[RTG-DIR]Re: RtgDir Last Call review: draft-ietf-pals-ple

"Andrew G. Malis" <agmalis@gmail.com> Sun, 16 June 2024 19:28 UTC

Return-Path: <agmalis@gmail.com>
X-Original-To: rtg-dir@ietfa.amsl.com
Delivered-To: rtg-dir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB598C14F69E; Sun, 16 Jun 2024 12:28:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.104
X-Spam-Level:
X-Spam-Status: No, score=-7.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jhlwlrJDPvcl; Sun, 16 Jun 2024 12:28:29 -0700 (PDT)
Received: from mail-pj1-x102c.google.com (mail-pj1-x102c.google.com [IPv6:2607:f8b0:4864:20::102c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0BFF0C14F609; Sun, 16 Jun 2024 12:28:29 -0700 (PDT)
Received: by mail-pj1-x102c.google.com with SMTP id 98e67ed59e1d1-2c2c6277ef3so3035540a91.3; Sun, 16 Jun 2024 12:28:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1718566108; x=1719170908; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=REhIePz3g65KOc9ZSkzaAQKZ8AHnsi888r4gkm1rJMw=; b=fPHamIVjtYR1TasK9nKrCB5sPBlxPNH4VcFAY8YbGANPiupwZshcRl7uA8+Xsi2sGA T1IQ27aFQaS4/Xa4ezh5DhXC7c9JDjBHWM+oLSQK5ngIrN72AH+Dbic6smlV1YrG1+Zr 0CET3CmFOMtKDH3Sj1loif9K7r6z98Ret7jHGb2kqkcpVS2szqbXN+gDGBuOGDaqAlqj t+GvhgJy9TRkE8OZl4zu4jBOzbCckwzLuKYbyruHTdEj/oD2RApslbgyG8hETOtKmPv4 vIztyQPAr1tBaIzp6a9HmLcMLv+JClL2SZWk9C/cPfJMsMakidlqaN1azZ4GvDZvJ8Z6 iRJw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1718566108; x=1719170908; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=REhIePz3g65KOc9ZSkzaAQKZ8AHnsi888r4gkm1rJMw=; b=Sqo9zOZGhGAj/cgGX53YmlLEkTYtqlzeJt+cAeac7qMBSbIahJuNsidrRf1dcueOHT lIv1WvDTUHsrM0C/3EX+aWzPMc4jxhQhE/ktLqu5vRWCE7mQM84NmcpQ7eIGpZQd70hs FSG7Iz5YkzkMFMb6hn2y5X8Z5zo4PcKk3pw+qVDUNUJ/S4LQ+PDjD28ecMMTOLdlYWbX lnuKQqt0XrJ3YUNXV5/R4JH1T2zBTwpaitbptFBUDLMs7aPjUZv9LT4L0B7PUcVsD2BL 2gGXQhVFExKyQuLnpz9ZOFuc97tewvweT5BvRZJhC5j9HHZXoxAC1BVg9d4eug83fLUO QOJA==
X-Forwarded-Encrypted: i=1; AJvYcCW/0UdFsySXpHp1m+dMdDh95fbj/UQIRSgB5l4O1FYhTMDl5FuJKZMfX2SCHWb6b41qJgeLj8JQuiY0UNDsMglp2PhuV/iuIMxk9+QuTBR3wzAiVsvCyTSzJyX5AqzoYWgTz42JhO7z+q3lGIteH9hx2jzCs3zV0lhAvmDreIbWNmW3Kg==
X-Gm-Message-State: AOJu0YwObMqtREfTAF97XNapDEx8QuK63EJ0vJW9Xjc9ql5x6L4ylut7 HY//Jc3mYacXOvvbobltOTtJDKNahq3jKzWzKUjKTfaE+9+eO2wVFWIzL+tyWhaU/o4r52reaMZ KGhdKCUUFoyxZeQ5P0Raj6CXNIjau2iOa
X-Google-Smtp-Source: AGHT+IG29C1CRnupVp8ksTVlUqW/K9n6h/IoJoMLP9lsfBfHPJsuXRyCfdGvHmQS/cXRro8CewHzMxia/uw1SC+3smU=
X-Received: by 2002:a17:90a:db98:b0:2c3:4a9:7bfc with SMTP id 98e67ed59e1d1-2c4db44b89dmr6924113a91.29.1718566108288; Sun, 16 Jun 2024 12:28:28 -0700 (PDT)
MIME-Version: 1.0
References: <CABUE3Xn7XyqQAUJpr9qGx-yG3Au=OX00sgX8uZ4vOBHLpLdhrw@mail.gmail.com> <8DB06D5B-E2E5-4BC9-ACA2-EBE552E51266@cisco.com> <CABUE3XkUYP6BE8soG2_i8EB1+CMLr81FWMTfbYbtJ8e8nndDEQ@mail.gmail.com> <CAA=duU2RRYTU4bZMjGKUq06a0RzAtxFzjWO=ZSUVsXWuQkpPoA@mail.gmail.com> <CABUE3XnP3qNnZYd+xFERp0O53=Nn4YPwLoOnk_yUMdpy04wfcw@mail.gmail.com>
In-Reply-To: <CABUE3XnP3qNnZYd+xFERp0O53=Nn4YPwLoOnk_yUMdpy04wfcw@mail.gmail.com>
From: "Andrew G. Malis" <agmalis@gmail.com>
Date: Sun, 16 Jun 2024 15:28:11 -0400
Message-ID: <CAA=duU2D4=xVz7yTevn5Qff-PuQ3E3NRe0ha8amnUax15CLNdQ@mail.gmail.com>
To: Tal Mizrahi <tal.mizrahi.phd@gmail.com>, "Christian Schmutzer (cschmutz)" <cschmutz@cisco.com>
Content-Type: multipart/alternative; boundary="000000000000685ee4061b06da25"
Message-ID-Hash: J2A7NX7WOCRCM2BMBRN4MQ4WWUCQBHNU
X-Message-ID-Hash: J2A7NX7WOCRCM2BMBRN4MQ4WWUCQBHNU
X-MailFrom: agmalis@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-rtg-dir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "rtg-ads@ietf.org" <rtg-ads@ietf.org>, "pals-chairs@ietf.org" <pals-chairs@ietf.org>, "pals@ietf.org" <pals@ietf.org>, "draft-ietf-pals-ple@ietf.org" <draft-ietf-pals-ple@ietf.org>, "rtg-dir@ietf.org" <rtg-dir@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [RTG-DIR]Re: RtgDir Last Call review: draft-ietf-pals-ple
List-Id: Routing Area Directorate <rtg-dir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-dir/DSVFZtqpfOBU38HHChOzdeT3z9g>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-dir>
List-Help: <mailto:rtg-dir-request@ietf.org?subject=help>
List-Owner: <mailto:rtg-dir-owner@ietf.org>
List-Post: <mailto:rtg-dir@ietf.org>
List-Subscribe: <mailto:rtg-dir-join@ietf.org>
List-Unsubscribe: <mailto:rtg-dir-leave@ietf.org>

