Re: [sfc] Progression of OAM work in the SFC WG - OAM Packet

"Joel M. Halpern" <jmh@joelhalpern.com> Mon, 14 February 2022 12:05 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 103E23A0A40 for <sfc@ietfa.amsl.com>; Mon, 14 Feb 2022 04:05:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.514
X-Spam-Level:
X-Spam-Status: No, score=-3.514 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.714, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fCNrDGsPuJVW for <sfc@ietfa.amsl.com>; Mon, 14 Feb 2022 04:05:33 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 82E213A0A22 for <sfc@ietf.org>; Mon, 14 Feb 2022 04:05:33 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 4Jy2ws0Wlhz6GYLB; Mon, 14 Feb 2022 04:05:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1644840333; bh=1pLXPECLZvMxWzVCdSvAtZnWJvIc4xmHOySKR5zA/u4=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=FoVFCAxKa7FJi2g8/WqRTI0fdJ8WeMMyLCbisAUbSvgPZ5nbhfnC8z6VM67mEnP/h RL9dwWn6hk7pB1pZrrDcQKK3KL1KFmdIaJzWRDpQDpcijxcEW7YWJ1ZaDrYkMGOt+T 4Z90E6PBsCSIK7Mm+mVwgUbJYgpq4BlJqJc0nP3I=
X-Quarantine-ID: <l91HGOBTgKdD>
X-Virus-Scanned: Debian amavisd-new at a2.tigertech.net
Received: from [192.168.22.111] (50-233-136-230-static.hfc.comcastbusiness.net [50.233.136.230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 4Jy2wr3Z5tz6G9Jb; Mon, 14 Feb 2022 04:05:32 -0800 (PST)
Message-ID: <c525b8fe-f82b-d658-9999-c1b9a3630e86@joelhalpern.com>
Date: Mon, 14 Feb 2022 07:05:32 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.6.0
Content-Language: en-US
To: "Carlos Pignataro (cpignata)" <cpignata=40cisco.com@dmarc.ietf.org>
Cc: "sfc@ietf.org" <sfc@ietf.org>
References: <MN2PR13MB4206A3B910C9CE55867DA10BD2279@MN2PR13MB4206.namprd13.prod.outlook.com> <CA+RyBmWZU-OL-9kb7byfumcGZ_Xktb7Yp=dRQe3QRdCcTwBZcw@mail.gmail.com> <CABNhwV1Fcb9fmh82LeUKTHO7BdYeWp4HyP9aQBGS+x6FEL=fLA@mail.gmail.com> <a47de7f9-bfa3-979a-0e49-1f1c52161d72@joelhalpern.com> <CA+RyBmVY6PBeQ7O_vhtKO4M7bnZhCAdoVzPZJsd9f0jyaEvTWg@mail.gmail.com> <CABNhwV0-nkH5tV13X-G--qf8u0yi9TGYgo2ee+N8PNosm=b1xg@mail.gmail.com> <3CDEE749-5A40-44FF-9E3A-8C8EBBA94849@cisco.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
In-Reply-To: <3CDEE749-5A40-44FF-9E3A-8C8EBBA94849@cisco.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/NX9MTzC2RobIz1RWpGE7hn-J0b0>
Subject: Re: [sfc] Progression of OAM work in the SFC WG - OAM Packet
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Feb 2022 12:05:39 -0000

Thank you for taking the time to provide a careful reply.

It appears, from your description of ICMP packets that your 
understanding of 8300 is that in SFC an external ICMP packet will get 
the O bit set in the NSH header.  Presumably, base on this, the SFF or 
SF are supposed to look through and notice this content?   (Otherwise, 
why set the bit?)  This seems an undesirable and expensive implications 
which other readers have not drawn from the RFC 8300 text.  (It also 
requires the encapsulating node to do extra checking to discover this case.)

Am I reading your expectation correctly?

Yours,
Joel

On 2/13/2022 11:06 PM, Carlos Pignataro (cpignata) wrote:
> Replying to this specific email in the thread, only because it is the 
> latest one at this point in time, but bundling comments from various 
> places on the thread. Please find some follow-up comments and questions 
> marked “CMP”, indicating the “From”, and organized chronologically:
> 
> *James N Guichard <james.n.guichard@futurewei.com 
> <mailto:james.n.guichard@futurewei.com>>:*
> 
>> 1) The chairs have reviewed the O bit definition in RFC 8300.  That 
>> definition is at best open to interpretation and therefore 
>> incomplete.  For example, the clear intention is only to mark packets 
>> which are intended for SFC OAM at the SFC service layer.  But that is 
>> not what the current text says.  There is also, unfortunately, 
>> ambiguity as to what constitutes an OAM packet.  So it is reasonable 
>> for documents to update 8300 to clarify the exact applicability and 
>> action for the O-bit.
> 
> CMP: It is unclear to me what exact issues the chairs are calling out. 
> There are two issues mentioned:
> CMP: 1. "But that is not what the current text says.” —> what does the 
> text say precisely?  Can you point to the specific RFC 8300 text that is 
> believed to be incomplete, and a detailed use case that showcases the 
> potential issue? An extrapolated counter-example just to make a point: 
> the text does not  say what days of the week OAM packets can be marked, 
> yet there’s an expectation that they will work Mondays and Saturdays all 
> the same — even holidays.
> CMP: 2. What specifically is the ambiguity with what an OAM packet is? 
> Please grep the RFC series for “oam packet”, it is not a new term.
> CMP: Net-net, O-bit=1, OAM packet.
> 
>> 2) However, related to point 1), we can't have multiple documents 
>> updating the definition differently.  As such, the authors of the SFC 
>> iOAM draft and the SFC multi-layer-oam draft need to come together and 
>> figure out what the clarification is for the definition of that bit. 
>> We do not believe as chairs that either of these documents can move 
>> forward from the WG until such clarity has been reached.
> 
> CMP: If there is still believed to be an ambiguity or a clear 
> opportunity for improving the definition, I agree with consolidating 
> that update. I had suggested before that if such new text or real 
> clarification is agreed, a separate document that only makes that O-bit 
> clarification is the most clear and clean way to go. That doc should be 
> a one-pager or less. I’d be happy to contribute to that minimal doc, if 
> it is shown to be needed.
> 
> CMP: For completeness also, the "SFC multi-layer-oam” document has many 
> outstanding issues besides the O-bit.
> 
> *Greg Mirsky <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>>*
> 
>> I've reviewed our SFC OAM documents and draft-ietf-sfc-nsh-tlv. As I 
>> understand these documents, the Active SFC OAM and IOAM are identified 
>> by the respective values for the NSH Next Protocol field (to be 
>> assigned by IANA). 
> 
> CMP: There is a major issue with the sentence above. Active SFC OAM (as 
> a category), as per RFC 8300, needs to be identified by setting the 
> O-bit. No way around that based on RFC 8300. However, the text "the 
> Active SFC OAM” creates confusion since it refer to a specific OAM 
> protocol which has the same name as a the category as well. That name 
> collision is quite unfortunate in my opinion.
> 
>> At the same time, so far no OAM-specific meta data TLV has been 
>> defined. Thus, it appears that one way forward could be to not involve 
>> the O bit in the active SFC OAM or IOAM altogether. In other words, to 
>> deprecate the NSH O bit.
> 
> CMP: RFC 8924 already includes ICMP and BFD as example SFC Action OAM 
> protocols. Those can be encapsulated in IP, in which the Next-Protocol 
> indicates IP — and (as per RFC 8300) the O-bit is set to indicate an OAM 
> packet.
> CMP: The proposal of deprecating the O-bit breaks those SFC OAM 
> protocols already included in an RFC.
> CMP: That proposal of deprecating the O-bit also breaks Section 4.1 of IOAM.
> CMP: This expired I-D yet implemented in open source uses the O-bit: 
> https://www.ietf.org/archive/id/draft-penno-sfc-trace-03.txt 
> <https://www.ietf.org/archive/id/draft-penno-sfc-trace-03.txt>
> 
> 
> *Gyan Mishra <hayabusagsm@gmail.com <mailto:hayabusagsm@gmail.com>>*
> 
>> I agree that what makes sense to me as a path forward is to deprecate 
>> the O bit and not use in SFC Multilayer OAM and SFC IOAM, as both SFC 
>> Multilayer OAM and SFC IOAM are identified by the respective values 
>> for the NSH Next Protocol field (to be assigned by IANA), as well as 
>> so far no OAM-specific meta data TLV has been yet defined.
> 
> CMP: What is the “SFC Multilayer OAM”?
> CMP: The O-bit (reading RFC 8300) does not indicate if there is OAM 
> Metadata. It indicates an OAM packet.
> 
> 
> *"Joel M. Halpern" <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>>*
> 
>> As far as I can tell, if we deprecate the O-bit and rely on the next 
>> protocol field, we are saying that in practice (not by rule) NSH 
>> metadata can not be used for OAM.  That's fine with me as long as we 
>> agree on that.
> 
> CMP: I do not fully follow this. Can you explain the relationship of the 
> O-bit with Metadata?
> CMP: Here’s an example: RFC 8924 shows ICMP as Active OAM. The SFC next 
> protocol is IP, the IP next protocol is ICMP, the O-bit needs to be set.
> 
> CMP: Consider the following document, independent submission and in the 
> RFC Publication queue already:
> CMP: 
> https://datatracker.ietf.org/doc/draft-mymb-sfc-nsh-allocation-timestamp/ <https://datatracker.ietf.org/doc/draft-mymb-sfc-nsh-allocation-timestamp/>
> CMP: Is a Timestamp in Metadata an OAM element?
> 
> CMP: Consider this proposal 
> https://datatracker.ietf.org/doc/draft-mirsky-sfc-pmamm/ 
> <https://datatracker.ietf.org/doc/draft-mirsky-sfc-pmamm/>
> CMP: Where the base header borrows a bit for an OAM function.
> 
> CMP: Neither of those have any impact on the O-bit.
> 
> 
> *Greg Mirsky <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>>*
> 
>> I agree that, as we find SFC NSH now, no OAM metadata has been 
>> defined. It appears to me that deprecating the O bit does not affect 
>> any of the already defined mechanisms in the SFC NSH.
> 
> CMP: It actually does, see my example above.
> 
>> I think that if a new, for example, MD Type = 2 TLV that is used for 
>> any OAM functionality to be proposed in the future, deprecated the O 
>> bit would not prevent using such NSH TLV.
> 
> CMP: I agree with this — because there is no correlation between MD Type 
> field and O-bit as defined.
> 
> Best,
> 
> Carlos.
> 
> 
> 
>> 2/13/22 午後12:32、Gyan Mishra <hayabusagsm@gmail.com 
>> <mailto:hayabusagsm@gmail.com>>のメール:
>>
>> Hi Joel
>>
>> I am in agreement as well with what you have stated that once the O 
>> bit is deprecated that NSH metadata cannot be used for OAM and that we 
>> would have to now from that point forward rely on the next protocol 
>> field as we will be doing for SFC Multilayer and SFC IOAM drafts as 
>> well as will have backwards compatible with any already existing 
>> defined mechanisms in SFC NSH.
>>
>> I don’t see any issues or impact with moving forward.
>>
>> Kind Regards
>>
>> Gyan
>>
>> On Sun, Feb 13, 2022 at 12:04 PM Greg Mirsky <gregimirsky@gmail.com 
>> <mailto:gregimirsky@gmail.com>> wrote:
>>
>>     Hi Joel,
>>     I agree that, as we find SFC NSH now, no OAM metadata has been
>>     defined. It appears to me that deprecating the O bit does not
>>     affect any of the already defined mechanisms in the SFC NSH. I
>>     think that if a new, for example, MD Type = 2 TLV that is used for
>>     any OAM functionality to be proposed in the future, deprecated the
>>     O bit would not prevent using such NSH TLV.
>>     What do you think?
>>
>>     Regards,
>>     Greg
>>
>>     On Sun, Feb 13, 2022 at 6:55 AM Joel M. Halpern
>>     <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> wrote:
>>
>>         There is an implication of deprecating the O-bit that I would
>>         like to
>>         hear from more WG participants about.
>>
>>         As far as I can tell, if we deprecate the O-bit and rely on
>>         the next
>>         protocol field, we are saying that in practice (not by rule) NSH
>>         metadata can not be used for OAM.  That's fine with me as long
>>         as we
>>         agree on that.
>>
>>         Yours,
>>         Joel
>>
>>         On 2/13/2022 2:52 AM, Gyan Mishra wrote:
>>         >
>>         > Hi Jim, Joel & SFC WG,
>>         >
>>         > I agree that the RFC 8300 definition of O bit is incomplete
>>         and not
>>         > clear as to its intended use.
>>         >
>>         > That is a problem that I agree needs to be rectified.
>>         >
>>         > I understand that we need to get this resolved before we can
>>         progress
>>         > Multilayer SFC OAM draft-ietf-sfc-multi-layer-oam-18 and SFC
>>         IOAM.
>>         >
>>         > I agree that what makes sense to me as a path forward is to
>>         deprecate
>>         > the O bit and not use in SFC Multilayer OAM and SFC IOAM, as
>>         both SFC
>>         > Multilayer OAM and SFC IOAM are identified by the respective
>>         values for
>>         > the NSH Next Protocol field (to be assigned by IANA), as
>>         well as so far
>>         > no OAM-specific meta data TLV has been yet defined.
>>         >
>>         > So we have I believe solid solution and path forward and I
>>         support
>>         > deprecating the O bit.
>>         >
>>         > Kind Regards
>>         >
>>         > Gyan
>>         >
>>         > On Wed, Feb 2, 2022 at 5:42 PM Greg Mirsky
>>         <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>
>>         > <mailto:gregimirsky@gmail.com
>>         <mailto:gregimirsky@gmail.com>>> wrote:
>>         >
>>         >     Thank you, Jim and Joel, for guiding the SFC OAM work
>>         and pointing
>>         >     out the issue that must be addressed.
>>         >
>>         >     I've reviewed our SFC OAM documents and
>>         draft-ietf-sfc-nsh-tlv. As I
>>         >     understand these documents, the Active SFC OAM and IOAM are
>>         >     identified by the respective values for the NSH Next
>>         Protocol field
>>         >     (to be assigned by IANA). At the same time, so far no
>>         OAM-specific
>>         >     meta data TLV has been defined. Thus, it appears that
>>         one way
>>         >     forward could be to not involve the O bit in the active
>>         SFC OAM or
>>         >     IOAM altogether. In other words, to deprecate the NSH O bit.
>>         >
>>         >     I greatly appreciate your comments on the proposal to
>>         deprecate the
>>         >     NSH O bit.
>>         >
>>         >     Regards,
>>         >     Greg
>>         >
>>         >     On Wed, Feb 2, 2022 at 10:36 AM James Guichard
>>         >     <james.n.guichard@futurewei.com
>>         <mailto:james.n.guichard@futurewei.com>
>>         >     <mailto:james.n.guichard@futurewei.com
>>         <mailto:james.n.guichard@futurewei.com>>> wrote:
>>         >
>>         >         Hi WG:____
>>         >
>>         >         __ __
>>         >
>>         >         Having reviewed all of the OAM related documents in
>>         our WG, the
>>         >         chairs would like to provide a few comments to hopefully
>>         >         generate discussion and forward progress of this
>>         work:____
>>         >
>>         >         __ __
>>         >
>>         >         1) The chairs have reviewed the O bit definition in
>>         RFC 8300.
>>         >         That definition is at best open to interpretation
>>         and therefore
>>         >         incomplete.  For example, the clear intention is
>>         only to mark
>>         >         packets which are intended for SFC OAM at the SFC
>>         service
>>         >         layer.  But that is not what the current text says. 
>>         There is
>>         >         also, unfortunately, ambiguity as to what
>>         constitutes an OAM
>>         >         packet.  So it is reasonable for documents to update
>>         8300 to
>>         >         clarify the exact applicability and action for the
>>         O-bit.____
>>         >
>>         >         __ __
>>         >
>>         >         2) However, related to point 1), we can't have multiple
>>         >         documents updating the definition differently.  As
>>         such, the
>>         >         authors of the SFC iOAM draft and the SFC
>>         multi-layer-oam draft
>>         >         need to come together and figure out what the
>>         clarification is
>>         >         for the definition of that bit. We do not believe as
>>         chairs that
>>         >         either of these documents can move forward from the
>>         WG until
>>         >         such clarity has been reached. ____
>>         >
>>         >         __ __
>>         >
>>         >         3) Related to the SFC iOAM, we need a clear
>>         definition of iOAM.
>>         >         There seem to be differences between the definitions in
>>         >         published RFCs, the usage (which is not a
>>         definition) in the SFC
>>         >         draft, and the various ippm drafts.  Any such
>>         definition will
>>         >         need to be vetted with the ippm working group.____
>>         >
>>         >         __ __
>>         >
>>         >         Again, it would be good if members of the working
>>         group beyond
>>         >         the two author teams spoke up about their readings
>>         of the
>>         >         documents, and their understandings of what we need.____
>>         >
>>         >         __ __
>>         >
>>         >         Yours,____
>>         >
>>         >         Jim and Joel____
>>         >
>>         >         __ __
>>         >
>>         >         __ __
>>         >
>>         >         __ __
>>         >
>>         >         _______________________________________________
>>         >         sfc mailing list
>>         > sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
>>         <mailto:sfc@ietf.org>>
>>         > https://www.ietf.org/mailman/listinfo/sfc
>>         <https://www.ietf.org/mailman/listinfo/sfc>
>>         >         <https://www.ietf.org/mailman/listinfo/sfc
>>         <https://www.ietf.org/mailman/listinfo/sfc>>
>>         >
>>         >     _______________________________________________
>>         >     sfc mailing list
>>         > sfc@ietf.org <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
>>         <mailto:sfc@ietf.org>>
>>         > https://www.ietf.org/mailman/listinfo/sfc
>>         <https://www.ietf.org/mailman/listinfo/sfc>
>>         >     <https://www.ietf.org/mailman/listinfo/sfc
>>         <https://www.ietf.org/mailman/listinfo/sfc>>
>>         >
>>         > --
>>         >
>>         > <http://www.verizon.com/ <http://www.verizon.com/>>
>>         >
>>         > *Gyan Mishra*
>>         >
>>         > /Network Solutions A//rchitect /
>>         >
>>         > /Email gyan.s.mishra@verizon.com
>>         <mailto:gyan.s.mishra@verizon.com>
>>         <mailto:gyan.s.mishra@verizon.com
>>         <mailto:gyan.s.mishra@verizon.com>>//
>>         > /
>>         >
>>         > /M 301 502-1347
>>         >
>>         > /
>>         >
>>         >
>>
>> -- 
>>
>> <http://www.verizon.com/>
>>
>> *Gyan Mishra*
>> /Network Solutions A//rchitect /
>> /Email gyan.s.mishra@verizon.com <mailto:gyan.s.mishra@verizon.com>//
>> /
>> /M 301 502-1347
>>
>> /
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org <mailto:sfc@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sfc
> 
> 
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc