Re: [Rtg-ooam-dt] [sfc] Identifying OAM in NSH

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Fri, 22 July 2016 08:12 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: rtg-ooam-dt@ietfa.amsl.com
Delivered-To: rtg-ooam-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1096612D672; Fri, 22 Jul 2016 01:12:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.808
X-Spam-Level:
X-Spam-Status: No, score=-15.808 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x788PrGC_lxN; Fri, 22 Jul 2016 01:12:06 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 03F1E12D5EB; Fri, 22 Jul 2016 01:12:05 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4176; q=dns/txt; s=iport; t=1469175125; x=1470384725; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=LDuroTSpjp3TucjORu/T2ZZsgxzE3ZXgY2ItLWfKpOw=; b=XBH3glm17F5ksyUBbrXiflYWJYsQXJpUsmSjnoF6HYju86mqdkZtQ/mz Dy7HYCSb48Rp2FfC4Xwu11/4n/NSgyxjbANm6OZk2WExwNhfJuIMziwI1 z8U8jSyMh8gPJB8NUAB4aW+O48NRj3fvPtg9nftTHdbUawx7KdQolGTU9 U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0A6AgC21JFX/4ENJK1dgz9WfLhdgXsjhXkCgTA4FAEBAQEBAQFdJ4RcAQEEAQEBOC0HCwUHBAIBCBEEAQEBHgkHJwsUCQgCBA4FiCgIDrw+AQEBAQEBAQEBAQEBAQEBAQEBAQEBFwWGKoF4glWEQIMsgi8FmSYBjmyBbIRZiHWQIAEeNoNzbohVAQEB
X-IronPort-AV: E=Sophos;i="5.28,404,1464652800"; d="scan'208";a="301012776"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 22 Jul 2016 08:12:05 +0000
Received: from XCH-RTP-019.cisco.com (xch-rtp-019.cisco.com [64.101.220.159]) by alln-core-9.cisco.com (8.14.5/8.14.5) with ESMTP id u6M8C4sN009705 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 22 Jul 2016 08:12:05 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-019.cisco.com (64.101.220.159) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Fri, 22 Jul 2016 04:12:04 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1210.000; Fri, 22 Jul 2016 04:12:04 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Gregory Mirsky <gregory.mirsky@ericsson.com>
Thread-Topic: [Rtg-ooam-dt] [sfc] Identifying OAM in NSH
Thread-Index: AQHR4/C6G5JtD7eESEKpu32R0om68Q==
Date: Fri, 22 Jul 2016 08:12:04 +0000
Message-ID: <35A00960-472E-42DF-B422-D7AC57A92880@cisco.com>
References: <7347100B5761DC41A166AC17F22DF11221ADA9CB@eusaamb103.ericsson.se> <20160721075801.5697618.51293.99071@sandvine.com>, <7347100B5761DC41A166AC17F22DF11221ADAAD3@eusaamb103.ericsson.se>
In-Reply-To: <7347100B5761DC41A166AC17F22DF11221ADAAD3@eusaamb103.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-ooam-dt/AqSdYH9bnBrwgCxbZoIIoyg7gOg>
Cc: "rtg-ooam-dt@ietf.org" <rtg-ooam-dt@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Dave Dolson <ddolson@sandvine.com>
Subject: Re: [Rtg-ooam-dt] [sfc] Identifying OAM in NSH
X-BeenThere: rtg-ooam-dt@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List is used by the Routing Area Overlay OAM Design team for internal coordination and discussion <rtg-ooam-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-ooam-dt>, <mailto:rtg-ooam-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-ooam-dt/>
List-Post: <mailto:rtg-ooam-dt@ietf.org>
List-Help: <mailto:rtg-ooam-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-ooam-dt>, <mailto:rtg-ooam-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jul 2016 08:12:08 -0000

Dear Greg,

Please see inline. 

Thumb typed by Carlos Pignataro.
Excuze typofraphicak errows

> On Jul 21, 2016, at 10:49, Gregory Mirsky <gregory.mirsky@ericsson.com> wrote:
> 
> Hi Dave,
> thank you for the clarification. You point to the very important issue that has implication onto applicability of methods that add, prepend or append, OAM-specific information to a data packet. One way to address, I assume, is to introduce Length field that equals number of octets in Next Protocol.

I believe an approach like, coupled with the other proposal, this would add unnecessary complexity. 

Best,

-- Carlos. 

> 
>    Regards,
>        Greg
> 
> -----Original Message-----
> From: Dave Dolson [mailto:ddolson@sandvine.com] 
> Sent: Thursday, July 21, 2016 9:58 AM
> To: Gregory Mirsky <gregory.mirsky@ericsson.com>; sfc@ietf.org
> Cc: rtg-ooam-dt@ietf.org
> Subject: Re: [sfc] Identifying OAM in NSH
> 
> Greg,
> This answers some of the questions I had after your presentations.
> 
> However, regarding appending OAM after the packet, NSH header doesn't have a length field that could indicate where the appended portion begins.
> The current Length field is regarding the header size.
> 
> 
> -Dave
> 
> 
> From: Gregory Mirsky
> Sent: Thursday, July 21, 2016 9:01 AM
> To: sfc@ietf.org
> Cc: rtg-ooam-dt@ietf.org
> Subject: [sfc] Identifying OAM in NSH
> 
> 
> Dear All,
> we had very good discussion on OAM this week. We've touched on Active, Passive and Something-in-between OAM. But can NSH indicate which OAM type, if any, associated with a packet? I think that the current version of draft-ietf-sfc-nsh does not allow that and may be ambiguous in some cases. I propose change to interpretation and applicability description of the O(AM) flag and allocation of the new protocol type to be used in the Next Protocol field.
> 
> RFC 7799 defines Active OAM as following:
> An Active Metric or Method depends on a dedicated measurement packet stream and observations of the stream.
> Thus, regardless of encapsulation used by OAM, it is the packet constructed solely for monitoring, measuring network's metric and should not leave given domain. And, I believe, such packets should be identified by the protocol type of their own. OAM which behaves as much as Passive OAM or Something-in-between, e.g. OAM appended to data packet either at the domain's edge or on-the-fly, identified by the protocol type of the data packet carried in NSH.
> Below are changes I'd like to propose:
> Section 3.2 O-bit:
> OLD
>   O bit: when set to 0x1 indicates that this packet is an Operations,
>   Administration and Maintenance (OAM) message.  The receiving SFF and
>   SFs nodes MUST examine the payload and take appropriate action (e.g.
>   return status information).  OAM message specifics and handling
>   details are outside the scope of this document.
> END
> NEW
> O bit: when set to 0x1 indicates that data packet identified by the Next Protocol type has OAM metadata appended. Definition of the format(s) used by OAM metadata is outside the scope of this document.
> END
> 
> At the end of Section 3.2:
> OLD
>   This draft defines the following Next Protocol values:
> 
>   0x1 : IPv4
>   0x2 : IPv6
>   0x3 : Ethernet
>   0x4: NSH
>   0x5: MPLS
>   0x6-0xFD: Unassigned
>   0xFE-0xFF: Experimental
> END
> NEW
>   This draft defines the following Next Protocol values:
> 
>   0x1 : IPv4
>   0x2 : IPv6
>   0x3 : Ethernet
>   0x4: NSH
>   0x5: MPLS
>   0x6: Active OAM
>   0x7-0xFD: Unassigned
>   0xFE-0xFF: Experimental
> END
> 
> And, consequently, section 13.2.5 in IANA Considerations section will request allocation of value 0x6 to be assigned to Active OAM protocols.
> 
> Greatly appreciate your consideration and comments.
> 
>                Regards,
>                                Greg
> 
> _______________________________________________
> Rtg-ooam-dt mailing list
> Rtg-ooam-dt@ietf.org
> https://www.ietf.org/mailman/listinfo/rtg-ooam-dt