Re: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Mon, 10 June 2019 05:10 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F3FC1200C4 for <sfc@ietfa.amsl.com>; Sun, 9 Jun 2019 22:10:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=c9yQqzk9; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=EFNp6dFS
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UI4PEmmjNDmt for <sfc@ietfa.amsl.com>; Sun, 9 Jun 2019 22:10:10 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2654E12000E for <sfc@ietf.org>; Sun, 9 Jun 2019 22:10:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=20383; q=dns/txt; s=iport; t=1560143410; x=1561353010; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=lh7Q2KTkLfFW8hPHRhwBdp9Sv1nMBWOEwis190A2F+U=; b=c9yQqzk9BvG70JO4zk8Tt3UrUJE2D/Bi90oqQostb/mnaaTOkldIchSE gNl0Agp5F7mQrCS4VGbHr1LMXIISf0Hwm/jn6t2PURZTMlmdkEkFjLmDz VRxJ1ScFPj0mSlteMXrdKvk8aVKbvc6nwI6t8m53xZWUGjlLlTO/VAe9E Q=;
IronPort-PHdr: 9a23:XBgulhISXkKHKMrrUdmcpTVXNCE6p7X5OBIU4ZM7irVIN76u5InmIFeBvKd2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUgMdz8AfngguGsmAXEbjLfHsZjAzNM9DT1RiuXq8NBsdFQ==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AXAAAO5f1c/5FdJa1lGwEBAQEDAQEBBwMBAQGBUQYBAQELAYE9KScDalUgBAsohBWDRwOEUooLgjIlkmCEUoEuFIEQA1QJAQEBDAEBGAEKCgIBAYRAAheCVCM0CQ4BAwEBBAEBAgEEbRwMhUoBAQEEAQEQER0BASUHCwEPAgEIEQQBASsCAgIlCx0IAgQOBRsHgwABgR1NAx0BAgybNQKBOIhfcYExgnkBAQWBRkFAgjIYgg8DBoE0AYtcF4FAP4E4DBOBTn4+gmEBAQMBgSU3gwsygiaLTA6CToRsiD6NWQkCgg+GRIx+G4IlhnyEBIl2lCaMIIMHAgQCBAUCDgEBBYFPOCqBLnAVOyoBgkE+gVEMF4ECAQ6CPIUUhT9ygSmPRAEB
X-IronPort-AV: E=Sophos;i="5.63,573,1557187200"; d="scan'208,217";a="575513826"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 10 Jun 2019 05:10:08 +0000
Received: from XCH-ALN-010.cisco.com (xch-aln-010.cisco.com [173.36.7.20]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id x5A5A8Ei013662 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 10 Jun 2019 05:10:08 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-ALN-010.cisco.com (173.36.7.20) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 10 Jun 2019 00:10:07 -0500
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Mon, 10 Jun 2019 01:10:06 -0400
Received: from NAM05-DM3-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Mon, 10 Jun 2019 00:10:06 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lh7Q2KTkLfFW8hPHRhwBdp9Sv1nMBWOEwis190A2F+U=; b=EFNp6dFSr2PRDVfwSUJaBxUhbKJcrOc7nGSysQGDl5RpH+zCn/tTuP7FJDcnC+rfEyfl0Iced02WZozXDim5oY06uiA8gBm5wECqbGW7o0Vl/D6lEFg3deX2cza2AMo0Dhh7GWnVh++lDJHwRdI5GGhfw8u+FyQtbBqEr+2xQPQ=
Received: from BL0PR11MB3028.namprd11.prod.outlook.com (20.177.204.138) by BL0PR11MB3137.namprd11.prod.outlook.com (20.177.206.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1965.17; Mon, 10 Jun 2019 05:10:05 +0000
Received: from BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::ec33:f4c1:227a:fcb3]) by BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::ec33:f4c1:227a:fcb3%5]) with mapi id 15.20.1965.017; Mon, 10 Jun 2019 05:10:04 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Adrian Farrel <adrian@olddog.co.uk>
