Re: [sfc] WGLC for https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/

Shwetha Bhandari <shwetha.bhandari@thoughtspot.com> Mon, 04 April 2022 00:40 UTC

Return-Path: <shwetha.bhandari@thoughtspot.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4909C3A1DA0 for <sfc@ietfa.amsl.com>; Sun, 3 Apr 2022 17:40:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.506
X-Spam-Level:
X-Spam-Status: No, score=-1.506 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URI_HEX=0.1, URI_NOVOWEL=0.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=thoughtspot.com header.b=gqTcp30z; dkim=pass (2048-bit key) header.d=thoughtspot-com.20210112.gappssmtp.com header.b=8GS9Sz0G
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z0Q48qf_80R2 for <sfc@ietfa.amsl.com>; Sun, 3 Apr 2022 17:40:48 -0700 (PDT)
Received: from mx0a-0055fe01.pphosted.com (mx0a-0055fe01.pphosted.com [205.220.164.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 841013A1DA1 for <sfc@ietf.org>; Sun, 3 Apr 2022 17:40:46 -0700 (PDT)
Received: from pps.filterd (m0211451.ppops.net [127.0.0.1]) by mx0b-0055fe01.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 233LYbme029396 for <sfc@ietf.org>; Sun, 3 Apr 2022 17:40:46 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=thoughtspot.com; h=mime-version : references : in-reply-to : from : date : message-id : subject : to : cc : content-type; s=proofpoint; bh=djiQtFPQf4hfx+qDvgaibYfDAJz5KZoF5fKiGD8np5s=; b=gqTcp30ziglK/vzC8QijHdvKChJbg5Oh68IA9lZpFH142xQKz3PpGEg7kLiudxqzlkOr K0VckS5nQZc2ubi/4dk4aiQsXYIMD1ntWOU8LPdWM9JAKxYkfMIVY7KSrc4s8cR5jMWN dVGOFEQYX448bUfOMBJoq+RM9YM2Lf3KFOr3Ycy+7c5cuFzk7pWXGCw9aEEJH4zf2T21 sXPHF+OIgrotqSrfpygxU/r6L7vP+Lafrox+p9K/XDA5UAEZhlx/OuCv8t69khOwuS/D Fbbqqlaccahe81L9HICu/C7d6kWr4U6/Se+qChIZlmzqxPe2Bzto4xsVmuzs+CaLUKhl Zw==
Received: from mail-qv1-f69.google.com (mail-qv1-f69.google.com [209.85.219.69]) by mx0b-0055fe01.pphosted.com (PPS) with ESMTPS id 3f6kmm3x56-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for <sfc@ietf.org>; Sun, 03 Apr 2022 17:40:45 -0700
Received: by mail-qv1-f69.google.com with SMTP id m12-20020ad45dcc000000b00443d70cc310so1369640qvh.11 for <sfc@ietf.org>; Sun, 03 Apr 2022 17:40:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=thoughtspot-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=djiQtFPQf4hfx+qDvgaibYfDAJz5KZoF5fKiGD8np5s=; b=8GS9Sz0GoYSOgoMLHh9SUmwJ1SdvWQiRxYTkj291R+oID9dAM3yU40t3N7ialG2z4f VK5UzItKJ3qqS+f75rKdUUAONwoJakxwboNd5pjaJwiqZQUxwO+VtE4rVBfy6IR+mmQE Roo50V1UE5yIIQLr8LWDn5XArRKNKW6uTNKX8uT+mpJ+b9gXQfuzjMowTJsa3S3Bu5vk P1Nf/1Ldt3WQn8J2yNj17l1DbUSOv7vNV70ILdD7jDl93y6Rk6tFakWYPz6CTklTz2sI d9krY/faOhxqB0FCnTVn18hcU8qMuIRSzRwKVCTLDnZD5cQT7WDiznpeJSY76rZs5ouD ju7w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=djiQtFPQf4hfx+qDvgaibYfDAJz5KZoF5fKiGD8np5s=; b=WaqJEcZFu0voX7XkB9bjV4Zy2Qm091FNwPOK6nwbMjjQMCHev6nbE4eIJDUDeii0MX hlQ/4BfKVMcA6mDrmE2I5pTwzI1xjod/zzxszawK95P/0vYovKsrcomT7rs4N4x17kFv mhwgCSVYdxyHM0vbXmrFigKcVgAE6oPQZMyW+xQSyuKOEB72poYIZtVKT9gdrXNBj6bo Xy4w+pG+3/JAzgTRv5UBXxRK0m3yPCbJ8Oe4ZPnpa6JiQwfIw9yy/Yy4P3z8J9yE4023 8cj/DYfsnuhnBPYzwLrYvS7iTPUdNuT5pepS4vHpBgx2A1Nat783maErgv0Co1eGm+/6 D7Nw==
X-Gm-Message-State: AOAM531R5T32itIf7deOhMgaLXCjbkB6ArSgQI/2pYvYK5bBoAdfjO1U kPWt3hl+eKzDml6mmTM4RkbKeBl3TJg/7eFepFACIACGEhz2PagIQnGGfY0OcuZ+qAEy6Cwxxjo mOgosuGwtZJi5ng6UrZ0=
