< draft-ietf-sfc-oam-framework-13.txt   draft-ietf-sfc-oam-framework-14.txt >
Internet Engineering Task Force S. Aldrin Internet Engineering Task Force S. Aldrin
Internet-Draft Google Internet-Draft Google
Intended status: Informational C. Pignataro, Ed. Intended status: Informational C. Pignataro, Ed.
Expires: October 16, 2020 N. Kumar, Ed. Expires: October 29, 2020 N. Kumar, Ed.
Cisco Cisco
R. Krishnan R. Krishnan
VMware VMware
A. Ghanwani A. Ghanwani
Dell Dell
April 14, 2020 April 27, 2020
Service Function Chaining (SFC) Service Function Chaining (SFC)
Operations, Administration and Maintenance (OAM) Framework Operations, Administration and Maintenance (OAM) Framework
draft-ietf-sfc-oam-framework-13 draft-ietf-sfc-oam-framework-14
Abstract Abstract
This document provides a reference framework for Operations, This document provides a reference framework for Operations,
Administration and Maintenance (OAM) for Service Function Chaining Administration and Maintenance (OAM) for Service Function Chaining
(SFC). (SFC).
Requirements Language Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
skipping to change at page 1, line 47 skipping to change at page 1, line 47
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on October 16, 2020. This Internet-Draft will expire on October 29, 2020.
Copyright Notice Copyright Notice
Copyright (c) 2020 IETF Trust and the persons identified as the Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 3, line 13 skipping to change at page 3, line 13
6.4.1. ICMP . . . . . . . . . . . . . . . . . . . . . . . . 15 6.4.1. ICMP . . . . . . . . . . . . . . . . . . . . . . . . 15
6.4.2. BFD/Seamless-BFD . . . . . . . . . . . . . . . . . . 15 6.4.2. BFD/Seamless-BFD . . . . . . . . . . . . . . . . . . 15
6.4.3. In-Situ OAM . . . . . . . . . . . . . . . . . . . . . 16 6.4.3. In-Situ OAM . . . . . . . . . . . . . . . . . . . . . 16
6.4.4. SFC Traceroute . . . . . . . . . . . . . . . . . . . 16 6.4.4. SFC Traceroute . . . . . . . . . . . . . . . . . . . 16
7. Manageability Considerations . . . . . . . . . . . . . . . . 16 7. Manageability Considerations . . . . . . . . . . . . . . . . 16
8. Security Considerations . . . . . . . . . . . . . . . . . . . 17 8. Security Considerations . . . . . . . . . . . . . . . . . . . 17
9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 18 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 18
10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 18 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 18
11. Contributing Authors . . . . . . . . . . . . . . . . . . . . 18 11. Contributing Authors . . . . . . . . . . . . . . . . . . . . 18
12. References . . . . . . . . . . . . . . . . . . . . . . . . . 18 12. References . . . . . . . . . . . . . . . . . . . . . . . . . 18
12.1. Normative References . . . . . . . . . . . . . . . . . . 18 12.1. Normative References . . . . . . . . . . . . . . . . . . 19
12.2. Informative References . . . . . . . . . . . . . . . . . 19 12.2. Informative References . . . . . . . . . . . . . . . . . 19
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 21 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 21
1. Introduction 1. Introduction
Service Function Chaining (SFC) enables the creation of composite Service Function Chaining (SFC) enables the creation of composite
services that consist of an ordered set of Service Functions (SF) services that consist of an ordered set of Service Functions (SF)
that are to be applied to packets and/or frames selected as a result that are to be applied to packets and/or frames selected as a result
of classification [RFC7665]. SFC is a concept that provides for more of classification [RFC7665]. SFC is a concept that provides for more
than just the application of an ordered set of SFs to selected than just the application of an ordered set of SFs to selected
skipping to change at page 18, line 9 skipping to change at page 18, line 9
information collected at an SFC component may reveal the SF information collected at an SFC component may reveal the SF
associated within each chain and this information together with associated within each chain and this information together with
classifier rules may be used to manipulate the header of synthetic classifier rules may be used to manipulate the header of synthetic
attack packets that may be used to bypass the SFC and trigger any attack packets that may be used to bypass the SFC and trigger any
internal attacks. internal attacks.
The SF information at the SF component may be used by a malicious The SF information at the SF component may be used by a malicious
user to trigger Denial of Service (DoS) attack by overloading any user to trigger Denial of Service (DoS) attack by overloading any
specific SF using rogue OAM traffic. specific SF using rogue OAM traffic.
To address the above concerns, SFC and SF OAM may provide mechanism To address the above concerns, SFC and SF OAM should provide
for: mechanisms for:
o Misuse of the OAM channel for denial-of-services, o Misuse of the OAM channel for denial-of-services,
o Leakage of OAM packets across SFC instances, and o Leakage of OAM packets across SFC instances, and
o Leakage of SFC information beyond the SFC domain. o Leakage of SFC information beyond the SFC domain.
The documents proposing the OAM solution for SF component should The documents proposing the OAM solution for SF component should
consider rate-limiting the OAM probes at a frequency guided by the consider rate-limiting the OAM probes at a frequency guided by the
implementation choice. Rate-limiting may be applied at the SFF or implementation choice. Rate-limiting may be applied at the SFF or
the SF . The OAM initiator may not receive a response for the probes the SF . The OAM initiator may not receive a response for the probes
that are rate-limited resulting in false negatives and the that are rate-limited resulting in false negatives and the
implementation should be aware of this. implementation should be aware of this. To mitigate any attacks that
leverage OAM packets, future documents proposing OAM solutions should
describe the use of any technique to detect and mitigate anomalies
and various security attacks.
The documents proposing the OAM solution for any service layer The documents proposing the OAM solution for any service layer
components should consider some form of message filtering to prevent components should consider some form of message filtering to prevent
leaking any internal service layer information outside the leaking any internal service layer information outside the
administrative domain. administrative domain.
9. IANA Considerations 9. IANA Considerations
No action is required by IANA for this document. No action is required by IANA for this document.
 End of changes. 7 change blocks. 
8 lines changed or deleted 11 lines changed or added

This html diff was produced by rfcdiff 1.47. The latest version is available from http://tools.ietf.org/tools/rfcdiff/