CC: James Guichard <james.n.guichard@futurewei.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06
Thread-Index: AQHVFWHG6SZyvEyD3EGGLNC6v36bBKaFyr+AgA6f/wA=
Date: Mon, 10 Jun 2019 05:10:03 +0000
Message-ID: <06A9ACA9-A8C8-4282-BE6B-6D8A416E1C6C@cisco.com>
References: <BYAPR13MB25978FD458B59EB22067685FD21E0@BYAPR13MB2597.namprd13.prod.outlook.com> <062b01d517fa$c24cbed0$46e63c70$@olddog.co.uk>
In-Reply-To: <062b01d517fa$c24cbed0$46e63c70$@olddog.co.uk>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3445.104.11)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cpignata@cisco.com;
x-originating-ip: [2001:420:c0c8:1001::506]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f347c820-a7d0-497a-1843-08d6ed61e5ca
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BL0PR11MB3137;
x-ms-traffictypediagnostic: BL0PR11MB3137:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <BL0PR11MB313791376481F3495D77234DC7130@BL0PR11MB3137.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0064B3273C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(346002)(39860400002)(366004)(396003)(376002)(199004)(51914003)(189003)(14454004)(57306001)(446003)(2616005)(6246003)(486006)(476003)(256004)(14444005)(11346002)(7736002)(86362001)(68736007)(6116002)(53936002)(5660300002)(81166006)(81156014)(83716004)(82746002)(8936002)(8676002)(50226002)(66446008)(64756008)(76116006)(73956011)(66946007)(66476007)(66556008)(91956017)(71190400001)(71200400001)(6436002)(46003)(54906003)(6916009)(6486002)(229853002)(76176011)(99286004)(316002)(6306002)(25786009)(54896002)(53546011)(478600001)(6512007)(33656002)(4326008)(186003)(6506007)(102836004)(2906002)(966005)(36756003); DIR:OUT; SFP:1101; SCL:1; SRVR:BL0PR11MB3137; H:BL0PR11MB3028.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: MYBjAuEu1vrrsNOA9nDVz4B+ZEiWZSN5br9eq6u857/ZXZWakmdzcKFmaFUGRhVA2DyL/uYM7gqsTwGpwSQPexLxmMX5MEM8tR+r3spXw9JIZ1okHNHz9nRUKb3vmoB4Kl9HKNloifst43Yg2v88OwPd+QR8Jr1+jZEOqmRIrxFQdkdzvX6ciybsd0V9DY5TA4DqzaNszx/1UbgTv4DWtgVhylnRtSDhP8DTFMmfsKtcy8nMEFuSbVXiHFbSG7/fWQEirj5gvJt/Y/bdyJw/7jglHny6VNdBuE+DsvknY23DK004xYpQPBsislK4BeJ+8At54SnNtnLcMR4irTwTssX6W2t3aOh1qF70lb9XLzsRaRoRcWUzBQGA6M44Ckq76a4o8YM64a/JVrKRfwkElgo0E8w7RTj1ZTmhyjzHM2Q=
Content-Type: multipart/alternative; boundary="_000_06A9ACA9A8C84282BE6B6D8A416E1C6Cciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: f347c820-a7d0-497a-1843-08d6ed61e5ca
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Jun 2019 05:10:04.1022 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cpignata@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB3137
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.20, xch-aln-010.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/5dz0a_lgki23bkhSF5hDamh_7TI>
Subject: Re: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jun 2019 05:10:13 -0000

