Re: [sfc] Robert Wilton's No Objection on draft-ietf-sfc-oam-framework-13: (with COMMENT)

"Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com> Thu, 14 May 2020 19:05 UTC

Return-Path: <naikumar@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F13F3A0848; Thu, 14 May 2020 12:05:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=DzUvXf0P; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=NIp8rQxn
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E8orqkMFFleH; Thu, 14 May 2020 12:05:47 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 968B33A0862; Thu, 14 May 2020 12:05:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11964; q=dns/txt; s=iport; t=1589483147; x=1590692747; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=AOarUcSUPmHAQD8NK9r9gNbzlnD9RKSI0XakRMCt7/k=; b=DzUvXf0P3cpbS4NTIN47d7c/Q9LN3KLQ9lMQ07vW13BxMIv/NeF2qbHM xe/6ZCz8vwyiKbZqAjjBGg9fjkT0uLJJQXGxZGEFTWu4gF36OzERj4uV9 2cn0LAiTQU2vVp4IDDMwUukvv++H1cHDOH3AZK3jE/yvAM/cbSwIqffO/ c=;
IronPort-PHdr: 9a23:4XUoBhB8y96eXYblZxaBUyQJPHJ1sqjoPgMT9pssgq5PdaLm5Zn5IUjD/qw00A3CXJ7Q7LRPjO+F+6zjWGlV55GHvThCdZFXTBYKhI0QmBBoG8+KD0D3bZuIJyw3FchPThlpqne8N0UGE8flbFqUqXq3vnYeHxzlPl9zIeL4UofZk8Ww0bW0/JveKwVFjTawe/V8NhKz+A7QrcIRx4BlL/U8
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0COBQCTlb1e/5RdJa1mHAEBAQEBAQcBARIBAQQEAQFAgUeBVCQtB29YLywKhBuDRgOld4FCgRADVAsBAQEMAQEjCgIEAQGERAIXgX4kOBMCAwEBCwEBBQEBAQIBBQRthSoGJgyFcgIBAxIREQwBATcBDwIBCBIIAiYCAgIwFQIOAgQBDSeDBAGCSwMuAQ6oAgKBOYhhdoEygwEBAQWBRkGDRhiCDgMGgQ4qgmOJXxqCAIERJxyBT34+gmcCAQIBgSwBDAYBITgCglozgi2OLSMGgkc9oSgKgk2IHZAXHYJdiGyFAox+kCyBWYgGk1kCBAIEBQIOAQEFgWkiZlgRB3AVOyoBgj5QGA2BNo8KOIM6hRSFQnQCATQCBggBAQMJfIwEgTQBgQ8BAQ
X-IronPort-AV: E=Sophos;i="5.73,392,1583193600"; d="scan'208";a="770620557"
Received: from rcdn-core-12.cisco.com ([173.37.93.148]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 May 2020 19:05:45 +0000
Received: from XCH-ALN-003.cisco.com (xch-aln-003.cisco.com [173.36.7.13]) by rcdn-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 04EJ5jHK022760 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 14 May 2020 19:05:46 GMT
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by XCH-ALN-003.cisco.com (173.36.7.13) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 14 May 2020 14:05:45 -0500
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 14 May 2020 14:05:45 -0500
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 14 May 2020 14:05:45 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gl5Ges4d0wt1r5Lqn0FZK7T8v4NJ3DHCy2weQ2e2K0gvhQFEA5ky5KjO1sWUww/LjrirnWEoHO3gT31aPrmVxypxJTxvVz3YmC1KOgiuYn+bNUzmDSN0jmxLeDHba1g0L9iQw9I/1UfgmYIQokJDfSjdGBs4eoiwQVQxAXgA+dzjTwMoIVM7z7xwtTsloBuCHU4l6mq++HJDRaOpgKzAFITbWVGVrOjrecoMfhhRzzh/A6dHNNFcCbTGDYYCHQIaG9tAv4ZS89pvvLSPVCFgGgewUNx/k8CGvmzP1PP6Sam5zqDJEVSORFLvsDv73xg5HQGQC+x1STrIlIY12xEwpw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AOarUcSUPmHAQD8NK9r9gNbzlnD9RKSI0XakRMCt7/k=; b=LFJF3Utjcchk7PV8AIQmPBRbdo3Z/ZOMFVR8u6fpO4SYz2gMwpW6Pjt7kV84unDhU0+87n2aU3G9LNu1i0Zftoe31WjwpJw7xAoHbk9QUKUEsI35Lyz6xACtR8APZPs3gmfmpI9pRrfOvaj+GL4owhn7aUujMrU9IcNRYizEz+5z2m1efdLCpzmaD3n3AcB0ZTiwpYgtTV1kjsEWE+ZC0mRP9DQDKJ4u0Q0dVd1Du1stzohebCXF4bHwSXC35GMrYBtEkAvXzio3MfIY1sel3LuSYXTwHzESLbabxF6b/jVfsHLQr1nurnM0KwYgmP7Ur/cFgqImWFplvb9IIvS0/g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AOarUcSUPmHAQD8NK9r9gNbzlnD9RKSI0XakRMCt7/k=; b=NIp8rQxn1XmQ+IxpI0EcGDQHthb0GPYeX69alzLcB4cqzjFYAO15hrueNLhrRXdCLMNW7seylCXFF3OLDVGAQYudGh7MC+Cpv2EcinW6oMuvXcVD3iusbIhzka02PzL+lUOeSep8Vt/73EndGaeV334SPkY6sOusUW3q/9u9CYk=
