Re: [nvo3] Comments on draft-ietf-nvo3-vxlan-gpe

Greg Mirsky <gregimirsky@gmail.com> Wed, 17 April 2019 19:00 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C0C31205F9; Wed, 17 Apr 2019 12:00:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yDvmVgUQa9aT; Wed, 17 Apr 2019 12:00:15 -0700 (PDT)
Received: from mail-lf1-x12c.google.com (mail-lf1-x12c.google.com [IPv6:2a00:1450:4864:20::12c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D3D4A120627; Wed, 17 Apr 2019 12:00:14 -0700 (PDT)
Received: by mail-lf1-x12c.google.com with SMTP id h5so16762157lfm.1; Wed, 17 Apr 2019 12:00:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=JCayDDduBLQt+OHqJuyR7kyHas7WLlvHJN9uRbWQKCE=; b=E0yTWqShide0zpYXjNMhFsdpX3EPYfga8t5sz7SNaXFgRew7BiIsDkfHW+b8UMLFo1 ri9EWoeHa4bJpOk6nCVWraGKrwv+uZ6gSDLncP5jo8XRoP+dBkna9Zzj8Ve6loMPCL2A OVujwVvniSeEQiM2ckI9Db/ugZJbJj/O7++OLp4II8awKjQdVU45PLTwqpL+XGhY3wcT 8qsQC1qldpWMj2cE+kxICP4LUsJLf+y+eVswGsjmZ29F1dHoJV03nn0L5BZgBr3xkpz2 qCopMti95nJet6Ufw+edmhStuRXc3GnWyokgd1hGREaSkSi++U9i7i9ZXupgI0kWcluW 6r1w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=JCayDDduBLQt+OHqJuyR7kyHas7WLlvHJN9uRbWQKCE=; b=JIgnOt1MWbu6Di1vupKHNl/mHqD7ioAn9vlbJHJGZ708fCZMyB3HLVvShwFGr4Ouz8 YXiLHk/JyOtvxZ4vNdqp1n388k4juPCueQBLKzKHuwIVWYjf54MTbSdNnTNY9ab/tzui uj3jBATrG7SqUiDumrOIsuNQQKU4xiDJe42WEtlooaceZG2c0zoPc3cYtRyJGlIEbZFj GfHnAONLePD4ShGGRnej7ikcNm+QgLXNB2U5yJU5v+YUxVtzmNhRY+kAZ8wpdJ498AyF 51WuW2T//6Aid5ptvzqDiBMl0/Q8teUZiAwc7Zy6Onh4XK/SE7lGoJ0cLrdHne8wOn2E gjeg==
X-Gm-Message-State: APjAAAVdlwP0mXZlr9xhfr6V6RCa0+p3GtcqkonKmWg9U1fVjMOzAdqw /3HjSHFYpVc0ME6Ilzi9g0AwCKzjn3bgzaVavYg=
X-Google-Smtp-Source: APXvYqzZ7zBlI/z5HwFhRqq8vJSS5qrzi/PYJAoOQrkEjaMxNE1FHnJggys6kIJK70+QwqyIyGYqu2uDugKbkQ7O84k=
X-Received: by 2002:a19:6619:: with SMTP id a25mr49703858lfc.21.1555527612874; Wed, 17 Apr 2019 12:00:12 -0700 (PDT)
MIME-Version: 1.0
References: <CA+RyBmV5R+jsPNn9-HooGcJzobD5mrxEwjbxn_o+hn2QcoiZNQ@mail.gmail.com> <12ACA02A-BB51-4214-A72B-1AEFCCB914AC@cisco.com>
In-Reply-To: <12ACA02A-BB51-4214-A72B-1AEFCCB914AC@cisco.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Wed, 17 Apr 2019 12:00:05 -0700
Message-ID: <CA+RyBmUgQdq-oHQFveGV3avStL=4B+=qxMU+epk6mHdAqhRR0w@mail.gmail.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Cc: "draft-ietf-nvo3-vxlan-gpe@ietf.org" <draft-ietf-nvo3-vxlan-gpe@ietf.org>, NVO3 <nvo3@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000cdc3720586be7e63"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nvo3/cgCyMAHHVmB8XaRiUdpy0Guv_8s>
Subject: Re: [nvo3] Comments on draft-ietf-nvo3-vxlan-gpe
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Apr 2019 19:00:23 -0000

Hi Carlos,
thank you for sharing your view on the design of the VXLAN-GPE protocol.
Please find my comments in-line tagged GIM>>.

