedicated OAM flag and the Next Protocol field for a fixed-size header that cannot include meta-data is unwarranted and adds unnecessary complexity.
> 
> Disagree. 
> 
> See example where protocol is IP carrying an OAM packet.
> GIM>> When IP/UDP encapsulation is used for OAM, there's no, in my opinion, any need to use the O-bit. The destination IP address must be as described in RFC 8029 or RFC 5884 and the demultiplexing is done based on the destination UDP port number. Clearly, O-bit is unnecessary if IP/UDP encapsulation for OAM being used.
> 

Fortunately, bit usage is a matter of definition and not opinion :-)

Kind regards,

Carlos.


> > I suggest not to use O-bit in the VXLAN-GPE header and release it into the Reserved field.  I don't see the apparent benefit of using the flag, as the VXLA-GPE uses the fixed size header and the header cannot carry OAM data in it. The only role the VXLAN-GPE header must perform, in my opinion, is to unambiguously identify the payload type that immediately follows the header as OAM (demultiplexing OAM protocols may be done in OAM Header shim).
> > Much appreciate your consideration.
> > 
> 
> Best,
> 
> —
> Carlos Pignataro, carlos@cisco.com
> 
> “Sometimes I use big words that I do not fully understand, to make myself sound more photosynthesis."
> 
> > Regards,
> > Greg
> > _______________________________________________
> > nvo3 mailing list
> > nvo3@ietf.org
> > https://www.ietf.org/mailman/listinfo/nvo3
>