Received: from BN6PR11MB4068.namprd11.prod.outlook.com (2603:10b6:405:7c::31) by BN6PR11MB1267.namprd11.prod.outlook.com (2603:10b6:404:3d::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.20; Thu, 14 May 2020 19:05:44 +0000
Received: from BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::6d40:9e8a:252a:4f34]) by BN6PR11MB4068.namprd11.prod.outlook.com ([fe80::6d40:9e8a:252a:4f34%3]) with mapi id 15.20.3000.016; Thu, 14 May 2020 19:05:44 +0000
From: "Nagendra Kumar Nainar (naikumar)" <naikumar@cisco.com>
To: "Rob Wilton (rwilton)" <rwilton@cisco.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-sfc-oam-framework@ietf.org" <draft-ietf-sfc-oam-framework@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>, "sfc@ietf.org" <sfc@ietf.org>, Tal Mizrahi <tal.mizrahi.phd@gmail.com>
Thread-Topic: Robert Wilton's No Objection on draft-ietf-sfc-oam-framework-13: (with COMMENT)
Thread-Index: AQHWJGRAak5pSoDWdkKMJcs+Bwue6qinuX6A
Date: Thu, 14 May 2020 19:05:43 +0000
Message-ID: <9FD13724-EBAB-4D95-9A97-D93265FC3F0E@cisco.com>
References: <158885159205.21185.9872562709443924192@ietfa.amsl.com>
In-Reply-To: <158885159205.21185.9872562709443924192@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.35.20030802
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [173.38.117.67]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8a09cfab-afeb-4068-b8d3-08d7f839cd75
x-ms-traffictypediagnostic: BN6PR11MB1267:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <BN6PR11MB1267E242BB55DC5B60E7409DC6BC0@BN6PR11MB1267.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 040359335D
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN6PR11MB4068.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(136003)(39860400002)(346002)(376002)(366004)(396003)(86362001)(33656002)(64756008)(4326008)(6512007)(110136005)(26005)(6506007)(6486002)(54906003)(71200400001)(5660300002)(2616005)(186003)(316002)(8936002)(36756003)(2906002)(66476007)(76116006)(966005)(66446008)(478600001)(8676002)(66556008)(91956017)(66946007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: QWXcuMJqzrnyhLlsZk03jDZam9YSRpezrnlNebkA3wJvVi9E0Zr5oRnATBLGRUNLqgOhcjCbcjzbupaE5Bo7bqcfrblYXU8d2ZH6mtJl+Uu5sHS1etsdB5iXAb/6tDrOBJkn0BLOFSaCpNDY8D1FyjdTnUgtQ6kGV8TziusICOjqyiyVBFBd8HA9zSMTd3qoaDAagprlrmvEMFYV3c/JCQNw2RzsKY68falSG0jAK9+VsjrRVi7dBgwmcCKdm6UeAhOcXtHiwqMIrCEmKYAQlSRCLRCh3TEsag7WHAlWGvdl/MJ/Hkb9FVAFwKTtigyG5ECXl0owPd6lp3jCeN5elvQ4NYYyOdXp4jz8e0sjF3UBve0vB6rrDFSqORmBPC1FLP9YO/LgcmlhKPQJMfq4NlO1rBGL2TkAk2VgJV9t0p4Di8hm5cVhWxNJNb4O3+2/DKeeT+vN4kdC9c0TlujMDKfQBJRLuOF3yaa6n0Yw4K/VqU3JQs5cz7EmMMWve5j9
Content-Type: text/plain; charset="utf-8"
Content-ID: <05ACD2F45F85D5448BB7B730644EE622@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 8a09cfab-afeb-4068-b8d3-08d7f839cd75
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 May 2020 19:05:43.7444 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: yaD1f/r0ryKDtii+tOK/4HI0wfsD0w3ujfWJA2OK1XPpRgkrLLjIe8nQuCUfpwcbn82IBMFDg0X7rKHIkC4uZg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB1267
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.13, xch-aln-003.cisco.com
X-Outbound-Node: rcdn-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/FZYMTDaHTrw8PsAIQjAFL6czr3Q>
Subject: Re: [sfc] Robert Wilton's No Objection on draft-ietf-sfc-oam-framework-13: (with COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 May 2020 19:05:50 -0000

Hi Robert,

Thanks a lot for the great comments. Please see inline for the response..

    Robert Wilton has entered the following ballot position for
    draft-ietf-sfc-oam-framework-13: No Objection
    
    When responding, please keep the subject line intact and reply to all
    email addresses included in the To and CC lines. (Feel free to cut this
    introductory paragraph, however.)
    
    
    Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
    for more information about IESG DISCUSS and COMMENT positions.
    
    
    The document, along with other ballot positions, can be found here:
    https://datatracker.ietf.org/doc/draft-ietf-sfc-oam-framework/
    
    
    
    ----------------------------------------------------------------------
    COMMENT:
    ----------------------------------------------------------------------
    
    I found this document to be pretty easy to read and understand, so thank you
    for your work in this area.
    
<Nagendra> Thank you (

    I have a few comments, that may have already been raised by other reviewers:
    
    2.  SFC Layering Model
    
       While Figure 1 depicts an example where SFs are enabled as virtual
       entities, the SFC architecture does not make any assumptions on how
       the SFC data plane elements are deployed.  The SFC architecture is
       flexible and accommodates physical or virtual entity deployment.  SFC
       OAM accounts for this flexibility and accordingly it is applicable
       whether SFC data plane elements are deployed directly on physical
       hardware, as one or more Virtual Machines, or any combination
       thereof.
    
    Would "SF data plane elements" be more clear than "SFC data plane elements"?
    
<Nagendra> "SF data plane elements" may give an impression that it is referring to the service function itself. Scanning through other SFC related documents, most (if not all) of the document refers it as "SFC data plane elements". 

    3.  SFC OAM Components
    
       3.  Classifier component: OAM functions applicable at this component
           includes testing the validity of the classification rules and
           detecting any incoherence among the rules installed in different
           classifiers.
    
    It was not entirely clear to me what is meant by different classifiers, so
    possibly this could be elaborated slightly.
    
<Nagendra> Section 2.2 of RFC7665 list some of the common cases with more than one classifier. The above statement is intended to verify the classification policy on different such classifiers. Does the below text looks better?

OLD:
.  Classifier component: OAM functions applicable at this component
           includes testing the validity of the classification rules and
           detecting any incoherence among the rules installed in different
           classifiers.

New:
.  Classifier component: OAM functions applicable at this component
           includes testing the validity of the classification rules and
           detecting any misclassification or incoherence among the rules 
            installed when more than one classifier is used as explained 
            in section 2.2 of [RFC7665].
 

    4.3.  Trace Functions
    
    "TTL" is used in various places.  Does that need to be listed in the acronyms?
    
<Nagendra> TTL is a well-known abbreviation as per https://www.rfc-editor.org/materials/abbrev.expansion.txt. 

    6.2.  OAM Packet Processing and Forwarding Semantic
    
       Upon receiving an OAM packet, SFC-aware SFs may choose to discard the
       packet if it does not support OAM functionality or if the local
       policy prevents them from processing the OAM packet.  When an SF
       supports OAM functionality, it is desirable to process the packet and
       provide an appropriate response to allow end-to-end verification.  To
       limit performance impact due to OAM, SFC-aware SFs should rate limit
       the number of OAM packets processed.
    
    Doesn't this mean that SFC is potentially altering the thing being measured? 
    Wouldn't it be better instead to rate limit the number of OAM packets that are
    being generated in the first place?

<Nagendra> Any SF may be part of SFC that originates at different classifiers. So, rate limiting at the classifier may not be appropriate as the classifier may not be aware if there is any other OAM traffic (or the rate) originated by other classifiers.  
    
    6.1.  SFC OAM Packet Marker
    
       The SFC OAM function described in Section 4 performed at the service
       layer or overlay network layer must mark the packet as an OAM packet
       so that relevant nodes can differentiate an OAM packet from data
       packets.  The base header defined in Section 2.2 of [RFC8300] assigns
       a bit to indicate OAM packets.  When NSH encapsulation is used at the
       service layer, the O bit must be set to differentiate the OAM packet.
       Any other overlay encapsulations used at the service layer must have
       a way to mark the packet as OAM packet.
    
    "must be set" => "MUST be set" & "must have a way" => "MUST have a way"?
    
<Nagendra> One of the common suggestions from different reviewers is to avoid using normative statement and so we are updating the draft to avoid using the same. Adhering to that, I think we can leave the above statements as it is.

    But I question whether these should be musts at all.  E.g. by setting an OAM
    bit you allow the intermediate functions to potentially modify their behaviour,
    making it harder to know that the thing under test isn't changing its behaviour
    because it is being tested.  E.g. could another choice be to use some reserved
    address space to simulate flows without requiring the packets to be explicitly
    marked?

<Nagendra>While your suggestion appears to be another way to differentiate the OAM packets, the use of reserved space address is not much different from the use of O bit. Even with the reserved space address, the SF with the functionality such as "treating the packet header" may still have to deviate from its functionality. The deviation is triggered based on the reserved address in this case. 

    
    7.  Manageability Considerations
    
                       Table 4: OAM Tool GAP Analysis
      +----------------+--------------+-------------+--------+-------------+
      | Layer          |Configuration |Orchestration|Topology|Notification |
      +----------------+--------------+-------------+--------+-------------+
      | Underlay N/w   |CLI, NETCONF  | CLI, NETCONF|SNMP    |SNMP, Syslog,|
      |                |              |             |        |NETCONF      |
      +----------------+--------------+-------------+--------+-------------+
      | Overlay N/w    |CLI, NETCONF  | CLI, NETCONF|SNMP    |SNMP, Syslog |
      |                |              |             |        |NETCONF      |
      +----------------+--------------+-------------+--------+-------------+
      | Classifier     | CLI, NETCONF | CLI, NETCONF| None   | None        |
      +----------------+--------------+-------------+--------+-------------+
      | SF             |CLI, NETCONF  | CLI, NETCONF| None   | None        |
      +----------------+--------------+-------------+--------+-------------+
      | SFC            |CLI, NETCONF  | CLI, NETCONF| None   | None        |
      +----------------+--------------+-------------+--------+-------------+
    
    It would probably be useful for YANG to be listed here as well under
    configuration and Orchestration.  RESTCONF or gNMI could potentially also be
    listed, although I note that this table is not intended to be exhaustive.
    
<Nagendra> Based on the comment from another reviewer, we updated the respective section as below. Does that take care of the above query?

OLD:
As depicted in Table 4, information and data models are needed for
   configuration, manageability and orchestration for SFC.

NEW:
While the NETCONF capabilities are readily available as depicted in Table 4, the information and data models are needed for
   configuration, manageability and orchestration for SFC.

    There is also a base YANG topology model, RFC 8345, and other extensions being
    defined, at least for Overlay and Underlay networks.  Would they be appropriate
    for the topology column?
    
<Nagendra> I think so. We can update the topology column to reflect the same.

Once again, thanks a lot for the great comments.

Regards,
Nagendra