Re: [sfc] The SFC WG has placed draft-eastlake-sfc-nsh-ecn-support in state "Candidate for WG Adoption"

Donald Eastlake <d3e3e3@gmail.com> Fri, 18 January 2019 19:19 UTC

Return-Path: <d3e3e3@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25C41131304; Fri, 18 Jan 2019 11:19:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.749
X-Spam-Level:
X-Spam-Status: No, score=-1.749 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vPmlmK2MMSOp; Fri, 18 Jan 2019 11:19:53 -0800 (PST)
Received: from mail-io1-xd34.google.com (mail-io1-xd34.google.com [IPv6:2607:f8b0:4864:20::d34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C1B84131300; Fri, 18 Jan 2019 11:19:52 -0800 (PST)
Received: by mail-io1-xd34.google.com with SMTP id r200so11600671iod.11; Fri, 18 Jan 2019 11:19:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=Gg+tvMwB1kDnkRkYsAralNEHI+8Aca8nN9fin/WnDZI=; b=nbUvLsvO2I3vd+CZ1xIozBcfdNjRvuXEybO4wxDPk05IRkKiRSUTzdk39MtC0gHFVd 5QGJkuHinqzniaj74QhkxKuRsdMacPMBP0zUtG1GFMtGLBNbxbCjc7OSWs91pSjQAW6H pcHxcIXcw4XPUFqhKVxOHgrnUCRnoY0tOcbVP89PF2nb0uZJliywtgK+kvmBu7KuaeMH LWUzbw9aEzfUlp9X1Gz6ft6AEdP9ElxmZmOwh2HP71zROsj9edIKDfdtOVgv0PynVmtz 7YNuNLkz+KSLO3wKkPObfrDAiGSy8xEMJ4hhXwnimE7Dzaxhf5gboBOzC45pFmQAClBe d5qA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=Gg+tvMwB1kDnkRkYsAralNEHI+8Aca8nN9fin/WnDZI=; b=ge2mgd8J/CVxcS/GTIoeLJPYZkf2MzCGF5sU9I3aFZH1HFPtjt/LKb2fWJClfBivf0 tz7uCSQ06y1NN7URSQiKNHK8eIR3CY+eCPv6b4cNm0NxRogfFQBPJIPdncBbQIQCm0Bq aV3UEuOAXrn+T5lW1uftTruQ8U7MHPuY3N7mRqtak1FzcBOnvJ+QNLhMCnEQZlRrgHXM P1n0j0lHJDTVliwunidbO9O0hEeL/PoGenBhlBUAdAZvVz8ZVj8uIswNsS/sYbabN2fc UNtFV8902t4fW4jgPZBosrpYeiAoMT8dRDjHUZHigfhbTFPltfsmmQ/uVzXQPW2CuDz3 awVA==
X-Gm-Message-State: AJcUukcPyet/cC6qvyDHjKzFIAGlTj4kpbNtCQ7NMKYWhc7BLM1aapll YKQzu4CDtHOIOwkfV6dP3t2ME7pKI1E3HdHAxfU=
X-Google-Smtp-Source: ALg8bN4sg/fSoDP0IbFtyr08TST/Mb6Gx4PDMTv446CcLSbxIBxC1aTv94pbh6J2FR55qwz3F7SdwzvoyP2A3KjRKq0=
X-Received: by 2002:a6b:3945:: with SMTP id g66mr10993306ioa.131.1547839191847; Fri, 18 Jan 2019 11:19:51 -0800 (PST)
MIME-Version: 1.0
References: <154649225579.32607.12231566034033496144.idtracker@ietfa.amsl.com> <787AE7BB302AE849A7480A190F8B93302EA09352@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <CAA=duU2DOKXFH6GTDsVxN__OcfEUc5D-2tszGd2Z7QYBmyCv0w@mail.gmail.com> <787AE7BB302AE849A7480A190F8B93302EA095B8@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <CAA=duU1zNrdhnnmDmHpSpiCEOwU1ezzefQDwBq50GGtm1arJtA@mail.gmail.com> <787AE7BB302AE849A7480A190F8B93302EA0A2A3@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <63f32944-4adf-cb3b-ad6c-aaf3cc8f0a99@joelhalpern.com>
In-Reply-To: <63f32944-4adf-cb3b-ad6c-aaf3cc8f0a99@joelhalpern.com>
From: Donald Eastlake <d3e3e3@gmail.com>
Date: Fri, 18 Jan 2019 14:19:40 -0500
Message-ID: <CAF4+nEEFj-drKVXFFjSth2YZHrthKpTtJ_Q2CEBS_=LwcsiZqg@mail.gmail.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
Cc: mohamed.boucadair@orange.com, "Andrew G. Malis" <agmalis@gmail.com>, "draft-eastlake-sfc-nsh-ecn-support@ietf.org" <draft-eastlake-sfc-nsh-ecn-support@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/E-NBB7On9yo3bZd9JMVOKRpmemc>
Subject: Re: [sfc] The SFC WG has placed draft-eastlake-sfc-nsh-ecn-support in state "Candidate for WG Adoption"
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Jan 2019 19:19:55 -0000

Hi Joel,

I think your message correctly describes what the draft is doing.

