[sfc] Fwd: New Version Notification for draft-ietf-sfc-multi-layer-oam-03.txt

Greg Mirsky <gregimirsky@gmail.com> Thu, 09 May 2019 05:31 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A777120108 for <sfc@ietfa.amsl.com>; Wed, 8 May 2019 22:31:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tWr-JlneBuge for <sfc@ietfa.amsl.com>; Wed, 8 May 2019 22:31:15 -0700 (PDT)
Received: from mail-lf1-x12a.google.com (mail-lf1-x12a.google.com [IPv6:2a00:1450:4864:20::12a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26CE612004A for <sfc@ietf.org>; Wed, 8 May 2019 22:31:15 -0700 (PDT)
Received: by mail-lf1-x12a.google.com with SMTP id v18so611260lfi.1 for <sfc@ietf.org>; Wed, 08 May 2019 22:31:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=4kV+j3rE5/c7Wparpm9zMN7bWpcHdpM8gAkERmKkgmg=; b=KS4QybWAs6GUdP8oFsllB5ZyxWKHSIZazCAmP2t5uOwJEGOJ9ESJOBpHy+9KxN2Nc3 1xy3P5JSPxGNEgz/f79FR5Pl/suk/BzQVsTq+T57v6YXgi9uOiYyE/PKZBTvrAkkuYev Q7u02tRGcyJ4vcC29fq21PMS/YAsEn670dGP3I8R67DjJX9u+QXQ5ZF0VOKRU/Y5Zby/ JT0G1b+rKIY8mFIFaTNm3oR5j/LvLTpLXRTMYQpchjyQowktRIREUOuPSGhC1ditlfDZ pY64r/R7lLIgN+FKVtP/rWRU6BZAWJaEdaTOT9dfZYOTL7l5qN7s/ifnhCTtoueq3wXP Dj/Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=4kV+j3rE5/c7Wparpm9zMN7bWpcHdpM8gAkERmKkgmg=; b=DaULDuZGaG4cSbvELhAskJIIvB00TwZheZSvTFNSgKBYJK7opA6q9MoiBedCxLoGlb Ka8YZjHHuQG91YCpwv50rlobOB3VoeKnEkAa6QDTRIlYWzs1IAjo2BnMzn8hzz+V1gXd JdpCvrQD8Euq07EaNjbp74FDdvs7n681aJ/E5k8PJ3QrwwPyUh3wOScKFt8ttW0HWkQZ qj2lg9CcIhgzy9uwJXqcy8U+iqPZJB4iOzttyOEUFYdtWAjSWLp2g6o6Po9RjX/9XYRS 1pmZjyOJ4vDm0aKli85H7lQqwiV0SHXKzoLSLMduGvPg+87rGWT0Edn0NqMfWV1+v5X6 nvbg==
X-Gm-Message-State: APjAAAW+zhvQHxa6kDGcAfGU/oI4rHAaWGEwaJuqVC45yNvNyRFm3Emt cvT7BLjRj9Xzt04VpfGlttldoyQHTtYjLEjxEk0OB5CV
X-Google-Smtp-Source: APXvYqwXZCXoKiVTyw7q8xaiKjOf94hAd2Qp9gzNjD4UYKoK9F8buSKVlgYcyZDobpFLqZlUybbf0O1W9clxwkz/bkQ=
X-Received: by 2002:a19:97c8:: with SMTP id z191mr1088606lfd.167.1557379872795; Wed, 08 May 2019 22:31:12 -0700 (PDT)
MIME-Version: 1.0
References: <155737926141.22620.15797109690906794999.idtracker@ietfa.amsl.com>
In-Reply-To: <155737926141.22620.15797109690906794999.idtracker@ietfa.amsl.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Wed, 08 May 2019 22:31:01 -0700
Message-ID: <CA+RyBmXKNGqd8NCirzOrY4cREGB3dQHCMV7EhpKEWi8ft8vUUg@mail.gmail.com>
To: Service Function Chaining IETF list <sfc@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000019323205886dc282"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/IyDSujhPiJMT4jpASTzNVYMyEbo>
Subject: [sfc] Fwd: New Version Notification for draft-ietf-sfc-multi-layer-oam-03.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 May 2019 05:31:18 -0000

Dear All,
the update to the draft addresses the comment received from Joel at the
meeting in Prague:
- Joel: if we get an echo request we can't parse, how do we know that it is
an echo request, and do we have the information to return it to the correct
source?
- Greg: we will clarify this in the draft. It has to practical so the
sender can understand the situation. We introduced two classes of TLVs:
mandatory and optional. Will add clearer text.

A new TLV, Errored TLVs, introduced to be optionally used to pass in an
echo reply mandatory TLVs that were not understood because either the
implementation on the receiver does not support them or couldn't parse them
correctly.

Also, please review the update to the interpretation of O-bit and the value
of the Next Protocol field to address Adrian's comments at the meeting in
Bangkok:
The rules of
   interpreting the values of O bit and the Next Protocol field are as
   follows:

   o  O bit set, and the Next Protocol value is not one of identifying
      active or hybrid OAM protocol (per [RFC7799] definitions), e.g.,
      defined in this specification Active SFC OAM - a Fixed-Length
      Context Header or Variable-Length Context Header(s) contain OAM
      command or data.  and the type of payload determined by the Next
      Protocol field;

   o  O bit set, and the Next Protocol value is one of identifying
      active or hybrid OAM protocol - the payload that immediately
      follows SFC NSH contains OAM command or data;

   o  O bit is clear - no OAM in a Fixed-Length Context Header or
      Variable-Length Context Header(s) and the payload determined by
      the value of the Next Protocol field;

   o  O bit is clear and the Next Protocol value is one of identifying
      active or hybrid OAM protocol MUST be identified and reported as
      the erroneous combination.  An implementation MAY have control to
      enable processing of the OAM payload.

   From the above-listed rules follows the recommendation to avoid
   combination of OAM in a Fixed-Length Context Header or Variable-
   Length Context Header(s) and in the payload immediately following the
   SFC NSH because there is no unambiguous way to identify such
   combination using the O bit and the Next Protocol field.

Regards,
Greg

---------- Forwarded message ---------
From: <internet-drafts@ietf.org>
Date: Wed, May 8, 2019 at 10:21 PM
Subject: New Version Notification for draft-ietf-sfc-multi-layer-oam-03.txt
To: <sfc-chairs@ietf.org>, Gregory Mirsky <gregimirsky@gmail.com>, Bhumip
Khasnabish <vumip1@gmail.com>, Wei Meng <meng.wei2@zte.com.cn>, Cui(Linda)
Wang <lindawangjoy@gmail.com>



A new version of I-D, draft-ietf-sfc-multi-layer-oam-03.txt
has been successfully submitted by Greg Mirsky and posted to the
IETF repository.

Name:           draft-ietf-sfc-multi-layer-oam
Revision:       03
Title:          Active OAM for Service Function Chains in Networks
Document date:  2019-05-08
Group:          sfc
Pages:          18
URL:
https://www.ietf.org/internet-drafts/draft-ietf-sfc-multi-layer-oam-03.txt
Status:
https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/
Htmlized:
https://tools.ietf.org/html/draft-ietf-sfc-multi-layer-oam-03
Htmlized:
https://datatracker.ietf.org/doc/html/draft-ietf-sfc-multi-layer-oam
Diff:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-multi-layer-oam-03

Abstract:
   A set of requirements for active Operation, Administration and
   Maintenance (OAM) of Service Function Chains (SFCs) in networks is
   presented.  Based on these requirements an encapsulation of active
   OAM message in SFC and a mechanism to detect and localize defects
   described.  Also, this document updates RFC 8300 in the definition of
   O (OAM) bit in the Network Service Header (NSH) and defines how the
   active OAM message identified in SFC NSH.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat