Re: [Rtg-ooam-dt] [sfc] Identifying OAM in NSH

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Fri, 22 July 2016 09:02 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: rtg-ooam-dt@ietfa.amsl.com
Delivered-To: rtg-ooam-dt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06CA012DAC1; Fri, 22 Jul 2016 02:02:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.808
X-Spam-Level:
X-Spam-Status: No, score=-15.808 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cZp11e7OQIQc; Fri, 22 Jul 2016 02:02:28 -0700 (PDT)
Received: from rcdn-iport-3.cisco.com (rcdn-iport-3.cisco.com [173.37.86.74]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5858712D7D8; Fri, 22 Jul 2016 02:02:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5436; q=dns/txt; s=iport; t=1469178148; x=1470387748; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=28ea/zdJLk9bbCIqRMSK9iOsiFAL0ZoGALiB8msJkAw=; b=Q2tbrdbK4Np46pUFkOf/woRxAY+YxMcIQtwWYDOhYWYCp5SxRZfG5TnE uB1opA2F/Ipmk9V/CiKXHZBkfiv2BiBFQ1lnde11mbBo3kbAGD4Yz5soV 7XHej/N661GAv1qw7mYtvaPrkROFS1vWBHvXjQKRYd3WUAmKeiI+9fJFh 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0A6AgBy4JFX/4cNJK1dgz9WfLhdgXslhXcCgTA4FAEBAQEBAQFdJ4RcAQEEAQEBOC0HCwUHBAIBCA4DBAEBAR4JBycLFAkIAgQOBYgoCA68RgEBAQEBAQEBAQEBAQEBAQEBAQEBARcFhiqBeIJVhECDLIIvBZNkhUIBhhWIV4FshFmIdZAgAR42g3NuiFUBAQE
X-IronPort-AV: E=Sophos;i="5.28,404,1464652800"; d="scan'208";a="132292221"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by rcdn-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 22 Jul 2016 09:02:27 +0000
Received: from XCH-RTP-019.cisco.com (xch-rtp-019.cisco.com [64.101.220.159]) by alln-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id u6M92QYO030211 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 22 Jul 2016 09:02:27 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-019.cisco.com (64.101.220.159) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Fri, 22 Jul 2016 05:02:26 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1210.000; Fri, 22 Jul 2016 05:02:26 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Dave Dolson <ddolson@sandvine.com>
Thread-Topic: [Rtg-ooam-dt] [sfc] Identifying OAM in NSH
Thread-Index: AQHR4/C6G5JtD7eESEKpu32R0om68aAkaNYA//++0Xo=
Date: Fri, 22 Jul 2016 09:02:25 +0000
Message-ID: <1AB3F3ED-B13D-4D83-AAF2-AC47556FC206@cisco.com>
References: <7347100B5761DC41A166AC17F22DF11221ADA9CB@eusaamb103.ericsson.se> <20160721075801.5697618.51293.99071@sandvine.com>, <7347100B5761DC41A166AC17F22DF11221ADAAD3@eusaamb103.ericsson.se> <35A00960-472E-42DF-B422-D7AC57A92880@cisco.com>, <E8355113905631478EFF04F5AA706E98310374C9@wtl-exchp-2.sandvine.com>
In-Reply-To: <E8355113905631478EFF04F5AA706E98310374C9@wtl-exchp-2.sandvine.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtg-ooam-dt/Bq4CXCS-0DsMcz1La1znkqxMV18>
Cc: Gregory Mirsky <gregory.mirsky@ericsson.com>, "rtg-ooam-dt@ietf.org" <rtg-ooam-dt@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Subject: Re: [Rtg-ooam-dt] [sfc] Identifying OAM in NSH
X-BeenThere: rtg-ooam-dt@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: List is used by the Routing Area Overlay OAM Design team for internal coordination and discussion <rtg-ooam-dt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtg-ooam-dt>, <mailto:rtg-ooam-dt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtg-ooam-dt/>
List-Post: <mailto:rtg-ooam-dt@ietf.org>
List-Help: <mailto:rtg-ooam-dt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtg-ooam-dt>, <mailto:rtg-ooam-dt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jul 2016 09:02:31 -0000

Hi Dave,

No, that's not what I am suggesting. On the contrary. 

The piggy-back OAM (let's call it iOAM without expanding the "i" for now so as to not have tangential nomenclature discussions) is being carried along for the ride in a data packet. The packet is data, not OAM. 

Much like I recall discussions about carrying time stamps in the MD, this provides you with a more generic mechanism. 

See https://tools.ietf.org/html/draft-brockners-inband-oam-transport-01#section-5

What I am suggesting is that for an OAM packet, not iOAM, O=1 and the protocol field specifies the OAM protocol. 

Thanks!