X-Received: by 2002:a05:622a:1496:b0:2e2:3188:9db0 with SMTP id t22-20020a05622a149600b002e231889db0mr15948239qtx.446.1649032844153; Sun, 03 Apr 2022 17:40:44 -0700 (PDT)
X-Google-Smtp-Source: ABdhPJybMj0or0EYk17TO0NSHRwz8qOOspx83ApQlpNTshhVyoX8I0xM5DB8iBfMkyhKzIJvMT609h5ngQgv8XRnTOw=
X-Received: by 2002:a05:622a:1496:b0:2e2:3188:9db0 with SMTP id t22-20020a05622a149600b002e231889db0mr15948222qtx.446.1649032843737; Sun, 03 Apr 2022 17:40:43 -0700 (PDT)
MIME-Version: 1.0
References: <MN2PR13MB4206C91446BA5FBBDA69E233D2FF9@MN2PR13MB4206.namprd13.prod.outlook.com> <CA+RyBmVSrdCaO77P4=1vZ2LmxtR65OmspN_wozyGPNwtM5Uv3A@mail.gmail.com> <CAMFZu3PaLQrHcBULzsxbdnTJyr-bVDVs1WpnFwLuSkR7DbntuQ@mail.gmail.com> <CA+RyBmWeUiTsA7-CvpXSBViB00Y-tmAuSr-P=Vf3vB61zfn6bg@mail.gmail.com> <CAMFZu3P45x9Mt5-MUpGO1Puqz57DPcGE4aBsPNxczW-pw9n=AA@mail.gmail.com> <MN2PR13MB42066C22CA66B0E1F0FC3FFFD2269@MN2PR13MB4206.namprd13.prod.outlook.com> <CAMFZu3NO6J-MM_a7TZm+wTzxbKzY5t0OkW8QNLk0673Fkr16RQ@mail.gmail.com> <CA+RyBmVVWdvLZdANV_whtcwwMKVfVpM8VL7BYMM7NTnmooUpcQ@mail.gmail.com> <CAMFZu3PEmrarcsp4tXQsx4eKvai8+UvzKSFxfcakX4LUAcayJA@mail.gmail.com> <MN2PR13MB420615DA403388EA0144A9C1D22F9@MN2PR13MB4206.namprd13.prod.outlook.com> <CAMFZu3MUmuBEDEzdafw2UHEvsTE+7sQ=E1kik5TuQ=_NznFF9w@mail.gmail.com> <CA+RyBmW=ZT0EUmSYYfZJjcapBZ5-pg93um5t287LreONLOVnJQ@mail.gmail.com>
In-Reply-To: <CA+RyBmW=ZT0EUmSYYfZJjcapBZ5-pg93um5t287LreONLOVnJQ@mail.gmail.com>
From: Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>
Date: Mon, 04 Apr 2022 06:10:30 +0530
Message-ID: <CAMFZu3NCCmj4u75taEzBiMmkMQ0YrmK5KsUToSOKfwX1yBxePA@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: James Guichard <james.n.guichard@futurewei.com>, Tal Mizrahi <tal.mizrahi.phd@gmail.com>, "Frank Brockners (fbrockne)" <fbrockne@cisco.com>, draft-ietf-sfc-ioam-nsh@ietf.org, sfc@ietf.org, sfc-chairs@ietf.org
Content-Type: multipart/alternative; boundary="000000000000dfd53505dbc9605c"
X-Proofpoint-GUID: HwR6uKY1Nx8hcopE2qUsQc_FRphKQCHD
X-Proofpoint-ORIG-GUID: HwR6uKY1Nx8hcopE2qUsQc_FRphKQCHD
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.850,Hydra:6.0.425,FMLib:17.11.64.514 definitions=2022-04-03_08,2022-03-31_01,2022-02-23_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 mlxscore=0 phishscore=0 adultscore=0 lowpriorityscore=0 suspectscore=0 malwarescore=0 impostorscore=0 mlxlogscore=999 bulkscore=5 clxscore=1015 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2204040001
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/Oruu7T0KEohQ4B2xC7SuhJVYchQ>
Subject: Re: [sfc] WGLC for https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Apr 2022 00:40:56 -0000

Hi Greg,

Thanks for the feedback. From the discussion and Jim's feedback
 "My only point was that in the case of IOAM the O-bit seems to be obsolete
as you use the next protocol field rather than the context headers. It
seems to me that the definition of the O-bit should be that if set then the
context headers are used to obtain the OAM instructions."
Which makes sense. The O-bit does not influence IOAM handling as it is
carried as a next protocol.
Hence the consideration section on O-bit is removed in the new revision.
What do you think?

