Re: [nvo3] [Int-area] Fwd: New Version Notification for draft-mirsky-rtgwg-oam-identify-00.txt

Tom Herbert <tom@herbertland.com> Thu, 28 June 2018 21:32 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A77A1310E0 for <nvo3@ietfa.amsl.com>; Thu, 28 Jun 2018 14:32:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sEN7mKPEoT0p for <nvo3@ietfa.amsl.com>; Thu, 28 Jun 2018 14:31:58 -0700 (PDT)
Received: from mail-qt0-x22d.google.com (mail-qt0-x22d.google.com [IPv6:2607:f8b0:400d:c0d::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A38EC1310CC for <nvo3@ietf.org>; Thu, 28 Jun 2018 14:31:55 -0700 (PDT)
Received: by mail-qt0-x22d.google.com with SMTP id o9-v6so6139680qtp.3 for <nvo3@ietf.org>; Thu, 28 Jun 2018 14:31:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=tRy6VinVZKV5pKf/2VuvRQ8hu2UFQ/RR8hXmx0CqbwU=; b=OGaS4JtlfEiXThHJ3eXrqjv5YBmmdWgdLMaCBTrUu3EEqmGy8R/KPy+kvAdQhnRcHy 8tfAhHRFZ704I4eY7ZFpYP6orHqgSjGr59FWQLkXLIYhcQrjeTcaoEQX3qVkKA+k9uge u+ZGD+apAWX9J7PA1zdw+6snz+MJIUOkYw33jkMlc5SUR+/ItU1e2K2XWCdIv+3euzH6 yujjxtYvLd9WnSy41AggAuWDC7uQ/O8dPMdKMZdQSyU9cIZSfVX228asDslW/rLngxZi jTrLr4DUInx/Iw/YM9lehLj3hMGMi/eQPmVEhR+jeEOpkk3BVxBAAfc6aR/BfKk7xW9r q+sA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=tRy6VinVZKV5pKf/2VuvRQ8hu2UFQ/RR8hXmx0CqbwU=; b=jkjyNB1Es8XtuXa6yUCSmY5caAN+8laYFLPGIN0njeOskj6sq97SkgqxNMMhjvr++l FczSX5o1w0US3GfX/Ar+vULOYenP6xarMgiMiKdINXaj9eKLSsevfW+MmcsEFXiZfqaK ADsNkg6ZVYwCsvgY5i0uuAW7sJVc/ch6BwHL/cRP2NcuGPrAq/O5huvzfToluGV3kVaH L8TVrTH+Du5gXMa7tWNrlu/kgxAMdBz6XF945+QUk6qwjaVM852DQojmhmCu/9Iqspw8 Q316zEPyssglIPQOZsz4wLag7JiIrGQiYINzAst+K7aMXZJGRXNCMI+Nso48FNu1u/jf w+gg==
X-Gm-Message-State: APt69E1EtTQhOidNIbHadLOdIo6RmFw6mfZf/gl8x7fHdpTZ9Q9KkKx/ /xUgYvz9N0RQY33Uy5E9PYqGbgI+F9bTANaHsp3NPQ==
X-Google-Smtp-Source: AAOMgpeR+1CVMg7EMSfm7YC6AfDS00zsMWo43YvM4zGhdvq0E09juSWZbDHWbaSLHUwQR6VTyMyspRaZaP3dCaqDuLI=
X-Received: by 2002:ac8:2393:: with SMTP id q19-v6mr11032977qtq.197.1530221514539; Thu, 28 Jun 2018 14:31:54 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ac8:3304:0:0:0:0:0 with HTTP; Thu, 28 Jun 2018 14:31:53 -0700 (PDT)
In-Reply-To: <CA+RyBmXBpV3TN2zBpkQB=5N17=Mh+=NGymUkNOUxZ8W_1JhOFQ@mail.gmail.com>
References: <153020466705.14520.2646847580748723541.idtracker@ietfa.amsl.com> <CA+RyBmXBpV3TN2zBpkQB=5N17=Mh+=NGymUkNOUxZ8W_1JhOFQ@mail.gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Thu, 28 Jun 2018 14:31:53 -0700
Message-ID: <CALx6S34dBJ-9NDBAuvtY7ZmWQ3rp8e-kiP=R6h6YTBZu4_wbUQ@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: rtg-bfd@ietf.org, Service Function Chaining IETF list <sfc@ietf.org>, NVO3 <nvo3@ietf.org>, BIER WG <bier@ietf.org>, detnet@ietf.org, int-area <int-area@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/nvo3/cyGfKdKfSXl-ST7BStBB-lJMsPE>
Subject: Re: [nvo3] [Int-area] Fwd: New Version Notification for draft-mirsky-rtgwg-oam-identify-00.txt
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jun 2018 21:32:02 -0000

On Thu, Jun 28, 2018 at 1:34 PM, Greg Mirsky <gregimirsky@gmail.com> wrote:
> Dear All,
> I hope that this new draft (yes, that's what I wanted to send the first
> time) will be of interest to those working on overlay encapsulations.
> Appreciate your comments, questions, and suggestions.
>

Regarding OAM in GUE, the C bit can be set to indicate a control
packet which could be OAM (draft-ietf-intarea-gue-05). I imagine that
OAM could be implement in one or more ctypes. This is considered an
alternative to GUE carrying a data protocol payload, it's not
considered part of the GUE header and isn't limited by GUE header len.

The statement in Geneve description "transit devices MUST NOT attempt
to interpret or process it" is true for all UDP encapsulation
protocols. The problem is that encapsulation is determined by
destination port number. As described in RFC7605, UDP port numbers
only have meaning at the endpoints, so transit devices may incorrectly
interpret packets as being an encapsulation. Incorrectly reading a
packet as encapsulation might be innocuous, but an intermediate node
modifying such a packet that it incorrectly believes is an
encapsulation would be systematic data corruption. Because of this,
probably the only robust method for in-situ OAM is Hop-by-Hop options.

Tom




> Regards,
> Greg
>
> ---------- Forwarded message ----------
> From: <internet-drafts@ietf.org>
> Date: Thu, Jun 28, 2018 at 9:51 AM
> Subject: New Version Notification for draft-mirsky-rtgwg-oam-identify-00.txt
> To: Gregory Mirsky <gregimirsky@gmail.com>
>
>
>
> A new version of I-D, draft-mirsky-rtgwg-oam-identify-00.txt
> has been successfully submitted by Greg Mirsky and posted to the
> IETF repository.
>
> Name:           draft-mirsky-rtgwg-oam-identify
> Revision:       00
> Title:          Identification of Overlay Operations, Administration, and
> Maintenance (OAM)
> Document date:  2018-06-28
> Group:          Individual Submission
> Pages:          9
> URL:
> https://www.ietf.org/internet-drafts/draft-mirsky-rtgwg-oam-identify-00.txt
> Status:
> https://datatracker.ietf.org/doc/draft-mirsky-rtgwg-oam-identify/
> Htmlized:
> https://tools.ietf.org/html/draft-mirsky-rtgwg-oam-identify-00
> Htmlized:
> https://datatracker.ietf.org/doc/html/draft-mirsky-rtgwg-oam-identify
>
>
> Abstract:
>    This document analyzes how the presence of Operations,
>    Administration, and Maintenance (OAM) control command and/or special
>    data is identified in some overlay networks, and an impact on the
>    choice of identification may have on OAM functionality.
>
>
>
>
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
>
>
> _______________________________________________
> Int-area mailing list
> Int-area@ietf.org
> https://www.ietf.org/mailman/listinfo/int-area
>