Tal,

That sounds good to me, thanks!

Christian, how about you?

Cheers,
Andy


On Sun, Jun 16, 2024 at 2:10 PM Tal Mizrahi <tal.mizrahi.phd@gmail.com>
wrote:

> Hi Andy,
>
> That is an interesting question.
> The text that was suggested by Christian seemed to assume that the
> reader is familiar with the previous endpoint behaviors (End.DX2,
> End.DX2 with NEXT-CSID and End.DX2 with REPLACE-CSID).
> Therefore, the text does not explain the meaning of the new endpoint
> behaviors, because a reader who is familiar with the DX2 endpoint
> behaviors would understand what the new DX1 behaviors do.
>
> A possible way around this is to add more detailed text to the current
> document that explains for each of these new behaviors (End.DX1,
> End.DX1 with NEXT-CSID and End.DX1 with REPLACE-CSID) what exactly it
> means and the corresponding pseudo-code. The similarity to the DX2
> behaviors could be mentioned as a side note, and thus the two drafts
> (srh-compression and srv6-usid) could be informative references. I
> believe RFC 8986 should probably be normative anyway.
>
> Please let me know if that makes sense.
> Cheers,
> Tal.
>
> On Sun, Jun 16, 2024 at 4:26 PM Andrew G. Malis <agmalis@gmail.com> wrote:
> >
> > Tal,
> >
> > Thanks again for your review and also reviewing Christian's reply.
> >
> > I'm concerned regarding your suggestion that
> draft-filsfils-spring-net-pgm-extension-srv6-usid be made a normative
> reference, as it is only an individual draft right now and there's no
> guarantee that it'll even become a WG draft, never mind an RFC, and making
> it a normative reference would hold up publishing this draft for quite a
> while, unless we get special dispensation from the IESG. Do you see any way
> we can get around making draft-filsfils normative?
> >
> > I'm much less concerned regarding
> draft-ietf-spring-srv6-srh-compression, as that is currently in WG last
> call.
> >
> > Thanks again,
> > Andy
> >
> >
> > On Sun, Jun 16, 2024 at 1:12 AM Tal Mizrahi <tal.mizrahi.phd@gmail.com>
> wrote:
> >>
> >> Hi Christian and authors,
> >>
> >> Thanks for considering my comments.
> >> The changes you suggested make sense to me.
> >>
> >> Regarding the new endpoint behaviors, please note:
> >> - The IANA section will need to be updated accordingly.
> >> - You may need to move the references to normative: {{?RFC8986}},
> >> {{?I-D.draft-ietf-spring-srv6-srh-compression}},
> >> {{?I-D.draft-filsfils-spring-net-pgm-extension-srv6-usid}}.
> >> Specifically the last two, which may still be subject to changes.
> >>
> >> Cheers,
> >> Tal.
> >>
> >> On Sat, Jun 8, 2024 at 12:16 PM Christian Schmutzer (cschmutz)
> >> <cschmutz@cisco.com> wrote:
> >> >
> >> > Hi Tal,
> >> >
> >> > Sorry for taking so long. Below our comments and proposal for
> addressing your issues.
> >> >
> >> > Can you please let us know your thoughts. Upon your feedback we will
> work towards uploading a new version addressing the issues.
> >> >
> >> > regards
> >> > Christian
> >> >
> >> > On 15.05.2024, at 01:20, Tal Mizrahi <tal.mizrahi.phd@gmail.com>
> wrote:
> >> >
> >> > Hello,
> >> >
> >> > I have been selected as the Routing Directorate reviewer for this
> >> > draft. The Routing Directorate seeks to review all routing or
> >> > routing-related drafts as they pass through IETF last call and IESG
> >> > review, and sometimes on special request. The purpose of the review is
> >> > to provide assistance to the Routing ADs. For more information about
> >> > the Routing Directorate, please see
> >> > https://wiki.ietf.org/en/group/rtg/RtgDir
> >> >
> >> > Document: draft-ietf-pals-ple-04
> >> > Reviewer: Tal Mizrahi
> >> > Intended Status: Standards Track
> >> >
> >> > Summary:
> >> > I have some concerns about this document that I think should be
> >> > resolved before publication.
> >> >
> >> > The draft is well-written and clear from a grammatical and structural
> >> > perspective. However, there is a very long list of normative
> >> > references that are cited in almost every paragraph of the document,
> >> > making it very difficult to follow for a reader who is somewhat
> >> > familiar with the area but is not an expert in the area.
> >> >
> >> >
> >> > [cs]
> >> > PLE has a lot of similarities with RFC 4553 and other referenced
> specifications. We felt references are better as it avoids duplication of
> text across documents, but I see your point. We will work through the
> document and add a bit more text / context before calling out a RFC
> reference.
> >> >
> >> > Here an example from the introduction section. Will do something
> similar for other sections.
> >> >
> >> > before:
> >> >
> >> > The mechanisms described in this document follow principals similar
> to [RFC4553] but expanding the applicability beyond the narrow set of PDH
> interfaces (T1, E1, T3 and E3) and allow the transport of signals from many
> different technologies such as Ethernet, Fibre Channel, SONET/SDH
> [GR253]/[G.707] and OTN [G.709] at gigabit speeds by treating them as
> bit-stream payload defined in sections 3.3.3 and 3.3.4 of [RFC3985].
> >> >
> >> >
> >> > after:
> >> >
> >> > The mechanisms described in this document follow principles similar
> to Structure-Agnostic Time Division Multiplexing (TDM) over Packet (SAToP)
> defined in [RFC4553]. The the applicability is expanded beyond the narrow
> set of PDH interfaces (T1, E1, T3 and E3) to allow the transport of signals
> from many different technologies such as Ethernet, Fibre Channel, SONET/SDH
> [GR253]/[G.707] and OTN [G.709] at gigabit speeds. The signals are treated
> as bit-stream payload which was defined in the Pseudo Wire Emulation
> Edge-to-Edge (PWE3) architecture in [RFC3985] sections 3.3.3 and 3.3.4.
> >> >
> >> >
> >> > Where applicable we will remove the reference and just have
> appropriate text. Once example
> >> >
> >> > before:
> >> >
> >> > Similar to [RFC4553] and [RFC5086] the term Interworking Function
> (IWF) is used to describe the functional block that encapsulates bit
> streams into PLE packets and in the reverse direction decapsulates PLE
> packets and reconstructs bit streams.
> >> >
> >> >
> >> > after:
> >> >
> >> > The term Interworking Function (IWF) is used to describe the
> functional block that encapsulates bit streams into PLE packets and in the
> reverse direction decapsulates PLE packets and reconstructs bit streams.
> >> >
> >> >
> >> >
> >> > Issues:
> >> > - The target audience of the document should be clarified, preferably
> >> > in the abstract. On a related note, throughout the document it is a
> >> > bit difficult to distinguish between requirements defined for
> >> > operators vs. requirements defined for implementers. Perhaps the
> >> > authors could give some thought as to whether this issue can be
> >> > mitigated.
> >> >
> >> >
> >> > [cs]
> >> > the target audience is implementers. We adjusted the abstract to
> reflect that
> >> >
> >> > before:
> >> >
> >> > This document describes a method for encapsulating high-speed
> bit-streams as virtual private wire services (VPWS) over packet switched
> networks (PSN) providing complete signal transport transparency.
> >> >
> >> >
> >> > after:
> >> >
> >> > This document describes methods and requirements for implementing the
> encapsulation of high-speed bit-streams into virtual private wire services
> (VPWS) over packet switched networks (PSN) providing complete signal
> transport transparency.
> >> >
> >> >
> >> > - The security considerations should be more detailed. The cited
> >> > references are a good start, but the following issues should also be
> >> > discussed:
> >> >
> >> >  - The requirement for synchronization is potentially a
> >> > vulnerability. An on-path attacker may compromise the synchronization,
> >> > and thus compromise the service. You may want to take a look at RFC
> >> > 7384.
> >> >
> >> >  - The requirements for low jitter, low loss and bandwidth
> >> > reservation (section 8) are also potentially an attack vector. You may
> >> > take a look at RFC 9055 for example.
> >> >
> >> >
> >> > [cs]
> >> > We have added a couple of sentences to provide more details, plus
> referred to respective RFCs for more information
> >> >
> >> > before:
> >> >
> >> > As PLE is leveraging VPWS as transport mechanism the security
> considerations described in [RFC7432] and [RFC3985] are applicable.
> >> >
> >> >
> >> >
> >> > after:
> >> >
> >> > As PLE is leveraging VPWS as transport mechanism the security
> considerations described in [RFC7432] and [RFC3985] are applicable.
> >> >
> >> > PLE does not enhance or detract from the security performance of the
> underlying PSN. It relies upon the PSN mechanisms for encryption,
> integrity, and authentication whenever required.
> >> >
> >> > A data plane attack may force PLE packets to be dropped, re-ordered
> or delayed beyond the limit of the CE-bound IWF's dejitter buffer leading
> to either degradation or service disruption. Considerations outlined in
> [RFC9055] are a good reference.
> >> >
> >> > Clock synchronization leveraging PTP is sensitive to Packet Delay
> Variation (PDV) and vulnerable to various threads and attacked vectors.
> Considerations outlined in [RFC7384] should be taken into account.
> >> >
> >> >
> >> >
> >> > - The following two endpoint behaviors are defined in the IANA
> >> > considerations section, but not defined anywhere in the document.
> >> > These endpoint behaviors should either be removed or specified in
> >> > detail:
> >> > End.DX1 with NEXT-CSID
> >> > End.DX1 with REPLACE-CSID
> >> >
> >> >
> >> > [cs]
> >> > Good point and I realised we have also forgotten to add the required
> encaps description. We have reworded this section as follows (in markdown
> syntax)
> >> >
> >> > When a SRv6 PSN layer is used, a SRv6 service SID does provide the
> demultiplexing mechanism and the mechanisms defined in {{?RFC8402}} and
> {{?RFC9252}} section 6 do apply. Both SRv6 service SIDs with the full IPv6
> address format defined in {{?RFC8986}} and compressed SIDs (C-SIDs) with
> format defined in {{?I-D.draft-ietf-spring-srv6-srh-compression}} can be
> used.
> >> >
> >> > Two new encapsulation behaviors H.Encaps.L1 and H.Encaps.L1.Red are
> defined in this document. The behavior procedures are applicable to both
> SIDs and C-SIDs.
> >> >
> >> > The H.Encaps.L1 behavior encapsulates a frame received from an IWF in
> a IPv6 packet with an SRH. The received frame becomes the payload of the
> new IPv6 packet.
> >> >
> >> > * The next header field of the SRH MUST be set to TBA1.
> >> >
> >> > * The push of the SRH MAY be omitted when the SRv6 policy only
> contains one segment.
> >> >
> >> > The H.Encaps.L1.Red behavior is an optimization of the H.Encaps.L1
> behavior.
> >> >
> >> > * H.Encaps.L1.Red reduces the length of the SRH by excluding the
> first SID in the SRH of the pushed IPv6 header. The first SID is only
> placed in the destination address field of the pushed IPv6 header.
> >> >
> >> > * The push of the SRH MAY be omitted when the SRv6 policy only
> contains one segment.
> >> >
> >> > Three new "Endpoint with decapsulation and bit-stream cross-connect"
> behaviors called End.DX1, End.DX1 with NEXT-CSID and End.DX1 with
> REPLACE-CSID are defined in this document.
> >> >
> >> > These new behaviors are variants of End.DX2 defined in {{?RFC8986}},
> End.DX2 with REPLACE-CSID defined in
> {{?I-D.draft-ietf-spring-srv6-srh-compression}} and End.DX2 with NEXT-CSID
> defined in {{?I-D.draft-filsfils-spring-net-pgm-extension-srv6-usid}} and
> all have the following procedures in common
>