Re: [nvo3] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Thu, 12 April 2018 18:06 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED221126DED; Thu, 12 Apr 2018 11:06:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.509
X-Spam-Level:
X-Spam-Status: No, score=-14.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1rtrp4h92DrH; Thu, 12 Apr 2018 11:06:28 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8392E128C0A; Thu, 12 Apr 2018 11:06:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=30196; q=dns/txt; s=iport; t=1523556383; x=1524765983; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=gTX06Wmix0TgMjYi+7kM8TxKqdRVmpTDqcS/FtoMMnc=; b=f7LV2GvtOE0pQwRZ9YfdJ/UcNi2LRaB7kzhyQZFtH8I5n/5XXuKTudr1 M6g4z0K2A217aYllSoSouKIs7LAZ1/iDH6akks6ZJpJs6ztsWK15QvGO1 QDvXsBXiTuUk+29jae4D1JhahQzE9XFKQ/3L4lZY8SyDO4A/1AnVMqQn6 o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AUAwAzn89a/40NJK1cGQEBAQEBAQEBAQEBAQcBAQEBAYJNRi9hbygKg1mVE4F0gQ+GZot+gXsLGAEMhF4CGoIHITYWAQIBAQEBAQECbBwMhSIBAQEBAwEBIQpBCxACAQgRBAEBIQMEAwICAh8GCxQJCAEBBA4FCBeECkwDFQ+nRYIchwcNgSuCL4d9gVQ/gQ+DC4JPICIBAQIBF4EjWQiCQoJUApBfhlIsCAKFVYUqO4J1gTuDWoc5hyyBeT2GCwIREwGBJAEjDSSBUnAVOoJDCYIUGhGDNIJkgjCFPm+OQYEXAQE
X-IronPort-AV: E=Sophos;i="5.48,442,1517875200"; d="scan'208,217";a="380510264"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 12 Apr 2018 18:06:22 +0000
Received: from XCH-RCD-010.cisco.com (xch-rcd-010.cisco.com [173.37.102.20]) by alln-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id w3CI6M1l018448 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 12 Apr 2018 18:06:22 GMT
Received: from xch-rcd-008.cisco.com (173.37.102.18) by XCH-RCD-010.cisco.com (173.37.102.20) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Thu, 12 Apr 2018 13:06:21 -0500
Received: from xch-rcd-008.cisco.com ([173.37.102.18]) by XCH-RCD-008.cisco.com ([173.37.102.18]) with mapi id 15.00.1320.000; Thu, 12 Apr 2018 13:06:21 -0500
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: IETF IPPM WG <ippm@ietf.org>, NVO3 <nvo3@ietf.org>, Service Function Chaining IETF list <sfc@ietf.org>, "int-area@ietf.org" <int-area@ietf.org>
Thread-Topic: [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
Thread-Index: AdPRe/DslDwu34XkSmq8g6ttV3Kt0QBLOKqAAAir4cA=
Date: Thu, 12 Apr 2018 18:06:21 +0000
Message-ID: <f48b40357e644666bdd5c51c63118f80@XCH-RCD-008.cisco.com>
References: <ff0c9182d1f14ec48b352e41fedaf58e@XCH-RCD-008.cisco.com> <CA+RyBmUNHcQZtTGJj67V=DqPkwV6GXWDUQJGjwT7ODEFg_QQFA@mail.gmail.com>
In-Reply-To: <CA+RyBmUNHcQZtTGJj67V=DqPkwV6GXWDUQJGjwT7ODEFg_QQFA@mail.gmail.com>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.55.117.7]
Content-Type: multipart/alternative; boundary="_000_f48b40357e644666bdd5c51c63118f80XCHRCD008ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/nvo3/PWzGmTD43G5onJkiQpBe4LffUxY>
Subject: Re: [nvo3] [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Apr 2018 18:06:31 -0000

Hi Greg,

thanks – and it seems that we’re on the same page with regards to efficiency (4 bytes of non-required overhead) and maturity (or lack of) of OOAM.

On the IOAM implementation: There are several implementations of IOAM. Some of which have recently been worked on and shown at an IETF hackathon, see https://datatracker.ietf.org/meeting/100/materials/slides-100-hackathon-sessa-in-situ-oam-ioam - where we’ve shown IPv6 and VXLAN-GPE with IOAM – on FD.io/VPP as well as on Barefoot Tofino. You probably also remember the Netronome/Broadcom demo - https://www.youtube.com/watch?v=j9FbD4a3F4E .
Below you seem to be specifically referring to the IOAM open source implementation in FD.io/VPP: There are protocol encapsulations for VXLAN-GPE, NSH, and IPv6 implemented in FD.io/VPP. The current code uses the “next header approach” for VXLAN-GPE and it leverages MD-Type 2 for NSH. As you’re well aware, there the discussion in SFC whether to use MD-Type 2 or next header encapsulating IOAM data in NSH isn’t yet settled, hence we’ll refrain from updating the code until SFC WG has come to a conclusion.

