Re: [sfc] Magnus Westerlund's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS)

Magnus Westerlund <magnus.westerlund@ericsson.com> Mon, 09 November 2020 17:17 UTC

Return-Path: <magnus.westerlund@ericsson.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 409D33A12AE; Mon, 9 Nov 2020 09:17:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.102
X-Spam-Level:
X-Spam-Status: No, score=-2.102 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tzc-goEhuLV6; Mon, 9 Nov 2020 09:17:10 -0800 (PST)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50061.outbound.protection.outlook.com [40.107.5.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3FB93A1289; Mon, 9 Nov 2020 09:17:07 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=R3G3QVBd5KHfC0grDje2EVkU+ytH3Y01KBBjrbGRbzO+HDEwl346rbMKqFTIvzj+LxsGMG0x4eb7M+bGs1Sm2nWtGTVvLuvByX8Punctj++exDv+Rz7Y8g3Wb7mPt8UAIqAK6cKxhoVPybnnepX4LaMx6NPNLn9eUHOLZyppRBQmh23cqRHJFpt6wZJmz2HQgjobn0AMli6djiCnF9ijiGdkeJrICdhddS96COWecUmZtyJzzUcLszLYQxDre0ewvZW2P5Jt+UlZ9q61+GuUDpaFgghOHLygtY12VYR+f9aHH3neD6AarDLwypX2HtfJectQ2LapyC6a/d+87YGODg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NNzflTaxLefGLfMu8Qyf+z8RfOE1HLYtx5I1u59QQZo=; b=UE7i15Y5SYxiJ6fEaxkT9J2njpvIdKoqSNQ8xc25UvTtfLuRjR+/pYN2QURlg6VVQrTgViQOtnVZRwmRtMwI/5SQpUgS3yZBXlK7tjEY7BwGrPI2fAiEU1RuLZvk/sUXzhsDQownOTn0rCny/N3qVT8pOKI+AbNcQBHYYXM5FL0Ino6Fea8XZTI4705qalCPwXSX9gaO/MpMXoBs+9Henr+H2g5Yq0fKGJ8EcWAvGq5lJrVGtXCSu/D4iSPaubtQkZrnAAnU2NMCwD+R8+xDpPiuExYAmYkvQlYtQEaOWZ0+JfBrIcEgVs6N3i49lxIAJ+dxkbHXVHZ6sFlIST5OUA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NNzflTaxLefGLfMu8Qyf+z8RfOE1HLYtx5I1u59QQZo=; b=dEwZi5fFKzJ2ZXy1UVA+9xSTxolYWsQ/NV0I64Vi043Q2rc3YVTkUt4gHcwdXCHeRj505Mz+mWjRCZ29s+zU14yK0SByamGXLgBhrch5ZPiy4La1Qo9Z/EkG6x02mOiwMs0ux3yUWH+xD1a9FBUuMzsFXo9jF0C48f94RKAiwyw=
Received: from HE1PR0702MB3772.eurprd07.prod.outlook.com (2603:10a6:7:8e::14) by HE1PR0702MB3626.eurprd07.prod.outlook.com (2603:10a6:7:7f::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3541.10; Mon, 9 Nov 2020 17:16:57 +0000
Received: from HE1PR0702MB3772.eurprd07.prod.outlook.com ([fe80::f006:1e1e:83a1:e5d2]) by HE1PR0702MB3772.eurprd07.prod.outlook.com ([fe80::f006:1e1e:83a1:e5d2%7]) with mapi id 15.20.3564.021; Mon, 9 Nov 2020 17:16:56 +0000
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
To: "iesg@ietf.org" <iesg@ietf.org>, "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>
CC: "gregimirsky@gmail.com" <gregimirsky@gmail.com>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "draft-ietf-sfc-serviceid-header@ietf.org" <draft-ietf-sfc-serviceid-header@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: Magnus Westerlund's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS)
Thread-Index: AQHWssF/CmHQKdCToU+vFzXZfqmpE6m4JhoAgAETaoCABpeBQIAAQYMA
