Re: [sfc] I-D Action: draft-ietf-sfc-nsh-ecn-support-09.txt

mohamed.boucadair@orange.com Wed, 20 April 2022 06:08 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F9083A0CC7 for <sfc@ietfa.amsl.com>; Tue, 19 Apr 2022 23:08:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hZAsSEUE3Cp3 for <sfc@ietfa.amsl.com>; Tue, 19 Apr 2022 23:08:12 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72B163A0C64 for <sfc@ietf.org>; Tue, 19 Apr 2022 23:08:12 -0700 (PDT)
Received: from opfedar00.francetelecom.fr (unknown [xx.xx.xx.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar20.francetelecom.fr (ESMTP service) with ESMTPS id 4KjqwV4k40z8tq6; Wed, 20 Apr 2022 08:08:10 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1650434890; bh=qHP98w87PP7ghNmw30k6Di0lAy+4O9CeB8T8ZdpVmpE=; h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version; b=QS7I1jXg4xNOtsZNKnQVbq2vpi7T2ypBnnh7UZFe4a8iDcGFTVapZof4z34KFffE8 JhVWT9amNrsFOXnLzdV6ZLbFK95Ep5WgTcYlP9VbCosbDRaftUfH9ixJoXtg838eGe hCMCtyyTYFfBHJFLS8LxLXBGGLTDgmbX79WWNRRnEKl/tEehNZy4m5px0yybE/uwVP c61unbpYIddmP0v9QhQr2r6Ca0XOREMb8LQTQDO7pJwOAqVfeEOmhWgdorFRxi5uJl hAklHhtMN+eMgOyLtMGNk+/PHFAqLrrNuwSmJR0ycgVVPLf1rW7/d5AaZNszyTCCjT GSpcMQ16AG9nA==
From: mohamed.boucadair@orange.com
To: Donald Eastlake <d3e3e3@gmail.com>
CC: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] I-D Action: draft-ietf-sfc-nsh-ecn-support-09.txt
Thread-Index: AQHYVEGNnqtMhXAuAk+3mRpkD/wjdaz4QtRA
Content-Class:
Date: Wed, 20 Apr 2022 06:08:10 +0000
Message-ID: <23602_1650434890_625FA34A_23602_359_1_5bb576db092f44c39570f0a1d4f66be8@orange.com>
References: <165031936696.2628.12249583234819069643@ietfa.amsl.com> <CAF4+nEFxgS_8MazZjV-RM+xdCuHCcJnNoEmQa+AXnVp_Dqhgxw@mail.gmail.com> <CAA=duU0WXbTkAH50HXV7fT6kfrxMZ6JuJ6v0V1isL54opUR+8A@mail.gmail.com> <16754_1650372035_625EADC3_16754_66_33_eb5e074ed5314a508cb39c47988d8f7f@orange.com> <CAF4+nEFvd8aZTfPRcHrQo_ytiTTrS7TxaU_6_=UnDOkzghR1sw@mail.gmail.com>
In-Reply-To: <CAF4+nEFvd8aZTfPRcHrQo_ytiTTrS7TxaU_6_=UnDOkzghR1sw@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2022-04-20T05:15:50Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=1ea524a2-b015-4a6a-9386-8ea7d75854c9; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.115.26.50]
Content-Type: multipart/alternative; boundary="_000_5bb576db092f44c39570f0a1d4f66be8orangecom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/8IoQ8eO-yaJiOOzn8XYu5DNFqyk>
Subject: Re: [sfc] I-D Action: draft-ietf-sfc-nsh-ecn-support-09.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Apr 2022 06:08:18 -0000

Hi Donald,

Please see inline.

Cheers,
Med

De : Donald Eastlake <d3e3e3@gmail.com>
Envoyé : mercredi 20 avril 2022 01:02
À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>
Cc : sfc@ietf.org
Objet : Re: [sfc] I-D Action: draft-ietf-sfc-nsh-ecn-support-09.txt

Hi Med,

On Tue, Apr 19, 2022 at 8:40 AM <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>> wrote:
Hi Andy, all,

One of the reasons why I suggested to consider Experimental is that I’m not sure that it is justified to require classifiers and **every** SFFs to behave as **both** IPFIX collectors/exporters while other approaches can be considered:

I don't think the draft imposes a requirement on every SFF to be an IPFIX collector/exporter, just on the ingress and egress nodes for the flows of interest.
[Med] I think it does. The reasoning is as follows:
* The SFC architecture does not make any assumption on the chains that can be instantiated in a domain. So, every SFF can potentially terminate a service chain.
* An SFF that terminates a service chain is the egress for that chain. A terminating SFF is responsible for striping the NSH.

On the other hand, it is helpful for every SFF and, indeed, every node containing a queue that could  be congested, to be ECN-aware.

But it is not fatal if some are not. It is just the congestion at non-ECN-aware nodes will be unmanaged,
[Med] I think you have already a note in the draft that covers this part.

e.g., the cumulative data from ingress to last SFF can be passed using a dedicated NSH TLV and, as such, we can get rid of this reco:

The ingress MUST be configured to know the
   relevant egress for a flow.