Hi, Adrian,

Thank you for the review! Please see inline.

On May 31, 2019, at 5:49 PM, Adrian Farrel <adrian@olddog.co.uk> wrote:

Hi,

I support publication, but there are a number of minor issues.

Thanks for the support and for flagging this.


Thanks,
Adrian

===

The document has 6 front-page authors: I assume the document shepherd
will handle this with the AD.


A publication request is a good gate to handle this, indeed.

---

The RFC Editor's preferred expansion of "OAM" is "Operations,
Administration, and Maintenance" per RFC 6291.


Indeed. I can see a “comma” missing in several places since the document expands to “Operation, Administration and Maintenance". This needs fixing. Any other instances you see?

---

Requirements language should use the latest boilerplate that includes
the reference to RFC 8174.


OK/


---

Section 2

  Multiple layers come into play for implementing the SFC.  These
  include the service layer and the underlying layers (Network, Link
  etc)
Missing two periods.
s/etc)/etc.)./

OLD
  o  The service layer in Figure 1, consists of SFC data plane elements
     that includes classifiers, Service Functions (SF), Service
     Function Forwarders (SFF), SFC Proxy.  This layer uses the overlay
     network for ensuring connectivity between SFC data plane elements.
NEW
  o  The service layer in Figure 1 consists of SFC data plane elements
     that include classifiers, Service Functions (SF), Service
     Function Forwarders (SFF), and an SFC Proxy.  This layer uses the
     overlay network for ensuring connectivity between SFC data plane
     elements.
END

Ditto s/Figure 1,/Figure 1/ in all of the subsequent bullets.

Thanks for these editorials — we will fix.


---

Looking at Figure 1, I don't understand how the overlay network has more
granularity than the underlay network. Surely the "legs" in the overlay
shown between VM1-VM2 and VM2-VM3 cannot exist without "legs" in the
underlay network.


Seems like there’s a “leg” missing.

---

In each of the bullets in Section 3, you say "OAM solutions for this
component" but Section 1.1 has already said "Actual solutions and
mechanisms are outside the scope of this document."

I think you could change 1.1 to read "Details of actual solutions and
mechanisms are outside the scope of this document." But maybe it would
be better if the bullets in Section 3 were "OAM functions applicable at
this component".


Or both. I agree with this, due to overloading of the word “solution”. I like changing to “functions” and also being more specific and prescriptive on the scope.

Or you could use "OAM requirements" as in Section 3.1.1 etc.

---

Section 3

s/Below figure/Figure 2/

The arrow for "Service Function Chain OAM" is misaligned in Figure 2

Ack.


---

Section 5 does not sit easily. It is good to have a list of exist OAM
solutions that might be applicable. But by presenting it as a gap
analysis there is an implication that these solutions are to be used
for SFC OAM. That is in opposition to the statement in Section 1.1.

Maybe the way to handle this is to rebrand Section 5 as an informational
list of pre-existing OAM solutions that might be applicable to SFC OAM.
And then to state that an analysis of their applicability is for future
study.


I think an analysis of gap with existing solutions does not imply that those must be used.

However, a bit of rewording would not hurt, particularly clarifying the future study / future decision.

But then Section 6.4 is a worry because it does talk about the
applicability of solutions. That would probably mean changing the tilt
of the whole document to be "Service Function Chaining (SFC) Operation,
Administration, and Maintenance (OAM) Framework and Applicability of
Existing OAM Tools to SFC.”


The potential applicability of existing solutions is part of a framework.



---

Section 6.3 has

  The Next Protocol field in NSH header may be
  used to indicate what OAM function is it intended to or what toolset
  is used.

s/is it/is/

But (!) I think this is solution text. It is completely true that this
is one way to do it, it might even be the best way to do it, but I think
it is out of scope.


I’ll push back on this one a bit.

While it is self-dictated out of scope to define specific OAM solution and protocols, it is quite necessary to guide on a normalized way on which the potentially different OAMs may be carried and pointed to. This is not specifying what solution, but the framework on top of what solutions ride.

---

Sections 6.5, 6.6, and 6.7, need to be out-dented to 7., 8., and 9.



OK.

---

The security considerations are a little weak. In particular, isn't
there a confidentiality issue. That is, if the results of OAM can be
inspected by a third party, they can deduce a lot about the network
and the structure of the Service function Chain. Since the chains are
themselves often used for security functions, this sort of information
is sensitive.

We could list confidentiality but that would be not beyond RFC 8300 text.


---

I think [RFC0792] and [RFC4443] could afford to be Informative
References as they are used in the same way as BFD, etc.

Agreed. Let’s move.

Thanks again Adrian for the comments that, once we address and incorporate fixes, will improve the doc!

Carlos.


From: sfc <sfc-bounces@ietf.org> On Behalf Of James Guichard
Sent: 28 May 2019 15:30
To: sfc@ietf.org
Subject: [sfc] WG Last Call draft-ietf-sfc-oam-framework-06

Dear WG:

This message starts a new two week WG Last Call on advancing https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/ for publication as an Informational RFC.

Substantive comments and statements of support for publishing this document should be directed to the mailing list. Editorial suggestions can be sent to the authors.  This last call will end on 11th June 2019.

Thanks!

Jim & Joel




_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc