Re: [sfc] TTL field within the NSH base header

"Joel M. Halpern" <jmh@joelhalpern.com> Tue, 02 May 2017 14:15 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84AAD13157B for <sfc@ietfa.amsl.com>; Tue, 2 May 2017 07:15:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.722
X-Spam-Level:
X-Spam-Status: No, score=-2.722 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bitddLNbOyzK for <sfc@ietfa.amsl.com>; Tue, 2 May 2017 07:15:19 -0700 (PDT)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 06859131597 for <sfc@ietf.org>; Tue, 2 May 2017 07:11:39 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id E90D14800F3; Tue, 2 May 2017 07:11:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1493734298; bh=HwLf/5GrWB+i5T776rAlNBh2x2Zd4GO75mBWk3OkdMg=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=RNJSbEuKzgVkkPmUnFWb7xXZSF4uqk534ontnjjmpYzBefHnHJauEKG1/60yRBs7v XPGdD+N+43pl1Rm9LjA5ML40072A9WmSMSlO8ARRNd+IBUHAXOUCrPVeIk30hwsm3j AY4mLVnn8sOTc1/qZgy9JWhputwCNCjecwtBx5nM=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [50.225.209.67]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 3C90D4800D0; Tue, 2 May 2017 07:11:38 -0700 (PDT)
To: mohamed.boucadair@orange.com
References: <BF1BE6D99B52F84AB9B48B7CF6F17DA3DD5F8E@SJCEML701-CHM.china.huawei.com> <E8355113905631478EFF04F5AA706E98705C00B4@wtl-exchp-1.sandvine.com> <CA+RyBmVjp2qRoO_NF-sWrQ4gMPhuRZOw7syz0Y6yaAjOtgD_xg@mail.gmail.com> <CA+RyBmWXWRxuKP-dDirYHXxJnnduyriTuN5kmCfQkC=z0JdiCQ@mail.gmail.com> <CA+RyBmXHf_b48yvhZgbdB6q3Tr9=0oHTsnnRPM1jeMjCcCfiiQ@mail.gmail.com> <BF1BE6D99B52F84AB9B48B7CF6F17DA3DD6B8C@SJCEML701-CHM.china.huawei.com> <787AE7BB302AE849A7480A190F8B933009E5F350@OPEXCNORMAD.corporate.adroot.infra.ftgroup> <20170502101842.5161041.23046.11005@sandvine.com> <787AE7BB302AE849A7480A190F8B933009E5F603@OPEXCNORMAD.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E98705C366A@wtl-exchp-1.sandvine.com> <787AE7BB302AE849A7480A190F8B933009E5F6C6@OPEXCNORMAD.corporate.adroot.infra.ftgroup> <E8355113905631478EFF04F5AA706E98705C3863@wtl-exchp-1.sandvine.com> <787AE7BB302AE849A7480A190F8B933009E5F75E@OPEXCNORMAD.corporate.adroot.infra.ftgroup>
Cc: "sfc@ietf.org" <sfc@ietf.org>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <ce2069fe-a877-ab3e-1b77-d8921703da3f@joelhalpern.com>
Date: Tue, 02 May 2017 10:11:37 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <787AE7BB302AE849A7480A190F8B933009E5F75E@OPEXCNORMAD.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/6cGqP4lzWuEav4n0jCWufIN1w4A>
Subject: Re: [sfc] TTL field within the NSH base header
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 May 2017 14:15:22 -0000

Personally, I would not say "MUST NOT".  It is a statement of effect 
that if all devices in the environment support the RFC, with TTL (SHL) 
defined as proposed, then

no NSH processing device will ever receive a packet with the TTL (SHL) 
field set to 0.

That is a statement of fact.  As I see it, it is not an interoperability 
requirement.  If such a packet is received, the right thing will happen.

Yours,
Joel

On 5/2/17 9:38 AM, mohamed.boucadair@orange.com wrote:
> Re-,
>
>
>
> I don’t get your point, Dave.
>
>
>
> My concern is how to detect a misbehaving node vs a node that is not
> supporting SHL.
>
>
>
> If all nodes in a domain support SHL, then packets with SHL==0 MUST NOT
> be received by any SFF of that domain. Do you agree with that?
>
>
>
> Cheers,
>
> Med
>
>
>
> *De :*Dave Dolson [mailto:ddolson@sandvine.com]
> *Envoyé :* mardi 2 mai 2017 15:20
> *À :* BOUCADAIR Mohamed IMT/OLN; James N Guichard; Greg Mirsky
> *Cc :* sfc@ietf.org; Ron Parker
> *Objet :* RE: [sfc] TTL field within the NSH base header
>
>
>
> I still think the conceptual difficulty goes away if we say that the 6
> bits 000000 represents the value 64.