To me, carrying ECN in the NSH within the SFC domain is simpler and
more robust than trying to use the outer or the inner transport
headers. For example, should an SF or SF Proxy clear the outer
transport ECN bits, with ECN being carried in the NSH, you just lose
congestion management on the round trip from the SFF to that SF or SF
Proxy. On the other hand, if you are depending on ECN in the outer
transport header rather than the NSH (or in metadata where there is no
outer transport header), then you lose congestion management across
the entire SFC domain. Or if there is an SF or SF Proxy reached by a
transport protocol that has no ECN support, you don't have to muck
around finding the inner transport header to update.

Thanks,
Donald
===============================
 Donald E. Eastlake 3rd   +1-508-333-2270 (cell)
 1424 Pro Shop Court, Davenport, FL 33896 USA
 d3e3e3@gmail.com

On Fri, Jan 18, 2019 at 9:55 AM Joel M. Halpern <jmh@joelhalpern.com> wrote:
>
> <chair hat off>
> Let me try as an individual to paraphrase what I understand the document
> to be offering.  That authors should feel free to comment further
> including if necessary telling me that I am confused.
>
> Consider an SFF that receives a packet with a transport ECN indication
> and an NSH header.  That SFF removes the transport header.  It then
> (usually) sends the packet via some other means to an SF, and gets the
> packet back.  After which it sends it on to the next SFF with a new
> transport header carrying the NSH.
> Let us take as given that we want to support effective ECN.
> Then we need to somehow preserve the ECN information that the SFF receives.
>
> One way would be to insist that the SFF, when it receives the ECN
> information, has to rummage through to find the internal IP packet, and
> must update the internal ECN information therein.  Ugg.  IThat would be
> a pretty onerous requirement.
>
> Instead, the document suggests that the SFF transfer the marking to the
> NSH header, and then use that NSH marking when it generates the new
> transport header.  This can then be used when the packet exits the NSH
> domain to propagate the information to the header (which is by
> definition exposed when the NSH header is removed.)
>
> Med, if I understand you properly you are suggesting that the SFF should
> somehow keep the information from the transport header associated with
> the packet, but not in the NSH header.  In some SFF implementations, and
> with some ways of working with SFs, that is doable.  Requiring that
> would limit the implementation and deployment choices.
>
> <chair hat somewhere>
> Yours,
> Joel
>
> On 1/18/19 4:15 AM, mohamed.boucadair@orange.com wrote:
> > Hi Andy,
> >
> > Please see inline.
> >
> > Cheers,
> >
> > Med
> >
> > *De :*sfc [mailto:sfc-bounces@ietf.org] *De la part de* Andrew G. Malis
> > *Envoyé :* jeudi 17 janvier 2019 16:33
> > *À :* BOUCADAIR Mohamed TGI/OLN
> > *Cc :* sfc-chairs@ietf.org; IETF Secretariat;
> > draft-eastlake-sfc-nsh-ecn-support@ietf.org; sfc@ietf.org
> > *Objet :* Re: [sfc] The SFC WG has placed
> > draft-eastlake-sfc-nsh-ecn-support in state "Candidate for WG Adoption"
> >
> > Med,
> >
> > Your point about RFC 5129 is correct, but I'm not personally aware of
> > any implementations. And I was just using MPLS as an example, there may
> > be others in the future as well.
> >
> > [Med] I understood this was an example, but still this is IMHO supposed
> > to be handled among the spirit of the effort led by Bob in 6040 and its
> > current & futures updates.
> >
> > Your point about the SFF preserving ECN is implementation dependent, for
> > example the SFF could have separate input and output interfaces without
> > shared memory, or the transport encapsulation could change in different
> > regions of the SFC domain.
> >
> > [Med] I don’t understand your point about separate inputs/output
> > interfaces and the change of encap schemes. Let’s put aside SFC for a
> > moment and consider the example of a LISP XTR which is supporting ECN
> > dissemination/handling. That xTR may not use the same in/out interfaces,
> > but still need to achieve some processing when doing its encap/decap.
> >
> > It's difficult to depend on SFFs being able to preserve
> > transport-header-dependent information without that becoming a
> > requirement in the SFC architecture.
> >
> > [Med] I don’t think that we can tag congestion notification as
> > “transport-header-dependent”. There are ways to pass that info even when
