Re: [sfc] Fwd: I-D Action: draft-ietf-sfc-multi-layer-oam-14.txt

Greg Mirsky <gregimirsky@gmail.com> Fri, 15 October 2021 16:06 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B013B3A0AAF; Fri, 15 Oct 2021 09:06:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IAV-APglrXnl; Fri, 15 Oct 2021 09:06:38 -0700 (PDT)
Received: from mail-ed1-x531.google.com (mail-ed1-x531.google.com [IPv6:2a00:1450:4864:20::531]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 77AD83A0AA7; Fri, 15 Oct 2021 09:06:36 -0700 (PDT)
Received: by mail-ed1-x531.google.com with SMTP id d3so39838321edp.3; Fri, 15 Oct 2021 09:06:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=j9v8s+bo5+Jg0SMIc+x/QknTHA+CsOYK2v8ruX5QhpE=; b=dRWJSz94Pt1WV+uDL0yI8mtsTT8D5NYeedw/8AYAOUYz0rYm0G0gmOTMypQOrhCeQ5 DHeSI8vnMyNQ7+m4ubGA5nc1zRAp0FtrEb5fV9a2t6BkGE7pePnmFtP7SKw76CsXVQ6H E9HrfkN/6IP7jR30FjCrewWx39+DO+bdfVf4xXpncmIq/jT8fknGJ/J7CP8MUb0wUE9R 2LlEbfn70/QUCspOffTlSixVsn9ja4ytT6mLUpfysb//j6/7qnzwE8jpRzSTCQBsRQaO a+mXzDYYl7dkRwLbnKT9XJKtAGgtmwTMxTwhaBXWLqcvbit7CJeseHuLTMprZb+7Zi6e ko3A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=j9v8s+bo5+Jg0SMIc+x/QknTHA+CsOYK2v8ruX5QhpE=; b=682MO3Rl87I7b7yDXlty8regZPeEfibkSSF4fCdQM9jY4AdrhImJfN7IwudrgrIeS1 G96Er81YJ2gtBb3fnzB+BKZRQH/RJfjih7V1Z7AGDqucLFHqfpQgwSRKF7uca2LP67zT 5CJbsKvYZ52oF2KW/kgYR2AWHGuYu1X6TiW0kZiB0F9ru51Ez/4zqhB2FGJnBLHhUSDe lO6B8HcSi/XPMgGViJth/W5+e4AnT4Z8oIcdk7dutmN6KH6TQugT3A3QL7oMipNmsXED GaXZKYoP75JAMWiCsJ0eUt9KnrJEnkofnlOXKL4bMB6OJjjG78rhNXbInPfpLTQ5kBaV DJ5Q==
X-Gm-Message-State: AOAM532oZOLnQlbpxZeG/CLAfi5ZwRMAfpb3JFXLpOrjT8US7s12W45p Ysw8Fg0p2K5WQC+1bgmsBBsqb8Qf88XHEkH74J7Hz8DDFaw=
X-Google-Smtp-Source: ABdhPJzATCLfnRHgtsURtbdVHXB9dTstXhYw05XOGMzNZCjuvhKaGuwhh/ewClvEI44Il/IJxZJC0YIb0jc4x/4/12c=
X-Received: by 2002:a17:906:b208:: with SMTP id p8mr7993514ejz.477.1634313994392; Fri, 15 Oct 2021 09:06:34 -0700 (PDT)
MIME-Version: 1.0
References: <163370962115.18283.9043697369207976285@ietfa.amsl.com> <CA+RyBmXVH-W4d_kbJDX=6Z-BY_nACw5yQsJsOy-A0SsGDLjkKw@mail.gmail.com> <10112_1634136890_6166F33A_10112_380_1_787AE7BB302AE849A7480A190F8B93303542B55C@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
In-Reply-To: <10112_1634136890_6166F33A_10112_380_1_787AE7BB302AE849A7480A190F8B93303542B55C@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Fri, 15 Oct 2021 09:06:23 -0700
Message-ID: <CA+RyBmXEgt0QUWM1JofDJfDhEx7g8_Hyvq8kGKEhObf11Xt1=Q@mail.gmail.com>
To: Med Boucadair <mohamed.boucadair@orange.com>
Cc: Service Function Chaining IETF list <sfc@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001657f905ce666106"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/GuuTi7v5zurtLpuEV93cRA2RyAU>
Subject: Re: [sfc] Fwd: I-D Action: draft-ietf-sfc-multi-layer-oam-14.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Oct 2021 16:06:44 -0000

Hi Med,
thank you for your review and comments. Please find my notes in-lined below
tagged by GIM>>.

Regards,
Greg

On Wed, Oct 13, 2021 at 7:54 AM <mohamed.boucadair@orange.com> wrote:

> Hi Greg, all,
>
>
>
> Please find below some quick comments about this version:
>
>
>
> (1)
>
>
>
> “While SFC Echo Request always traverses the SFP, it is directed to,
>
> the corresponding Echo Reply usually is sent over an IP network.”
>
>
>
> I’m not sure to get the intent here, especially that an SFP is still “over
> an IP network”.
>
GIM>> We are pointing out that the Echo Request traverses SFP using NSH
while the Echo Reply is not. Do you think that explicitly referring to the
role of NSH helps to make it clearer:
OLD TEXT:
   While SFC Echo Request always traverses the SFP, it is directed to,
   the corresponding Echo Reply usually is sent over an IP network.
NEW TEXT:
   While SFC Echo Request always traverses the SFP, it is directed to,
   using NSH, the corresponding Echo Reply usually is sent over an IP
   network without NSH.

>
>
> I have the same concern with this one:
>
>
>
> “There are scenarios when it is beneficial to direct the responder to
>
> use a path other than the IP network“
>
GIM>> Would the following update make it clearer:
OLD TEXT:
   There are scenarios when it is beneficial to direct the responder to
   use a path other than the IP network.
NEW TEXT:
   In some cases, an operator might choose to direct the responder
   to send the Echo Reply with NSH over a particular SFP.

>
>
> (2) You may want align these two statements to avoid what may be perceived
> as an internal inconsistency (or redundant requirements):
>
>
>
>       The Message Authentication Code (MAC) Context Header that is
> defined
>
>       in [I-D.ietf-sfc-nsh-integrity] MAY be used to protect the SFC
> Echo
>
>       Request's integrity when using the SFC Return Path TLV
>
>
>
> vs.
>
>
>
>       When the integrity protection for SFC active OAM, and SFC Echo
>
>       Request/Reply in particular, is required, it is RECOMMENDED to use
>
>       one of the Context Headers defined in [I-D.ietf-sfc-nsh-integrity].
>
GIM>> Thank you for catching this inconsistency. Would you agree that
s/MAY/SHOULD/ resolves it?

>
>
> Cheers,
>
> Med
>
>
>
> *De :* sfc <sfc-bounces@ietf.org> *De la part de* Greg Mirsky
> *Envoyé :* vendredi 8 octobre 2021 18:19
> *À :* Service Function Chaining IETF list <sfc@ietf.org>;
> sfc-chairs@ietf.org
> *Objet :* [sfc] Fwd: I-D Action: draft-ietf-sfc-multi-layer-oam-14.txt
>
>
>
> Dear All,
>
> following the discussion on the SFC WG mailing list and the direction from
> the SFC WG Chairs, we've merged substantive parts
> of draft-ao-sfc-oam-path-consistency
> and draft-ao-sfc-oam-return-path-specified with this draft where the base
> functionality of the SFC NSH Echo Request/Reply is defined. The authors
> greatly appreciate and welcome your comments, questions, and suggestions.
> We're looking forward to the discussion that will help to progress this
> document to the WG LC.
>
>
>
> Regards,
>
> Greg (on behalf of the authors).
>
> ---------- Forwarded message ---------
> From: <internet-drafts@ietf.org>
> Date: Fri, Oct 8, 2021 at 9:13 AM
> Subject: [sfc] I-D Action: draft-ietf-sfc-multi-layer-oam-14.txt
> To: <i-d-announce@ietf.org>
> Cc: <sfc@ietf.org>
>
>
>
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Service Function Chaining WG of the IETF.
>
>         Title           : Active OAM for Service Function Chaining
>         Authors         : Greg Mirsky
>                           Wei Meng
>                           Ting Ao
>                           Kent Leung
>                           Gyan Mishra
>         Filename        : draft-ietf-sfc-multi-layer-oam-14.txt
>         Pages           : 37
>         Date            : 2021-10-08
>
> Abstract:
>    A set of requirements for active Operation, Administration, and
>    Maintenance (OAM) of Service Function Chains (SFCs) in a network is
>    presented in this document.  Based on these requirements, an
>    encapsulation of active OAM messages in SFC and a mechanism to detect
>    and localize defects are described.
>
>    This document updates RFC 8300.  Particularly, it updates the
>    definition of O (OAM) bit in the Network Service Header (NSH) (RFC
>    8300) and defines how an active OAM message is identified in the NSH.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/
>
> There is also an HTML version available at:
> https://www.ietf.org/archive/id/draft-ietf-sfc-multi-layer-oam-14.html
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-multi-layer-oam-14
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
> _________________________________________________________________________________________________________________________
>
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.
>
>