Regards,
Greg

On Fri, Apr 12, 2019 at 5:23 AM Carlos Pignataro (cpignata) <
cpignata@cisco.com> wrote:

> Greg,
>
> You seem to be confusing and mixing things up.
>
> Please see inline.
>
> > On Apr 12, 2019, at 2:50 AM, Greg Mirsky <gregimirsky@gmail.com> wrote:
> >
> > Dear Editors, et al.,
> > I've read the latest -07 version and would like to share my comments and
> questions with you:
> >       • in the earlier version of the draft, the O-bit was introduced
> and defined as:
> > OAM Flag Bit (O bit):  The O bit is set to indicate that the packet is
> an OAM packet.
> > At the same time, in the latest version, the new Next Protocol value
> (0x81) to identify iOAM Data was introduced. Hence are my questions:
> >       • What must be the value of the O-bit when the value of the Next
> Protocol field is iOAM?
>
> The O bit “is set to indicate that the packet is an OAM packet”.
> IAOM is not an OAM packet. Hence, O bit clear if VXLAN-GPE encapsulates a
> non-OAM packet and adds an IOAM shim.
>
GIM>> It is a very unexpected statement from you, one of the co-authors of
draft-ietf-ippm-ioam-data
<https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-data/> where the
first paragraph of the Introduction section defines iOAM as Hybrid Type 1
OAM, according to RFC 7799 classification:
   IOAM is to complement
   mechanisms such as Ping or Traceroute, or more recent active probing
   mechanisms as described in [I-D.lapukhov-dataplane-probe].  In terms
   of "active" or "passive" OAM, "in-situ" OAM can be considered a
   hybrid OAM type.  While no extra packets are sent, IOAM adds
   information to the packets therefore cannot be considered passive.
   In terms of the classification given in [RFC7799] IOAM could be
   portrayed as Hybrid Type 1.

>
> >       • Do you plan to define the Next Protocol values for active OAM
> protocols, e.g., Echo Request/Reply, BFD, Performance Monitoring?
>
> I cannot speak to “plans” (replying as “et al.”, not as “editor”), but I
> expect OAM documents ought to have those requested, and you do not need
> necessarily all of those — the nex protocol IPv4 / IPv6 can encapsulate
> ICMP, UDP/BFD, etc., etc., etc., etc.
>
GIM>> Of course, use of the well-known port number, usually it is UDP
destination port, is one of the methods to demultiplex protocols. This
method is broadly used, for example, in MPLS OAM. But this method has some
disadvantages that were pointed out in the discussion of BFD over GENEVE in
Prague by David Black (the last presentation in the minutes
<https://datatracker.ietf.org/meeting/104/materials/minutes-104-nvo3-01>):

David: I want the BFD header to be as close to the thing whose liveness I'm
testing. The more headers you add in the middle, the more ways there are to
break BFD without breaking the forwarding engine. The further away I move
BFD from the chunk of hardware's liveness I care about, the more
opportunities are for BFD and the hardware to not to tell me the same thing.



> >       • How to interpret the situation when the O-bit value is 1 but the
> value of the Next Protocol field is, for example, NSH, i.e.., not any of
> OAM protocols?
>
> I expect it means there’s OAM within that NSH (sometimes there’s no such
> things as “OAM Protocols”), or an unhandled OAM protocol.
>
GIM>> Should that, i.e., OAM in NSH or immediately following NSH be
signaled using SFC NSH methods that are already defined in
draft-ietf-sfc-multi-layer-oam
<https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/>? Using
the server layer, as you've suggested, seems as layer violation.

>
> >       • I believe that the use of the dedicated OAM flag and the Next
> Protocol field for a fixed-size header that cannot include meta-data is
> unwarranted and adds unnecessary complexity.
>
> Disagree.
>
> See example where protocol is IP carrying an OAM packet.
>
GIM>> When IP/UDP encapsulation is used for OAM, there's no, in my opinion,
any need to use the O-bit. The destination IP address must be as described
in RFC 8029 or RFC 5884 and the demultiplexing is done based on the
destination UDP port number. Clearly, O-bit is unnecessary if IP/UDP
encapsulation for OAM being used.

>
> > I suggest not to use O-bit in the VXLAN-GPE header and release it into
> the Reserved field.  I don't see the apparent benefit of using the flag, as
> the VXLA-GPE uses the fixed size header and the header cannot carry OAM
> data in it. The only role the VXLAN-GPE header must perform, in my opinion,
> is to unambiguously identify the payload type that immediately follows the
> header as OAM (demultiplexing OAM protocols may be done in OAM Header shim).
> > Much appreciate your consideration.
> >
>
> Best,
>
> —
> Carlos Pignataro, carlos@cisco.com
>
> “Sometimes I use big words that I do not fully understand, to make myself
> sound more photosynthesis."
>
> > Regards,
> > Greg
> > _______________________________________________
> > nvo3 mailing list
> > nvo3@ietf.org
> > https://www.ietf.org/mailman/listinfo/nvo3
>
>