Date: Mon, 09 Nov 2020 17:16:13 +0000
Message-ID: <f60b7c81e5894483949df92d5084063e1f3bc8d6.camel@ericsson.com>
References: <160450470734.24291.6996019706264327799@ietfa.amsl.com> <1512_1604506572_5FA2D3CC_1512_131_1_787AE7BB302AE849A7480A190F8B93303156FF0E@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <8680e33ad1a6b4d9f940e8dc1ad9a9261d82f743.camel@ericsson.com> <20493_1604928583_5FA94447_20493_21_1_787AE7BB302AE849A7480A190F8B933031573B31@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
In-Reply-To: <20493_1604928583_5FA94447_20493_21_1_787AE7BB302AE849A7480A190F8B933031573B31@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-mailer: Evolution 3.28.5-0ubuntu0.18.04.2
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [192.176.1.82]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: de04e4b4-becc-4e23-a40e-08d884d342fa
x-ms-traffictypediagnostic: HE1PR0702MB3626:
x-microsoft-antispam-prvs: <HE1PR0702MB362610FB29ACC83124A38AEF95EA0@HE1PR0702MB3626.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: KxFim+de55Vq7yWB8GVVa3uMtM9paRvZXu80Ndnux5Gp/mhy3Hl7olWtbBr1SNAacYxDukhfJUJfj2/M7EtZWVT2MdW7rcwkuqf844X51SDztEYu2SgMT0D5MfXYctsKsJ75IPEE/TmDLvPnv+d5qIN2Zr/VKUnF4cJUKmoS4gz/UjuYTI0jPjLLiUXI1QoBN5QRVcrJJHCv/Gt/Ek6XR9OLW/lsjMHsxx3FHRljbgLsxLYROKLTrsiu1lLVZlWT2BJG1w9Hwb9ruMctzbl1hElo8vYlWNWUZP+NtQLyzbALgIl4Bwemq3cN4IanxdL8TwJBZFEEHWkt3W1kKpi6MDyQ3Cjq0KSASIVBtN8ff8aJ+PnztFS/5pCrfUYb8M9Z
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR0702MB3772.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(366004)(376002)(346002)(39860400002)(136003)(186003)(316002)(71200400001)(26005)(76116006)(83380400001)(6506007)(8936002)(2616005)(44832011)(99936003)(64756008)(2906002)(5660300002)(6512007)(8676002)(4326008)(66616009)(66946007)(6666004)(36756003)(86362001)(66476007)(66556008)(6486002)(66446008)(54906003)(110136005)(478600001)(99106002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; micalg="sha-256"; protocol="application/x-pkcs7-signature"; boundary="=-RtFqvuE1C4cBhKrk4+Ug"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: HE1PR0702MB3772.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: de04e4b4-becc-4e23-a40e-08d884d342fa
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Nov 2020 17:16:13.9280 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: rJQf7quThusegOCceeOnWVBd1aQjzfimAjBbFpPigAC4DSjap2C642xa9+AzvH9kNfOhnUohG3/KqjGcoI73Im/Kh+R8i98C5e+TC2brRVY=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0702MB3626
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/BKYyzseeoqGrR8eBwXXKq6klRg8>
Subject: Re: [sfc] Magnus Westerlund's Discuss on draft-ietf-sfc-serviceid-header-12: (with DISCUSS)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Nov 2020 17:17:16 -0000

Hi Med,

I think this looks really good. From my perspective this is sufficient to remind
people about the issue. I hope the WG participants takes a look at this and
provide feedback too as it does introduce new recommendations, altough they
align with RFC 8300.

Cheers

Magnus

On Mon, 2020-11-09 at 13:29 +0000, mohamed.boucadair@orange.com wrote:
> Hi Magnus, 
> 
> OK to restate it. What about the following:   
> 
> ==
> 5.  MTU Considerations
> 
>    As discussed in Section 5.6 of [RFC7665], the SFC architecture
>    prescribes that additional information be added to packets to:
> 
>    o  Identify SFPs: this is typically the NSH Base (Section 2.2 of
>       [RFC8300]) and Service Path Headers (Section 2.3 of [RFC8300]).
> 
>    o  Carry metadata such those defined in Sections 3 and 4.
> 
>    o  Steer the traffic along the SFPs: transport encapsulation.
> 
>    This added information increases the size of the packet to be carried
>    along an SFP.
> 
>    Aligned with Section 5 of [RFC8300], it is RECOMMENDED for network
>    operators to increase the underlying MTU so that NSH traffic is
>    forwarded within an SFC-enabled domain without fragmentation.  The
>    available underlying MTU should be taken into account by network
>    operators when providing SFs with the required Context Headers to be
>    injected per SFP and the size of the data to be carried in these
>    Context Headers.
> 
>    If the underlying MTU cannot be increased to accommodate the NSH
>    overhead, network operators may rely upon a transport encapsulation
>    protocol to the required fragmentation handling.  The impact of
>    activating such feature on SFFs should be carefully assessed by
>    network operators (Section 5.6 of [RFC7665]).
> 
>    When dealing with MTU issues, network operators should consider the
>    limitations of various transport encapsulations such as those
>    discussed in [I-D.ietf-intarea-tunnels].
> ==
> 
> The control plane is not mentioned on purpose as this is out of scope. 
> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : Magnus Westerlund [mailto:magnus.westerlund@ericsson.com]
> > Envoyé : jeudi 5 novembre 2020 09:42
> > À : iesg@ietf.org; BOUCADAIR Mohamed TGI/OLN
> > <mohamed.boucadair@orange.com>
> > Cc : gregimirsky@gmail.com; sfc-chairs@ietf.org; draft-ietf-sfc-
> > serviceid-header@ietf.org; sfc@ietf.org
> > Objet : Re: Magnus Westerlund's Discuss on draft-ietf-sfc-serviceid-
> > header-12: (with DISCUSS)
> > 
> > On Wed, 2020-11-04 at 16:16 +0000, mohamed.boucadair@orange.com
> > wrote:
> > > Hi Magnus,
> > > 
> > > Eric raised a similar comment but I'm afraid that this is not
> > 
> > specific to this
> > > spec as we don't have a full visibility on the full set of
> > 
> > metadata that will
> > > be included in a service chain. This is a generic consideration
> > 
> > when deploying
> > > NSH. This is why we point the reader to Section 5 of RFC8300.
> > > 
> > > As NSH is deployed within a single domain, and that the operator
> > 
> > knows the SFs
> > > that will inject these headers (but also other context headers)
> > 
> > and the full
> > > set of metadata to be conveyed on a per chain basis, a first reco
> > 
> > in RFC8300
> > > is to increase the MTU.
> > > 
> > > If the MTU can't be increased, the next reco in RFC8300 is to rely
> > 
> > on the
> > > fragmentation/reassembly at the transport encapsulation. We can't
> > 
> > call a
> > > specific transport encapsulation because this is deployment-
> > 
> > specific.
> > > 
> > > Do you have in mind a specific point that we need to record? Do
> > 
> > you see a
> > > value if we add an informative reference to draft-ietf-intarea-
> > 
> > tunnels?
> > 
> > I think you need to be explicit about the issue, especially as it
> > might be a
> > consideration both in which form of identifiers are used and thus
> > their size, as
> > well as how many one tries to put on. I think you should state it is
> > a
> > requirement on the control plane to consider congifuration options
> > so that not
> > more headers are added than can fit, or the domain operator needs to
> > ensure that
> > a lower layer transport that support fragmentation is supported.
> > intarea-tunnels
> > may contribute to context.
> > 
> > Cheers
> > 
> > Magnus
> 
> ______________________________________________________________________________
> ___________________________________________
> 
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce
> message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages
> electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou
> falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged
> information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete
> this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> Thank you.
>