>
>
>
>
>
>
>
> *From:*mohamed.boucadair@orange.com
> <mailto:mohamed.boucadair@orange.com> [mailto:mohamed.boucadair@orange.com]
> *Sent:* Tuesday, May 2, 2017 8:53 AM
> *To:* Dave Dolson; James N Guichard; Greg Mirsky
> *Cc:* sfc@ietf.org <mailto:sfc@ietf.org>; Ron Parker
> *Subject:* RE: [sfc] TTL field within the NSH base header
>
>
>
> Re-,
>
>
>
> You have a point. Acked.
>
>
>
> My concern was how to avoid misbehaving SFFs that would forward packets
> with SHL==0 to a next-hop SFF even if that SFF parses the SHL field.
>
>
>
> What about having a configuration knob to indicate the behavior to
> follow when receiving SHL=0? A domain that involves classifiers/SFFs
> that understand SHL must not forward or accept receiving packets with SHL=0.
>
>
>
> Cheers,
>
> Med
>
>
>
> *De :*Dave Dolson [mailto:ddolson@sandvine.com]
> *Envoyé :* mardi 2 mai 2017 14:41
> *À :* BOUCADAIR Mohamed IMT/OLN; James N Guichard; Greg Mirsky
> *Cc :* sfc@ietf.org <mailto:sfc@ietf.org>; Ron Parker
> *Objet :* RE: [sfc] TTL field within the NSH base header
>
>
>
> Med,
>
> I agree.
>
> Consider the case when a “new” SFF is added to an existing system:
>
> For all NSH packets, the Hop Limit/TTL field is zero, not just those
> from the classifier.
>
>
>
> I object to this statement of yours:
>
>> add a sentence saying that “an incoming value of 0” is only acceptable from a classifier.
>
>
>
> As I see it, an incoming value of 0 is acceptable from any source.
>
>
>
> -Dave
>
>
>
> *From:*mohamed.boucadair@orange.com
> <mailto:mohamed.boucadair@orange.com> [mailto:mohamed.boucadair@orange.com]
> *Sent:* Tuesday, May 2, 2017 7:58 AM
> *To:* Dave Dolson; James N Guichard; Greg Mirsky
> *Cc:* sfc@ietf.org <mailto:sfc@ietf.org>; Ron Parker
> *Subject:* RE: [sfc] TTL field within the NSH base header
>
>
>
> Hi Dave,
>
>
>
> SFFs that do not support SHL will preserve these bits as received. In
> other words, these SFFs won’t reset these bits to zeros.
>
>
>
> Cheers,
>
> Med
>
>
>
> *De :*Dave Dolson [mailto:ddolson@sandvine.com]
> *Envoyé :* mardi 2 mai 2017 12:19
> *À :* BOUCADAIR Mohamed IMT/OLN; James N Guichard; Greg Mirsky
> *Cc :* sfc@ietf.org <mailto:sfc@ietf.org>; Ron Parker
> *Objet :* Re: [sfc] TTL field within the NSH base header
>
>
>
> Med,
>
> For the backwards compatibility case, we also support ‎SFFs that do not
> decrement TTL/Hop Limit. Saying a value of zero can only come from
> classifiers defeats that, as well as adding unnecessary complexity.
>
>
>
> David Dolson
> ‎
>
> *From: *mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>
>
> *Sent: *Tuesday, May 2, 2017 2:17 AM
>
> *To: *James N Guichard; Greg Mirsky; Dave Dolson
>
> *Cc: *sfc@ietf.org <mailto:sfc@ietf.org>; Ron Parker
>
> *Subject: *RE: [sfc] TTL field within the NSH base header
>
>
>
> Hi Jim,
>
>
>
> Thank you for this updated proposal. This is much more better.
>
>
>
> Giving the clarification discussed with Joel (i.e., do not reset
> reserved bits by intermediate devices), I wonder whether it makes sense
> to add a sentence saying that “an incoming value of 0” is only
> acceptable from a classifier.