I agree that the above "MUST" statement, which was just added in the last revision, needs further elaboration. There needs to be some way to get IPFIX messages from ingress to egress. I can think of three general ways:
[Med] Thank you for sharing this fair summary.

1. IPFIX over the SFC domain's transport layer protocol such as sending the messages via SCTP over IP if IP is supported throughout the domain, which is the recommended method if it is available. This requires the ingress to be configured with additional information.

[Med] Indeed. Please note that the configured egress for a chain may not be the actual one that will be used for a given flow when reclassification happens on-path (rfc7665#section-4.8). An approach to avoid the configuration of the egress nodes is to use an NSH OAM trace message to discover the egress for a chain and then use whatever discovered egress to send the ecn data.

2. IPFIX over NSH. This would require assigning a new Next Protocol value for the NSH Next Protocol field for IPFIX. (Alternatively, you could use something more complex like IPFIX over UDP over IP over NSH but it is not clear what would be gained by the additional complexity and packet length.) This would normally use a different SPI, which would have to be configured, from the SPI used for data, to convey the IPFIX message more directly from ingress to egress.

[Med] I guess this one requires also knowing the egress nodes.

3. IPFIX via NSH TLV. This could be done but it would probably require using MD Type 2 and subject IPFIX messages to the same path and data delays / loss as user data. On the other hand, it might get the IPFIX message to the egress with minimal additional configuration at the ingress.
[Med] A variant would be to make use of rfc8393.html#section-6.4 to interleave these packets with data packets.

The draft suggests using NSH steering for IPFIX messages if direct transport protocol connectivity between ingress and egress is problematic but is not clear whether this means 2 or 3 above and whichever of these it is suggesting, the draft does not provide sufficient detail so that needs to be added. The draft recommends using a higher priority for IPFIX messages than for user data. Methods 1 and 2 above facilitate while this might be impractical for Method 3, causing re-ordering.

I think details for Method 2 should be added to the draft.

[Med] I agree that the current mention of IPFIX over NSH in the draft is underspecified.

Thanks,
Donald
===============================
 Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
 2386 Panoramic Circle, Apopka, FL 32703 USA
 d3e3e3@gmail.com<mailto:d3e3e3@gmail.com>

Cheers,
Med

De : sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> De la part de Andrew G. Malis
Envoyé : mardi 19 avril 2022 13:54
À : Donald Eastlake <d3e3e3@gmail.com<mailto:d3e3e3@gmail.com>>
Cc : sfc@ietf.org<mailto:sfc@ietf.org>
Objet : Re: [sfc] I-D Action: draft-ietf-sfc-nsh-ecn-support-09.txt

Donald,

Regarding Experimental status, take a look at the guidelines at https://www.ietf.org/standards/process/informational-vs-experimental/ , in particular guidelines 3.4 and 3.5. This draft doesn't fit either of those.

Also, in my experience, the SFC WG has not required implementations for RFC publication, rather publication has been used to encourage implementation.

Cheers,
Andy


On Mon, Apr 18, 2022 at 6:13 PM Donald Eastlake <d3e3e3@gmail.com<mailto:d3e3e3@gmail.com>> wrote:
Hi,

I have done a significant pass over this draft in light of the reviews and I believe the draft is substantially improved; however, this revision does not, in my opinion, resolve all of the review comments and another pass will be needed before a WG Last Call.

Also, one person has suggested changing the target status of this draft from Proposed Standard to Experimental. I do not have much objection to such a change. What do others think?

Thanks,
Donald
===============================
 Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
 2386 Panoramic Circle, Apopka, FL 32703 USA
 d3e3e3@gmail.com<mailto:d3e3e3@gmail.com>


On Mon, Apr 18, 2022 at 6:02 PM <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>> wrote:

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Service Function Chaining WG of the IETF.

        Title           : Explicit Congestion Notification (ECN) and Congestion Feedback Using the Network Service Header (NSH) and IPFIX
        Authors         : Donald E. Eastlake
                          Bob Briscoe
                          Yizhou Li
                          Andrew G. Malis
                          Xinpeng Wei
        Filename        : draft-ietf-sfc-nsh-ecn-support-09.txt
        Pages           : 34
        Date            : 2022-04-18

Abstract:
   Explicit congestion notification (ECN) allows a forwarding element to
   notify downstream devices of the onset of congestion without having
   to drop packets. Coupled with a means to feed information about
   congestion back to upstream nodes, this can improve network
   efficiency through better congestion control, frequently without
   packet drops. This document specifies ECN and congestion feedback
   support within a Service Function Chaining (SFC) enabled domain
   through use of the Network Service Header (NSH, RFC 8300) and IP Flow
   Information Export (IPFIX, RFC 7011).



The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-ecn-support/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-sfc-nsh-ecn-support-09

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-nsh-ecn-support-09


Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc
_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

_________________________________________________________________________________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.