Thumb typed by Carlos Pignataro.
Excuze typofraphicak errows

> On Jul 22, 2016, at 10:55, Dave Dolson <ddolson@sandvine.com> wrote:
> 
> Carlos, do you suggest so-called "piggy-back" OAM should not be provided?
> 
> 
> -----Original Message-----
> From: Carlos Pignataro (cpignata) [mailto:cpignata@cisco.com] 
> Sent: Friday, July 22, 2016 10:12 AM
> To: Gregory Mirsky
> Cc: Dave Dolson; sfc@ietf.org; rtg-ooam-dt@ietf.org
> Subject: Re: [Rtg-ooam-dt] [sfc] Identifying OAM in NSH
> 
> Dear Greg,
> 
> Please see inline. 
> 
> Thumb typed by Carlos Pignataro.
> Excuze typofraphicak errows
> 
>> On Jul 21, 2016, at 10:49, Gregory Mirsky <gregory.mirsky@ericsson.com> wrote:
>> 
>> Hi Dave,
>> thank you for the clarification. You point to the very important issue that has implication onto applicability of methods that add, prepend or append, OAM-specific information to a data packet. One way to address, I assume, is to introduce Length field that equals number of octets in Next Protocol.
> 
> I believe an approach like, coupled with the other proposal, this would add unnecessary complexity. 
> 
> Best,
> 
> -- Carlos. 
> 
>> 
>>   Regards,
>>       Greg
>> 
>> -----Original Message-----
>> From: Dave Dolson [mailto:ddolson@sandvine.com] 
>> Sent: Thursday, July 21, 2016 9:58 AM
>> To: Gregory Mirsky <gregory.mirsky@ericsson.com>; sfc@ietf.org
>> Cc: rtg-ooam-dt@ietf.org
>> Subject: Re: [sfc] Identifying OAM in NSH
>> 
>> Greg,
>> This answers some of the questions I had after your presentations.
>> 
>> However, regarding appending OAM after the packet, NSH header doesn't have a length field that could indicate where the appended portion begins.
>> The current Length field is regarding the header size.
>> 
>> 
>> -Dave
>> 
>> 
>> From: Gregory Mirsky
>> Sent: Thursday, July 21, 2016 9:01 AM
>> To: sfc@ietf.org
>> Cc: rtg-ooam-dt@ietf.org
>> Subject: [sfc] Identifying OAM in NSH
>> 
>> 
>> Dear All,
>> we had very good discussion on OAM this week. We've touched on Active, Passive and Something-in-between OAM. But can NSH indicate which OAM type, if any, associated with a packet? I think that the current version of draft-ietf-sfc-nsh does not allow that and may be ambiguous in some cases. I propose change to interpretation and applicability description of the O(AM) flag and allocation of the new protocol type to be used in the Next Protocol field.
>> 
>> RFC 7799 defines Active OAM as following:
>> An Active Metric or Method depends on a dedicated measurement packet stream and observations of the stream.
>> Thus, regardless of encapsulation used by OAM, it is the packet constructed solely for monitoring, measuring network's metric and should not leave given domain. And, I believe, such packets should be identified by the protocol type of their own. OAM which behaves as much as Passive OAM or Something-in-between, e.g. OAM appended to data packet either at the domain's edge or on-the-fly, identified by the protocol type of the data packet carried in NSH.
>> Below are changes I'd like to propose:
>> Section 3.2 O-bit:
>> OLD
>>  O bit: when set to 0x1 indicates that this packet is an Operations,
>>  Administration and Maintenance (OAM) message.  The receiving SFF and
>>  SFs nodes MUST examine the payload and take appropriate action (e.g.
>>  return status information).  OAM message specifics and handling
>>  details are outside the scope of this document.
>> END
>> NEW
>> O bit: when set to 0x1 indicates that data packet identified by the Next Protocol type has OAM metadata appended. Definition of the format(s) used by OAM metadata is outside the scope of this document.
>> END
>> 
>> At the end of Section 3.2:
>> OLD
>>  This draft defines the following Next Protocol values:
>> 
>>  0x1 : IPv4
>>  0x2 : IPv6
>>  0x3 : Ethernet
>>  0x4: NSH
>>  0x5: MPLS
>>  0x6-0xFD: Unassigned
>>  0xFE-0xFF: Experimental
>> END
>> NEW
>>  This draft defines the following Next Protocol values:
>> 
>>  0x1 : IPv4
>>  0x2 : IPv6
>>  0x3 : Ethernet
>>  0x4: NSH
>>  0x5: MPLS
>>  0x6: Active OAM
>>  0x7-0xFD: Unassigned
>>  0xFE-0xFF: Experimental
>> END
>> 
>> And, consequently, section 13.2.5 in IANA Considerations section will request allocation of value 0x6 to be assigned to Active OAM protocols.
>> 
>> Greatly appreciate your consideration and comments.
>> 
>>               Regards,
>>                               Greg
>> 
>> _______________________________________________
>> Rtg-ooam-dt mailing list
>> Rtg-ooam-dt@ietf.org
>> https://www.ietf.org/mailman/listinfo/rtg-ooam-dt