Could you provide a pointer to an OOAM implementation?

Thanks,
Frank

From: Greg Mirsky <gregimirsky@gmail.com>
Sent: Donnerstag, 12. April 2018 18:54
To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
Cc: IETF IPPM WG <ippm@ietf.org>; NVO3 <nvo3@ietf.org>; Service Function Chaining IETF list <sfc@ietf.org>; int-area@ietf.org
Subject: Re: [ippm] encapsulation of IOAM data in various protocols - follow up from WG discussion in London

Hi Frank,
thank you for sharing your points. Please find my notes in-line and tagged GIM>>. I believe that this is very much relevant to work of other working groups that directly work on the overlay encapsulations in the center of the discussion and hence I've added them to the list. Hope we'll have more opinions to reach the conclusion that is acceptable to all.

Regards,
Greg

On Wed, Apr 11, 2018 at 12:02 PM, Frank Brockners (fbrockne) <fbrockne@cisco.com<mailto:fbrockne@cisco.com>> wrote:
Back at the IPPM meeting in London, we discussed several drafts dealing with the encapsulation of IOAM data in various protocols (draft-brockners-ippm-ioam-vxlan-gpe-00, draft-brockners-ippm-ioam-geneve-00, draft-weis-ippm-ioam-gre-00). One discussion topic that we decided to take to the list was the question on whether draft-ooamdt-rtgwg-ooam-header could be leveraged.  After carefully considering draft-ooamdt-rtgwg-ooam-header, I came to the conclusion that the “OOAM header” does not meet the needs of IOAM:
* Efficiency: IOAM adds data to live user traffic. As such, an encapsulation needs to be as efficient as possible. The “OOAM header” is 8 bytes long. The approach for IOAM data encapsulation in the above mentioned drafts only requires 4 bytes. Using the OOAM header approach would add an unnecessary overhead of 4 bytes – which is significant.
GIM>> The difference in four octets is because OOAM Header:

  *   provides more flexibility, e.g. Flags field and Reserved fields;
  *   supports larger OAM packets than iOAM header;
  *   is future proof by supporting versioning (Version field).
* Maturity: IOAM has several implementations, which were also shown at recent IETF hackathons – and we’re expecting additional implementations to be publicized soon. Interoperable implementations need timely specifications. Despite the question being asked, the recent thread on OOAM in the NVO3 list hasn’t revealed any implementation of the OOAM header. In addition, the thread revealed that several fundamental questions about the OOAM header are still open, such as whether or how active OAM mechanisms within protocols such as Geneve would apply to the OOAM header. This ultimately means that we won’t get to a timely specification.
GIM>> May I ask which encapsulations supported by the implementations you refer to. Until very recently all iOAM proposals were to use meta-data TLV in, e.g. Geneve and NSH. And if these or some of these implementations already updated to the newly proposed iOAM shim, I don't see problem in making them use OOAM Header. Would you agree?

* Scope: It isn’t entirely clear to which protocols the OOAM header would ultimately apply to. The way the OOAM header is defined, OOAM uses a 8-bit field for “Next Prot”, the next protocol. Some protocols that IOAM data needs to be encapsulated into use 16-bits for their next protocol code points. See e.g. the GRE encapsulation – as specified in draft-weis-ippm-ioam-gre-00.
GIM>> The first paragraph of the Introduction section states:
   New protocols that support overlay networks like VxLAN-GPE
   [I-D.ietf-nvo3-vxlan-gpe], GUE [I-D.ietf-nvo3-gue], Geneve
   [I-D.ietf-nvo3-geneve], BIER [I-D.ietf-bier-mpls-encapsulation], and
   NSH [I-D.ietf-sfc-nsh] support multi-protocol payload, e.g.
   Ethernet, IPv4/IPv6, and recognize Operations, Administration, and
   Maintenance (OAM) as one of distinct types.  That ensures that
   Overlay OAM (OOAM)packets are sharing fate with Overlay data packet
   traversing the underlay.
I'm updating the OOAM Header draft and along with cleaning nits will update reference to GUE. I think that the list and the statemnt are quite clear in identifying the scope of networks that may benefit from using not only common OOAM Header but common OOAM mechanisms, e.g. Echo Request/Reply<https://tools.ietf.org/html/draft-ooamdt-rtgwg-demand-cc-cv-03>.

With the above in mind, I’d suggest that the WG moves forward with specific definitions for encapsulating IOAM data into protocols – per the above mentioned drafts.

Regards, Frank

_______________________________________________
ippm mailing list
ippm@ietf.org<mailto:ippm@ietf.org>
https://www.ietf.org/mailman/listinfo/ippm