> > the transport encap changes.
> >
> > This is IMHO among things that the WG is supposed to cover under this
> > item in the charter (please note that those are clearing taged as
> > transport issues):
> >
> > ==
> >
> > 4) Transport Considerations - This will capture the expectations SFC
> > places on transport behavior, including dealing with issues such as
> > congestion indications and responses.
> >
> > ==
> >
> > Cheers,
> >
> > Andy
> >
> > On Thu, Jan 17, 2019 at 10:02 AM <mohamed.boucadair@orange.com
> > <mailto:mohamed.boucadair@orange.com>> wrote:
> >
> >     Hi Andy,
> >
> >     Please see inline.
> >
> >     Cheers,
> >
> >     Med
> >
> >     *De :*Andrew G. Malis [mailto:agmalis@gmail.com
> >     <mailto:agmalis@gmail.com>]
> >     *Envoyé :* jeudi 17 janvier 2019 15:50
> >     *À :* BOUCADAIR Mohamed TGI/OLN
> >     *Cc :* IETF Secretariat; sfc-chairs@ietf.org
> >     <mailto:sfc-chairs@ietf.org>;
> >     draft-eastlake-sfc-nsh-ecn-support@ietf.org
> >     <mailto:draft-eastlake-sfc-nsh-ecn-support@ietf.org>; sfc@ietf.org
> >     <mailto:sfc@ietf.org>
> >     *Objet :* Re: [sfc] The SFC WG has placed
> >     draft-eastlake-sfc-nsh-ecn-support in state "Candidate for WG Adoption"
> >
> >     Med,
> >
> >     Not all transports support ECN marking, for example NSH over MPLS.
> >
> >     [Med] Isn’t this covered by RFC5129?
> >
> >     And even where the transport supports ECN marking, note the example
> >     in Figure 1 in the draft where the outer encapsulation can be
> >     stripped during SFF processing. In that case, the scope of the ECN
> >     marking is limited to individual SFF-SFF links. rather than end-to-end.
> >
> >     [Med] Why couldn’t SFF preserve ECN when doing its transport
> >     decap/encap?
> >
> >     Cheers,
> >
> >     Andy
> >
> >     On Thu, Jan 17, 2019 at 9:12 AM <mohamed.boucadair@orange.com
> >     <mailto:mohamed.boucadair@orange.com>> wrote:
> >
> >         Hi all,
> >
> >         I do think that ECN is naturally better handled at the transport
> >         encapsulation instead of the NSH itself.
> >
> >         Requiring the functionality to be handled at the transport encap
> >         (draft-ietf-tsvwg-rfc6040update-shim) and NSH is redundant, IMO.
> >
> >         I like the approach we set in the SFC architecture in which we
> >         separated service matters from transport ones. I'd vote for
> >         maintaining that separation cleaner as it was set in the arch RFC.
> >
> >         Thank you.
> >
> >         Cheers,
> >         Med
> >
> >          > -----Message d'origine-----
> >          > De : sfc [mailto:sfc-bounces@ietf.org
> >         <mailto:sfc-bounces@ietf.org>] De la part de IETF Secretariat
> >          > Envoyé : jeudi 3 janvier 2019 06:11
> >          > À : sfc-chairs@ietf.org <mailto:sfc-chairs@ietf.org>;
> >         draft-eastlake-sfc-nsh-ecn-support@ietf.org
> >         <mailto:draft-eastlake-sfc-nsh-ecn-support@ietf.org>;
> >          > sfc@ietf.org <mailto:sfc@ietf.org>
> >          > Objet : [sfc] The SFC WG has placed
> >         draft-eastlake-sfc-nsh-ecn-support in
> >          > state "Candidate for WG Adoption"
> >          >
> >          >
> >          > The SFC WG has placed draft-eastlake-sfc-nsh-ecn-support in state
> >          > Candidate for WG Adoption (entered by Joel Halpern)
> >          >
> >          > The document is available at
> >          >
> >         https://datatracker.ietf.org/doc/draft-eastlake-sfc-nsh-ecn-support/
> >          >
> >          > Comment:
> >          > This starts the WG call for adoption of this draft.
> >          > Please respond to the list, indicating support for this as a
> >         work item of the
> >          > working group with this document as the basis for the work,
> >         or objection to
> >          > the working group adopting this item as a working group draft.
> >          >
> >          > The authors should confirm to the chairs and WG secretary
> >         that all IPR known
> >          > to them relevant to this draft has been disclosed.
> >          >
> >          > The working group adoption call will last 2 weeks, ending at
> >         the end of the
> >          > day on Thursday, January 17 2019 COB somewhere.
> >          >
> >          > Thank you,
> >          > Joel
> >          >
> >          > _______________________________________________
> >          > sfc mailing list
> >          > sfc@ietf.org <mailto:sfc@ietf.org>
> >          > https://www.ietf.org/mailman/listinfo/sfc
> >