>
>
>
> Cheers,
>
> Med
>
>
>
> *De :*James N Guichard [mailto:james.n.guichard@huawei.com]
> *Envoyé :* lundi 1 mai 2017 19:39
> *À :* Greg Mirsky; Dave Dolson
> *Cc :* sfc@ietf.org <mailto:sfc@ietf.org>; BOUCADAIR Mohamed IMT/OLN;
> Ron Parker
> *Objet :* RE: [sfc] TTL field within the NSH base header
>
>
>
> Okay lots of conversation but let me offer a revised version of Med’s
> text that hopefully captures most of the discussion (changes highlighted):
>
>
>
> SHL (SFF Hop Limit): Indicates the maximum SFF hops for an *SFP*. The
> initial SHL value SHOULD be configurable via the control plane; the
> configured initial value can be specific to *one or more SFPs*. If no
> initial value is explicitly provided, the default initial SHL value 63
> MUST be used. Each SFF involved in forwarding an NSH packet MUST
> decrement *the *SHL value by 1 *prior to NSH forwarding lookup*.
> *Decrementing by 1 from an incoming value of 0 shall result in a SHL
> value of 63. The packet MUST NOT be forwarded if SHL is, after
> decrement, 0 e.g. decrement SHALL occur before testing SHL for 0. *
>
>
>
> Jim
>
>
>
>
>
> *From:*Greg Mirsky [mailto:gregimirsky@gmail.com]
> *Sent:* Monday, May 01, 2017 1:02 PM
> *To:* Dave Dolson <ddolson@sandvine.com <mailto:ddolson@sandvine.com>>
> *Cc:* sfc@ietf.org <mailto:sfc@ietf.org>; mohamed.boucadair@orange.com
> <mailto:mohamed.boucadair@orange.com>; James N Guichard
> <james.n.guichard@huawei.com <mailto:james.n.guichard@huawei.com>>; Ron
> Parker <Ron_Parker@affirmednetworks.com
> <mailto:Ron_Parker@affirmednetworks.com>>
> *Subject:* Re: [sfc] TTL field within the NSH base header
>
>
>
> "Be liberal what you accept. Be conservative what you send."
>
> I think this sums what we have discussed - accept TTL 0, don't forward
> TTL 0.
>
>
>
> Regards, Greg
>
>
>
> On May 1, 2017 8:58 AM, "Dave Dolson" <ddolson@sandvine.com
> <mailto:ddolson@sandvine.com>> wrote:
>
>     Ron,
>
>     I too would like simple, but your table looks pretty complicated.
>     And I think it adds configuration for an SFF to know whether there
>     are others before it.
>
>     My version of simple:
>
>       TTL field of 0 means 64.
>
>       Every SFF decrements TTL each time it forwards the NSH packet. If
>     decrementing from 1 would result in under-flow to 64, discard.
>
>
>
>
>
>
>
>
>
>     *From:*Ron Parker [mailto:Ron_Parker@affirmednetworks.com
>     <mailto:Ron_Parker@affirmednetworks.com>]
>     *Sent:* Monday, May 1, 2017 11:41 AM
>
>
>     *To:* Dave Dolson; James N Guichard; mohamed.boucadair@orange.com
>     <mailto:mohamed.boucadair@orange.com>; sfc@ietf.org
>     <mailto:sfc@ietf.org>
>     *Subject:* RE: TTL field within the NSH base header
>
>
>
>     Agree that I’d opt for precision over simplicity.   Which is what I
>     tried to convey a ways back on this thread regarding differentiated
>     behavior at the last SFF in the SFP vs. the non-last SFF in the
>     SFP.    Subsequent comments didn’t seem to embrace that way of
>     describing things.    Also, if there were consensus to supporting
>     that approach, backward compatibility for classifiers that emit
>     TTL=0 could be addressed by also describing behavior at the first
>     SFF vs. non-first.
>
>
>
>
>
>     	
>
>     TTL=1
>
>     	
>
>     TTL=0
>
>     Only SFF (First and last)
>
>     	
>
>     Valid – service local SF’s
>
>     	
>
>     Valid for backward compatibility – service local SF’s
>
>     First SFF and not Last
>
>     	
>
>     Invalid – drop (since propagation to subsequent SFF with TTL=0 is
>     illegal)
>
>     	
>
>     Valid for backward compatibility – service local SF’s and propagate
>     to subsequent SFF with TTL=63
>
>     Last SFF when >1 SFF’s for SFP
>
>     	
>
>     Valid – service local SF’s
>
>     	
>
>     Invalid –drop (due to bad behavior of previous SFF)
>
>
>
>     *From:*Dave Dolson [mailto:ddolson@sandvine.com]
>     *Sent:* Monday, May 1, 2017 11:25 AM
>     *To:* Ron Parker <Ron_Parker@affirmednetworks.com
>     <mailto:Ron_Parker@affirmednetworks.com>>; James N Guichard
>     <james.n.guichard@huawei.com <mailto:james.n.guichard@huawei.com>>;
>     mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>;
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     *Subject:* RE: TTL field within the NSH base header
>
>
>
>     I think precision in the definition is important for when expects
>     certain behavior for small values of TTL. E.g., by using trace-route
>     type of tools.
>
>     We can’t just wave our hands and say drop packets with TTL near 0 or
>     1 or 2.
>
>
>
>     If one has a chain of 3 items, a TTL of 6 should work. (SFFs receive
>     packets 6 times in the system diagram that is usually drawn).
>
>
>
>     (Simplified: I realize in some systems more SFF interactions are
>     required.)
>
>
>
>
>
>
>
>
>
>     *From:*Ron Parker [mailto:Ron_Parker@affirmednetworks.com]
>     *Sent:* Monday, May 1, 2017 11:14 AM
>     *To:* Dave Dolson; James N Guichard; mohamed.boucadair@orange.com
>     <mailto:mohamed.boucadair@orange.com>; sfc@ietf.org
>     <mailto:sfc@ietf.org>
>     *Subject:* RE: TTL field within the NSH base header
>
>
>
>     Agree that differentiating “forwarding” to attached SF instances vs
>     subsequent SFF’s is logical and intuitive (to me) and I prefer to
>     acknowledge that there is a difference.   But, I was addressing a
>     suggestion to simplify.     In practice, 61 or 62 or 63 decrements
>     of TTL all probably mean the same thing J.
>
>
>
>        Ron
>
>
>
>
>
>     *From:*Dave Dolson [mailto:ddolson@sandvine.com]
>     *Sent:* Monday, May 1, 2017 11:11 AM
>     *To:* Ron Parker <Ron_Parker@affirmednetworks.com
>     <mailto:Ron_Parker@affirmednetworks.com>>; James N Guichard
>     <james.n.guichard@huawei.com <mailto:james.n.guichard@huawei.com>>;
>     mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>;
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     *Subject:* RE: TTL field within the NSH base header
>
>
>
>     There is a difference between dropping the packet at receive vs.
>     transmit.
>
>     A **terminating** SFF may accept a packet with TTL=1.  I.e., where
>     the NSH header is removed.
>
>     What matters is that it is not decremented to zero and forwarded as NSH.
>
>
>
>     Otherwise we’d say, “huh, no point in sending a packet if TTL=1. And
>     huh, if received with TTL=2 then we might as well drop it…” Recurse
>     ad absurdum.
>
>
>
>     Hence, the correct language needs to convey that a device
>     decrementing TTL (in order to forward NSH) must check if it would
>     result in zero.
>
>
>
>     This conveys that, I think:
>
>     The packet MUST NOT be forwarded to a next hop if SHL is decremented
>     to zero.
>
>
>
>
>
>     -Dave
>
>
>
>
>
>     *From:*Ron Parker [mailto:Ron_Parker@affirmednetworks.com]
>     *Sent:* Monday, May 1, 2017 10:50 AM
>     *To:* James N Guichard; mohamed.boucadair@orange.com
>     <mailto:mohamed.boucadair@orange.com>; Dave Dolson; sfc@ietf.org
>     <mailto:sfc@ietf.org>
>     *Subject:* RE: TTL field within the NSH base header
>
>
>
>     We could simplify this by saying that an SFF that receives an NSH
>     packet with TTL=1 shall drop the packet.   That doesn’t require any
>     distinction of the type of forwarding.    You could argue that
>     perhaps 1 means take care of local SF’s, only, but then we are back
>     to having to make that distinction.    Given that we are starting at
>     63 by default, finessing what happens when receiving 1 doesn’t seem
>     worthwhile to me.
>
>
>
>     *From:*James N Guichard [mailto:james.n.guichard@huawei.com]
>     *Sent:* Monday, May 1, 2017 10:45 AM
>     *To:* Ron Parker <Ron_Parker@affirmednetworks.com
>     <mailto:Ron_Parker@affirmednetworks.com>>;
>     mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>;
>     Dave Dolson <ddolson@sandvine.com <mailto:ddolson@sandvine.com>>;
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     *Subject:* RE: TTL field within the NSH base header
>
>
>
>     Yes but my point was if the SFF is **terminating** the service chain
>     there are no service functions left to be forwarded to so the
>     sentence does not make any sense. If however the SFF is terminating
>     the service chain and at termination the SHL reaches 0 then it
>     should still forward the packet (after removal of NSH).
>
>
>
>     Jim
>
>
>
>     *From:*Ron Parker [mailto:Ron_Parker@affirmednetworks.com]
>     *Sent:* Monday, May 01, 2017 10:28 AM
>     *To:* James N Guichard <james.n.guichard@huawei.com
>     <mailto:james.n.guichard@huawei.com>>; mohamed.boucadair@orange.com
>     <mailto:mohamed.boucadair@orange.com>; Dave Dolson
>     <ddolson@sandvine.com <mailto:ddolson@sandvine.com>>; sfc@ietf.org
>     <mailto:sfc@ietf.org>
>     *Subject:* RE: TTL field within the NSH base header
>
>
>
>     I’d like to disambiguate the word “forwarding”.   From SFF
>     perspective, there is forwarding to attached SF instances and there
>     is forwarding to other SFFs.
>
>
>
>     “SFFs that terminate a service chain MUST forward the packet to
>     attached service functions, even if SHL is decremented to 0”
>
>
>
>        Ron
>
>
>
>
>
>
>
>     *From:*sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of *James N Guichard
>     *Sent:* Monday, May 1, 2017 10:22 AM
>     *To:* mohamed.boucadair@orange.com
>     <mailto:mohamed.boucadair@orange.com>; Dave Dolson
>     <ddolson@sandvine.com <mailto:ddolson@sandvine.com>>; sfc@ietf.org
>     <mailto:sfc@ietf.org>
>     *Subject:* Re: [sfc] TTL field within the NSH base header
>
>
>
>     I don’t understand this sentence as if an SFF is terminating a
>     service chain then it **wont** be forwarding the packets to attached
>     SFs; Shouldn’t this sentence read “SFFs that terminate a service
>     chain MUST forward the packet even if SHL is decremented to 0” ?
>
>
>
>     Jim
>
>
>
>     *From:*mohamed.boucadair@orange.com
>     <mailto:mohamed.boucadair@orange.com>
>     [mailto:mohamed.boucadair@orange.com]
>     *Sent:* Friday, April 28, 2017 10:38 AM
>     *To:* Dave Dolson <ddolson@sandvine.com
>     <mailto:ddolson@sandvine.com>>; James N Guichard
>     <james.n.guichard@huawei.com <mailto:james.n.guichard@huawei.com>>;
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     *Subject:* RE: TTL field within the NSH base header
>
>
>
>     Re-,
>
>
>
>     I see SHL as a means to prevent SFF loops. There is no value in
>     deleting a packet after an SFF decrement the SHL to 0, but that
>     packet is to be passed to SFs that are attached to this SFF. The
>     packet will be forwarded after stripping the NSH header; no risk for
>     SFF loops out there. No?
>
>
>
>     Cheers,
>
>     Med
>
>
>
>     *De :*Dave Dolson [mailto:ddolson@sandvine.com]
>     *Envoyé :* vendredi 28 avril 2017 16:29
>     *À :* BOUCADAIR Mohamed IMT/OLN; James N Guichard; sfc@ietf.org
>     <mailto:sfc@ietf.org>
>     *Objet :* RE: TTL field within the NSH base header
>
>
>
>     Med,
>
>
>
>     “SFFs that terminate a service chain MUST forward the packet to
>     attached SFs even if SHL is decremented to 0.”
>
>     I don’t think this is right.
>
>     If TTL/SHL is decremented to 0, this must not be forwarded as NSH.
>
>     I see that **receiving** a packet with SHL=1 can result in chain
>     termination, i.e., NSH decapsulation. But not forwarding as NSH with
>     SHL=0.
>
>
>
>     -Dave
>
>
>
>
>
>     *From:*sfc [mailto:sfc-bounces@ietf.org] *On Behalf Of
>     *mohamed.boucadair@orange.com <mailto:mohamed.boucadair@orange.com>
>     *Sent:* Friday, April 28, 2017 9:36 AM
>     *To:* James N Guichard; sfc@ietf.org <mailto:sfc@ietf.org>
>     *Subject:* Re: [sfc] TTL field within the NSH base header
>
>
>
>     Hi Jim, all,
>
>
>
>     I have the following comments :
>
>     ·        Change “TTL” to “SFF Hop Limit (SHL)” because this field is
>     not about a time to live but about a limit of SFF hops to be crossed.
>
>     ·        I don’t understand what is meant by “testing”.
>
>     ·        I suggest to make this change to cover the following points:
>
>     o   SHL should be configurable by the control plane.
>
>     o   Packets can be forwarded to SFs even if SHL is decremented to 0
>     for the terminating SFF.
>
>     o   I don’t think it is a good idea to include “Decrementing by a
>     value of 1 from 0 shall result in a TTL value of 63” because this
>     will lead to a broken mechanism.
>
>
>
>     OLD:
>
>     TTL: Service plane time-to-live. An SFF MUST decrement the TTL by a
>     value of 1 for all NSH packets it receives. Decrementing by a value
>     of 1 from 0 shall result in a TTL value of 63. The default for
>     originating an NSH packet is a TTL value of 63. The decrement SHALL
>     occur before testing for 0. After decrement, if the TTL is 0, the
>     NSH packet MUST NOT be forwarded.
>
>
>
>     NEW:
>
>     SHL (SFF Hop Limit): Indicates the maximum SFF hops for a service
>     chain. The initial SHL value SHOULD be configurable via the control
>     plane; the configured initial value can be specific to a chain or
>     all chains. If no initial value is explicitly provided, the default
>     initial SHL value 63 MUST be used. Each SFF involved in forwarding
>     an NSH packet MUST decrement SHL value by 1. The packet MUST NOT be
>     forwarded to a next hop SFF if SHL is decremented to zero. SFFs that
>     terminate a service chain MUST forward the packet to attached SFs
>     even if SHL is decremented to 0.
>
>
>
>     Thank you.
>
>
>
>     Cheers,
>
>     Med
>
>
>
>     *De :*sfc [mailto:sfc-bounces@ietf.org] *De la part de* James N Guichard
>     *Envoyé :* jeudi 27 avril 2017 20:54
>     *À :* sfc@ietf.org <mailto:sfc@ietf.org>
>     *Objet :* [sfc] TTL field within the NSH base header
>
>
>
>     Dear WG:
>
>
>
>     Having reviewed all of the email discussion on the mailing list it
>     appears to the chairs that we have consensus to add a TTL field to
>     the NSH base header. We would like to propose the following changes:
>
>
>
>     Section 3.2:
>
>     Update figure 2 as follows:
>
>
>
>          0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
>
>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>
>         |Ver|O|R|    TTL    |   Length  |R|R|R|R|MD Type| Next Protocol |
>
>         +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>
>
>
>     Add the following text after figure 2:
>
>
>
>     TTL: Service plane time-to-live. An SFF MUST decrement the TTL by a
>     value of 1 for all NSH packets it receives. Decrementing by a value
>     of 1 from 0 shall result in a TTL value of 63. The default for
>     originating an NSH packet is a TTL value of 63. The decrement SHALL
>     occur before testing for 0. After decrement, if the TTL is 0, the
>     NSH packet MUST NOT be forwarded.
>
>
>
>     Section 3.4:
>
>     Update figure 4 to reflect the new base header format as per section
>     3.2 base header.
>
>
>
>     Section 3.5:
>
>     Update figure 5 to reflect the new base header format as per section
>     3.2 base header.
>
>
>
>     Section 12.2.1:
>
>     Current text is as follows:
>
>
>
>        There are ten bits at the beginning of the NSH Base Header.  New bits
>
>        are assigned via Standards Action [RFC5226].
>
>
>
>        Bits 0-1 - Version
>
>        Bit 2 - OAM (O bit)
>
>        Bit 3 - Critical TLV (C bit)
>
>        Bits 4-9 - Reserved
>
>
>
>     Replace entire text as follows:
>
>
>
>        There are eight reserved bits in the NSH Base Header. New bits
>
>        are assigned via Standards Action [RFC5226].
>
>
>
>        Bits 0-1 - Version
>
>        Bit 2 - OAM (O bit)
>
>        Bit 3 - Reserved
>
>        Bits 16-19 - Reserved
>
>
>
>     Section 12.2.3:
>
>     Current text has the MD-type as 8-bit values.
>
>
>
>     Update text for this section and table 1 to reflect 4-bit values
>     *not* 8-bit values.
>
>
>
>     *Please review carefully and indicate support for these changes (or
>     any changes to the suggested text).*
>
>     * *
>
>     Thanks,
>
>
>
>     Jim & Joel
>
>
>
>
>
>
>
>
>
>
>
>
>     _______________________________________________
>     sfc mailing list
>     sfc@ietf.org <mailto:sfc@ietf.org>
>     https://www.ietf.org/mailman/listinfo/sfc
>
>
>
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>