Thanks
Shwetha

On Mon, Apr 4, 2022, 1:41 AM Greg Mirsky <gregimirsky@gmail.com> wrote:

> Hi Shwetha,
> thank you for your kind consideration of my comments and for
> thoroughly addressing those in the new version. I've noticed that you've
> decided to remove the discussion of the O bit in the NSH from the draft
> altogether. I think that it might be helpful to a reader if the document
> includes a short clarification and the reference to
> draft-ietf-sfc-oam-packet
> <https://urldefense.com/v3/__https://www.ietf.org/id/draft-ietf-sfc-oam-packet-00.html__;!!MZ3Fw45to5uY!JYVtUwScRxFf7rDoRMpiv7YwbRTcaHXzsGIxr9eVEi_p_xSQUWAjDvFy_UhGEQbl8530VaLM0Tj7k5Wzu6YfUSVditWyZ_8$> like
> the following:
>
> For the IOAM functionality is SFC NSH described in this document the O bit
> in NSH MUST be set clear according to [I-D.ietf-sfc-oam-packet].
>
>
> Regards,
> Greg
>
> On Sun, Apr 3, 2022 at 1:06 AM Shwetha Bhandari <
> shwetha.bhandari@thoughtspot.com> wrote:
>
>> Hi Jim, Greg,
>>
>> We have addressed the additional comments received in this discussion.
>> Can you please take a look :
>> https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-ioam-nsh-08.txt
>> <https://urldefense.com/v3/__https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-ioam-nsh-08.txt__;!!MZ3Fw45to5uY!JYVtUwScRxFf7rDoRMpiv7YwbRTcaHXzsGIxr9eVEi_p_xSQUWAjDvFy_UhGEQbl8530VaLM0Tj7k5Wzu6YfUSVd4KRpUCA$>
>>
>> Thanks,
>> Shwetha
>>
>> On Thu, Feb 10, 2022 at 11:27 PM James Guichard <
>> james.n.guichard@futurewei.com> wrote:
>>
>>> Hi Shwetha,
>>>
>>>
>>>
>>> My only point was that in the case of IOAM the O-bit seems to be
>>> obsolete as you use the next protocol field rather than the context
>>> headers. It seems to me that the definition of the O-bit should be that if
>>> set then the context headers are used to obtain the OAM instructions.
>>> Currently that is not what 8300 says. As I said in my previous emails I
>>> would really like to hear the WGs opinion on what to do with the O-bit and
>>> we certainly need to reconcile the various documents to be following the
>>> same standard.
>>>
>>>
>>>
>>> Jim
>>>
>>>
>>>
>>> *From:* Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>
>>> *Sent:* Wednesday, February 9, 2022 9:57 AM
>>> *To:* Greg Mirsky <gregimirsky@gmail.com>
>>> *Cc:* James Guichard <james.n.guichard@futurewei.com>;
>>> draft-ietf-sfc-ioam-nsh@ietf.org; sfc@ietf.org; sfc-chairs@ietf.org
>>> *Subject:* Re: [sfc] WGLC for
>>> https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
>>> <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/__;!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW_8pjQ1iQ$>
>>>
>>>
>>>
>>> Hi Jim,
>>>
>>>
>>>
>>> On the O bit handling, are you suggesting that the O-bit for IOAM, that
>>> is carried as a next protocol following NSH header, is not applicable?
>>> Would removing the section on O-bit considerations resolve your concern?
>>>
>>>
>>>
>>> Hi Greg,
>>>
>>>
>>>
>>> >I have one more question. As the draft now mentions the option of using
>>> IOAM Direct Export to collect the IOAM data, it might be helpful reflecting
>>> that in the figure on p.2. I think that the caption "IOAM Option and Data
>>> Space" might be reworded to "IOAM Option and Optional Data Space".
>>>
>>> What are your thoughts?
>>>
>>> Yes, that will make it accurate. I will update the diagram and publish a
>>> new version.
>>>
>>>
>>>
>>> >I cannot find the text in the draft suggesting that an SFF that does
>>> not support IOAM may forward the packet with the NSH Next Protocol field
>>> equal to IOAM protocol identifier. Could you help me find it?
>>>
>>> Can you suggest text to help with this ? This would be a generic problem
>>> for NSH implementation when a next protocol is set to a value it does not
>>> understand. What should is recommended action in this situation?
>>>
>>>
>>>
>>>
>>>
>>> > For example, if the Loopback IOAM flag is set, the node is required to
>>> send a copy of the packet back to the IOAM encapsulating node. It is not
>>> clear to me how an SFF learns the identity of the IOAM encapsulating node
>>> and how it encapsulates the loopbacked packet. Can you help me find how it
>>> is supposed to work in the NSH?
>>>
>>>
>>> https://datatracker.ietf.org/doc/html/draft-ietf-ippm-ioam-flags#section-4.2
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fhtml*2Fdraft-ietf-ippm-ioam-flags*23section-4.2&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631120774*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=zcOpC0Gzzi8xzhttBqWaeaU3pMd0KDo*2FZYdGsEPG0uE*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW_cH_6kAg$>
>>> :
>>>
>>>   A Loopback flag that is set indicates to the transit nodes processing
>>>
>>>    this option that they are to create a copy of the received packet and
>>>
>>>    send the copy back to the source of the packet.
>>>
>>> Given this is explained in the flag handling, do you see a need to
>>> define it again in NSH? IMHO the explanation of flag handling is quite
>>> generic for any packet based transport.
>>>
>>> Please share your thoughts and text suggestions to improve the draft for
>>> flag handling if it requires clarification.
>>>
>>>
>>>
>>>
>>>
>>> Thanks,
>>>
>>> Shwetha
>>>
>>>
>>>
>>> On Thu, Feb 3, 2022 at 6:48 AM Greg Mirsky <gregimirsky@gmail.com>
>>> wrote:
>>>
>>> Hi Shwetha,
>>>
>>> I have one more question. As the draft now mentions the option of using
>>> IOAM Direct Export to collect the IOAM data, it might be helpful reflecting
>>> that in the figure on p.2. I think that the caption "IOAM Option and Data
>>> Space" might be reworded to "IOAM Option and Optional Data Space".
>>>
>>> What are your thoughts?
>>>
>>>
>>>
>>> Regards,
>>>
>>> Greg
>>>
>>>
>>>
>>> On Wed, Feb 2, 2022 at 7:29 AM Shwetha Bhandari <
>>> shwetha.bhandari@thoughtspot.com> wrote:
>>>
>>> Hi Jim, Greg,
>>>
>>>
>>>
>>> Thanks for the follow up.
>>>
>>> 1) On O-bit: I am a bit confused about the O-bit feedback. Are you
>>> suggesting that it should not be a consideration for IOAM as it is handled
>>> as a next protocol and not as NSH context headers?
>>>
>>> What should a SFC element handle a packet containing IOAM as next header
>>> and does not implement IOAM and hence does not understand IOAM? I think
>>> O-bit helps in such situations to help such elements decide to drop or
>>> forward without processing the IOAM header.
>>>
>>> Let me know if that is not the case and if simply not considering O-bit
>>> in the context of IOAM is what you would recommend.
>>>
>>> 2) Active or Loopback flags
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fdraft-ietf-ippm-ioam-flags*2F__*3B!!MZ3Fw45to5uY!eu05ObEvXtnVX2OXFzl0g16vk36xSqTyjMReG_i6BavtG_ru2AnjQSjXHiZ_Ve3sBjJRuHMBUg*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=DvpZHlkn0PNCP5*2BzFQzGayutZGPUMxJXtPll6nR8Ay8*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW_4eduZWg$> -
>>> there is nothing specific for NSH on how the flags are to be handled.  The
>>> IOAM specific fields are to be handled as recommended by the respective
>>> IOAM drafts. Do you see any specific NSH considerations to be documented
>>> for IOAM fields?
>>>
>>>
>>>
>>> Thanks,
>>>
>>> Shwetha
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> On Tue, Feb 1, 2022 at 4:29 PM James Guichard <
>>> james.n.guichard@futurewei.com> wrote:
>>>
>>> Hi Shwetha & Greg,
>>>
>>>
>>>
>>> Thank you for the update.
>>>
>>>
>>>
>>> I still believe however that more work is necessary to reconcile how SFC
>>> OAM is supposed to work. RFC 8300 says:
>>>
>>>
>>>
>>>    O bit:  Setting this bit indicates an OAM packet (see [RFC6291
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fhtml*2Frfc6291__*3B!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJs06rKUNw*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=4wRcNgj93har9TlylAfX*2BtbW24VCqfneSZd0rD9CRzs*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW8b5uw-Yg$>
>>> ]).
>>>
>>>       The actual format and processing of SFC OAM packets is outside the
>>>
>>>       scope of this specification (for example, see [SFC-OAM-FRAMEWORK
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fhtml*2Frfc8300*ref-SFC-OAM-FRAMEWORK__*3BIw!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJsisioAug*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=A6fkAO8CwRJeW5tLLEpU0GhZrqsBOm7nUiE1QiMxwVQ*3D&reserved=0__;JSUlJSUlJSUlJSUqJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW_b7k_TUA$>
>>> ]
>>>
>>>       for one approach).
>>>
>>>
>>>
>>>       The O bit MUST be set for OAM packets and MUST NOT be set for
>>>
>>>       non-OAM packets.
>>>
>>>
>>>
>>> If we look at RFC6291 it simply describes what OAM is supposed to mean
>>> and this is independent from SFC. The SFC-OAM-Framework (now RFC 8924) in
>>> section 6.3 says:
>>>
>>>
>>>
>>>    The Next Protocol field in the NSH header may be used to indicate
>>> what OAM function is intended
>>>
>>>    or what toolset is used.  Any other overlay encapsulations used at
>>> the service layer must have a
>>>
>>>    similar way to indicate the intended OAM function.
>>>
>>>
>>>
>>> So my reading of this is that if you take 8300 together with the
>>> framework then 1. The O-bit MUST be set for OAM packets, and 2. The Next
>>> Protocol field may or may not be used to indicate which OAM function is to
>>> be applied. From this I can determine that iOAM has taken the approach of
>>> using the next protocol field to indicate how to process the OAM packet and
>>> does NOT use the NSH context headers in any way shape or form. This seems
>>> consistent with the current definitions of the O-bit from RFC 8300 and
>>> processing guidelines from RFC 8924.
>>>
>>>
>>>
>>> However, your document says:
>>>
>>>
>>>
>>> *4.1
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fhtml*2Fdraft-ietf-sfc-ioam-nsh-07*section-4.1__*3BIw!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJtXMLMQUw*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=w3hANsqqvVWz5oeH*2BLfPwS*2Fxwh2hNERJwCw5zwdrAMA*3D&reserved=0__;JSUlJSUlJSUlJSUqJSUlJSUlJSUlJSUlJSUlJSU!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW9Fp7_C8w$>.
>>> IOAM and the use of the NSH O-bit*
>>>
>>>
>>>
>>>    [RFC8300] defines an "O bit" for OAM packets.  Per [RFC8300
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fhtml*2Frfc8300__*3B!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJuMIrqXAQ*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=a*2BVevL6noSzqRzdWg6dscjiqevlLbxcgEdTEmfJAY7U*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW92fQLzlQ$>]
>>> the O
>>>
>>>    bit must be set for OAM packets and must not be set for non-OAM
>>>
>>>    packets.  Packets with IOAM data included MUST follow this
>>>
>>>    definition, i.e. the O bit MUST NOT be set for regular customer
>>>
>>>    traffic which also carries IOAM data and the O bit MUST be set for
>>>
>>>    OAM packets which carry only IOAM data without any regular data
>>>
>>>    payload.
>>>
>>>
>>>
>>> This text basically says that if the packet is customer traffic and
>>> happens to carry iOAM data then it is NOT an OAM packet.  What am I
>>> missing, customer traffic or not, both carry iOAM data so how are they
>>> different within an SFC domain?
>>>
>>>
>>>
>>> In addition to the above I will note that there is still a conflict with
>>> Greg’s draft namely this text from section 4:
>>>
>>>    *  O bit set and the "Next Protocol" value does not match the value
>>>
>>>       Active SFC OAM (TBA1), defined in Section 10.1
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fhtml*2Fdraft-ietf-sfc-multi-layer-oam*section-10.1__*3BIw!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJv1ohYIeg*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=HTLx6e4sQCvsjXZKxG1GA8XPvdswsQKEMIEABitkprw*3D&reserved=0__;JSUlJSUlJSUlJSUqJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW-EwTZ2zw$>
>>> :
>>>
>>>
>>>
>>>          - An SFC NSH Context Header(s) contain an OAM processing
>>>
>>>          instructions or data.
>>>
>>>
>>>
>>>          - The "Next Protocol" field determines the type of the payload.
>>>
>>>
>>>
>>> The above text suggests to me that if the O-bit is set and the next
>>> protocol is not active SFC OAM then it is **required** that OAM data
>>> will be in the NSH context headers (which is not the case for iOAM) and the
>>> next protocol will indicate what follows the NSH header. While iOAM does
>>> follow the NSH header as indicated by the next protocol there is still an
>>> expectation that OAM is also carried in the NSH context headers. This seems
>>> to be in conflict with RFC 8300 AND RFC 8924.
>>>
>>>
>>>
>>> This of course is just my reading of the text and I would like to hear
>>> yours and other folks thoughts.
>>>
>>>
>>>
>>> Jim
>>>
>>>
>>>
>>> *From:* Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>
>>> *Sent:* Monday, January 31, 2022 11:25 PM
>>> *To:* Greg Mirsky <gregimirsky@gmail.com>
>>> *Cc:* James Guichard <james.n.guichard@futurewei.com>;
>>> draft-ietf-sfc-ioam-nsh@ietf.org; sfc@ietf.org; sfc-chairs@ietf.org
>>> *Subject:* Re: [sfc] WGLC for
>>> https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fdraft-ietf-sfc-ioam-nsh*2F__*3B!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJu3416GCQ*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=NKz8*2Fm*2Fh7WXjK0OP8NF4j5cQ*2FYgSrSMULRmDt*2FkX*2B10*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJQ!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW8EWrHtpA$>
>>>
>>>
>>>
>>> Hi Greg,
>>>
>>>
>>>
>>> Sorry for the late action on this.
>>> https://datatracker.ietf.org/doc/html/draft-ietf-sfc-ioam-nsh-07
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fnam11.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fhtml*2Fdraft-ietf-sfc-ioam-nsh-07*26data*3D04*7C01*7Cjames.n.guichard*40futurewei.com*7Caf9cde32be65486e459d08d9e53ac90c*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C1*7C637792862928234181*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*26sdata*3Dpl23JSzuzl5p2F8vooPyxVcUnWRdcWx*2F26MRFfJAIh4*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSU!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJvEbkwM5w*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=dpoyXLu*2F9fGVSgLtewdI7wNfSPdrkhs7FtBdD3Aq7*2B0*3D&reserved=0__;JSUlJSUlJSUlJSUqKioqKiolJSoqKioqKioqKioqKiUlKiolJSUlJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW9PuM1neA$>
>>> has been now posted with the edits per this discussion.
>>>
>>>
>>>
>>> Hi Jim,
>>>
>>>
>>>
>>> After Greg's review please let us know if the changes are good to
>>> progress the draft to the next step.
>>>
>>>
>>>
>>> Thanks,
>>>
>>> Shwetha
>>>
>>>
>>>
>>> On Wed, Oct 27, 2021 at 7:31 PM Greg Mirsky <gregimirsky@gmail.com>
>>> wrote:
>>>
>>> Hi Shwetha,
>>>
>>> thank you for the detailed response to my comments. Please feel free to
>>> share any updates you're considering for the next version. I'll be glad to
>>> work together on these.
>>>
>>> I have several follow-up notes in-lined below under the GIM>> tag.
>>>
>>>
>>>
>>> Regards,
>>>
>>> Greg
>>>
>>>
>>>
>>> On Tue, Oct 26, 2021 at 6:51 PM Shwetha Bhandari <
>>> shwetha.bhandari@thoughtspot.com> wrote:
>>>
>>> Hi Greg,
>>>
>>>
>>>
>>> Sorry for the very late reply. Please find responses to your comments
>>> inline @Shwetha:
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> On Wed, Sep 8, 2021 at 3:30 AM Greg Mirsky <gregimirsky@gmail.com>
>>> wrote:
>>>
>>> Dear Authors and All,
>>>
>>> I've read the current version of the draft and have some comments I'd
>>> like to share with you. I much appreciate your thoughts on where this work
>>> should go considering developments in other IETF WGs. Please find my notes
>>> and questions below:
>>>
>>>    - It is stated in the Abstract that:
>>>
>>>    In-situ Operations, Administration, and Maintenance (IOAM) records
>>>    operational and telemetry information in the packet while the packet
>>>    traverses a path between two points in the network.
>>>
>>> But that is the case only for the pre-allocated and incremental trace
>>> option types. The Direct Export option
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fnam11.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fdraft-ietf-ippm-ioam-direct-export*2F__*3B!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKE0jphubQ*24*26data*3D04*7C01*7Cjames.n.guichard*40futurewei.com*7Caf9cde32be65486e459d08d9e53ac90c*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C1*7C637792862928234181*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*26sdata*3Di7sTr0MtC5qfzx3twOKSpbW8LkQJzsAJBxF*2FZPLUwKc*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJt0mRguJg*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=yVGpJY1y6dud5c44HOsptPjqEuXdNUa1DMzjAelvU5c*3D&reserved=0__;JSUlJSUlJSUlJSUqKioqKioqKioqKioqJSUqKioqKioqKioqKiolJSoqJSUlJSUlJSUlJSUlJSUlJSU!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW-BwxdRIg$>
>>> does not write telemetry data into the data packet itself but export
>>> telemetry information in a specially constructed packet.
>>>
>>> And as we are talking about different IOAM trace options, the
>>> question of the scope of this document seems appropriate. There is a
>>> WGLC on two IOAM documents
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fnam11.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fmailarchive.ietf.org*2Farch*2Fmsg*2Fippm*2FA0OcGQ5LlNjnjfRVp_iUTMYMrcs*2F__*3B!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKHOndSFRg*24*26data*3D04*7C01*7Cjames.n.guichard*40futurewei.com*7Caf9cde32be65486e459d08d9e53ac90c*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C1*7C637792862928234181*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*26sdata*3DcHtvsgDl*2FuzSv70oS9LN5l2o5nEIwiKHDZ1sfiFJCrE*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSU!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJu2SsX7cg*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=Y*2BwywuTSj4SpugrjmDTquAY0MZWKoT43CMjsyha*2FnOc*3D&reserved=0__;JSUlJSUlJSUlJSUqKioqKioqKioqKioqKiolJSoqKioqKioqKioqKiUlKiolJSUlJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW-FRADPxg$>
>>> active through September 15th at the IPPM WG. I believe that it would be
>>> beneficial if we had a single document that describes the applicability of
>>> IOAM in all its functionality defined by documents in IPPM WG. Of course,
>>> that cannot be a moving target as that would not be helpful. But since the
>>> IPPM WG discusses the progress of two IOAM documents, it could be a great
>>> time to address the applicability of the Direct Export trace type
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fnam11.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fdraft-ietf-ippm-ioam-direct-export*2F__*3B!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKE0jphubQ*24*26data*3D04*7C01*7Cjames.n.guichard*40futurewei.com*7Caf9cde32be65486e459d08d9e53ac90c*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C1*7C637792862928234181*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*26sdata*3Di7sTr0MtC5qfzx3twOKSpbW8LkQJzsAJBxF*2FZPLUwKc*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJt0mRguJg*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=yVGpJY1y6dud5c44HOsptPjqEuXdNUa1DMzjAelvU5c*3D&reserved=0__;JSUlJSUlJSUlJSUqKioqKioqKioqKioqJSUqKioqKioqKioqKiolJSoqJSUlJSUlJSUlJSUlJSUlJSU!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW-BwxdRIg$>
>>> and Loopback and Active flags defined in draft-ietf-ippm-ioam-flags
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fnam11.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fdraft-ietf-ippm-ioam-flags*2F__*3B!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKHO7lReVw*24*26data*3D04*7C01*7Cjames.n.guichard*40futurewei.com*7Caf9cde32be65486e459d08d9e53ac90c*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C1*7C637792862928234181*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*26sdata*3D1kqtcu3xjl1C7ytQ*2BoaKdiQN96rQt94e1S2ElC0nD3M*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJt8NqRRKg*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=zzcnXlewWKrtEDv4BmsNNk4pvDlMKNKvPzBZ2dZJm5k*3D&reserved=0__;JSUlJSUlJSUlJSUqKioqKioqKioqKioqJSUqKioqKioqKioqKiolJSoqJSUlJSUlJSUlJSUlJSUlJSU!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW-gOuTqwg$>.
>>> It would be concerning to have more than one SFC document describing the
>>> applicability of the generic IOAM mechanisms
>>>
>>>
>>>
>>> Shwetha> This is a fair point. We will revise the  draft with text in
>>> the abstract and Section 3 IOAM-Type to be updated to include the usage
>>> of trace and DEX options.  The encapsulation of IOAM options within NSH
>>> itself in its current form already supports all the IOAM Option Type
>>> defined both from draft-ietf-ippm-ioam-data and draft-ietf-ippm-ioam-direct-export
>>> along with the flags supported within the options. Hence the
>>> IOAM-data-field definitions in the draft will remain unchanged.
>>>
>>> GIM>> I agree that the definitions of the IOAM data-fields are invariant
>>> in various data plane encapsulations. You likely follow the discussion of
>>> the IAOM Direct Export and IOAM flags on the IPPM WG list. I think that for
>>> SFC NSH, IOAM Direct Export could be as simple as "use the local policy".
>>> The applicability of the Loopback and Active flags seems to require
>>> detailed explanation by SFP actors.
>>>
>>>
>>>
>>>
>>>
>>>
>>>    - The location of the IOAM header in the SFC NSH-encapsulated packet
>>>    is defined in Section 3:
>>>
>>>    IOAM-Data-Fields are carried in NSH
>>>
>>>    using a next protocol header which follows the NSH MD context
>>>
>>>    headers.
>>>
>>> I've checked RFC 8300 but couldn't find it defines the Next Protocol
>>> header. Also, it appears that NSH Context headers are optional. Hence my
>>> question. Is the presence of an NSH Context header required when using
>>> IOAM? Could you clarify which mechanism is used to identify the payload of
>>> an SFC NSH-encapsulated packet as IOAM?
>>>
>>> Shwetha> We will reword it, it is not Next Protocol header but using
>>> IOAM as a Next Protocol as described in Section 4.1 and requested in IANA
>>> section. Following is the proposed text to align with the RFC 8300
>>> reference to context headers following base header and service path header:
>>>
>>> "The NSH is defined in [RFC8300].  IOAM-Data-Fields are carried in
>>> NSH using a next protocol to identify IOAM data fields that follows NSH
>>> context headers."
>>>
>>> GIM>> I think that RFC 8300 views data following Context Headers as NSH
>>> payload, not being "in NSH".
>>>
>>>
>>>    - If I understand the format of the IOAM header defined in Section 3
>>>    correctly, the header's length is limited by 1020 octets, while the
>>>    effective length containing IOAM options and data - 1016 octets. Is that
>>>    correct? What is the recommended technique of collecting IOAM data that
>>>    exceeds that limit?
>>>
>>> Shwetha > IOAM options inherently support specifying the size limits at
>>> the node that added the IOAM options. While operationalizing the solution
>>> the data types included and number of nodes expected to be adding the data
>>> should be selected. This is covered in deployment
>>> considerations draft-brockners-opsawg-ioam-deployment.
>>>
>>>
>>>    - In Section 4.1, I've found the text reflecting the history of the
>>>    discussion about how to carry the IOAM header using NSH encapsulation. As
>>>    the text has no normative value, I suggest moving it into an Appendix.
>>>
>>> Shwetha > Agreed, revised draft will have this section moved to
>>> Appendix.
>>>
>>> GIM>> Thank you.
>>>
>>>
>>>    - I find the rules of handling the O-bit in NSH listed in Section
>>>    4.2 inconsistent and confusing. The IOAM header is not part of NSH
>>>    encapsulation but is a part of the payload. But in one case, when user data
>>>    follows it, the O-bit must not be set as. If there's no user data after the
>>>    IOAM header, then the O-bit must be set. But from the perspective of NSH
>>>    encapsulation, it includes specially constructed data added for the sole
>>>    purpose of collecting OAM/telemetry information. Then, why, in one case,
>>>    the O-bit is cleared and in the other set if, in both cases, the
>>>    NSH-encapsulated packet is used to perform the OAM function?
>>>
>>> Shwetha > The reason for not setting the O-bit for packets that contains
>>> actual user data is because RFC 8300 has " SF/SFF/SFC Proxy/Classifier
>>> implementations that do not support
>>>
>>>       SFC OAM procedures SHOULD discard packets with O bit set". It will be undesirable to discard packets with O-bit set that carry user data as IOAM can be inserted insitu.
>>>
>>> For synthetic traffic created for OAM along with IOAM-data-fields in NSH following the NSH OAM function with 0-bit set is desirable.
>>>
>>>  GIM>> This is an interesting situation. I agree that there could be an
>>> SFC element not supporting "SFC OAM procedures" (not clear what these are).
>>> By the same token, would such SFC element support IOAM, be capable of
>>> processing IOAM without adverse impact to user data? I am not certain and
>>> it seems that it might be better to recommend that NSH packets with IOAM be
>>> dropped by an SFP element if it does not support "SFC OAM". What are your
>>> thoughts?
>>>
>>>
>>>
>>>
>>>
>>> Thanks,
>>>
>>> Shwetha
>>>
>>> I much appreciate your consideration of my comments and questions and
>>> looking forward to your feedback.
>>>
>>>
>>>
>>> Regards,
>>>
>>> Greg
>>>
>>>
>>>
>>> On Wed, Aug 18, 2021 at 5:32 AM James Guichard <
>>> james.n.guichard@futurewei.com> wrote:
>>>
>>> Dear WG:
>>>
>>>
>>>
>>> This email starts a 2 week Working Group Last Call for
>>> draft-ietf-sfc-ioam-nsh [1].
>>>
>>>
>>>
>>> Please read this document if you haven’t read the most recent version
>>> and send your comments to the SFC WG list no later than September 1st
>>> 2021.
>>>
>>>
>>>
>>> If you are raising a point which you expect will be specifically debated
>>> on the mailing list, consider using a specific email/thread for this point.
>>>
>>>
>>>
>>> Lastly, if you are an author or contributor please response to indicate
>>> whether you know of any undisclosed IPR related to this document.
>>>
>>>
>>>
>>> Thanks!
>>>
>>>
>>>
>>> Jim & Joel
>>>
>>>
>>>
>>> [1] https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fnam11.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fdatatracker.ietf.org*2Fdoc*2Fdraft-ietf-sfc-ioam-nsh*2F__*3B!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKHdTiRE6A*24*26data*3D04*7C01*7Cjames.n.guichard*40futurewei.com*7Caf9cde32be65486e459d08d9e53ac90c*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C1*7C637792862928234181*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*26sdata*3D9uDdhw0ViwBtWvn52V8UZ2G77lRnSye2Ols5z3U8QwQ*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSU!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJv33kGkLw*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=S6sx7MrrVkzKepVgj45q*2F2KPZzBMyOFnol*2BMfgRQ730*3D&reserved=0__;JSUlJSUlJSUlJSUqKioqKioqKioqKioqJSUqKioqKioqKioqKiolJSolJSUlJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW-FOmuSHA$>
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sfc
>>> <https://urldefense.com/v3/__https://nam11.safelinks.protection.outlook.com/?url=https*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fnam11.safelinks.protection.outlook.com*2F*3Furl*3Dhttps*3A*2F*2Furldefense.com*2Fv3*2F__https*3A*2F*2Fwww.ietf.org*2Fmailman*2Flistinfo*2Fsfc__*3B!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKEKMsIVaA*24*26data*3D04*7C01*7Cjames.n.guichard*40futurewei.com*7Caf9cde32be65486e459d08d9e53ac90c*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C1*7C637792862928234181*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*26sdata*3DLrdp7ipXNWqDvp3mWkIQWF*2FJoClfmd4G3TlaH2kB550*3D*26reserved*3D0__*3BJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUlJSUl!!MZ3Fw45to5uY!bzL7Vb_jHltGMCbCwne2rywfzpGjZW4o3fVr4clCr4Ir10KydDyJy5gHA8obfbMABJv0WsQtHA*24&data=04*7C01*7Cjames.n.guichard*40futurewei.com*7Ca5db82494c32402334fc08d9ebdc83cf*7C0fee8ff2a3b240189c753a1d5591fedc*7C1*7C0*7C637800154631277005*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000&sdata=Xj4fU0JctSsPl6a36R*2Bp9N4RkQ*2Bs8m4V7s9Qm2HHIVw*3D&reserved=0__;JSUlJSUlJSUlJSUqKioqKioqKioqKioqJSUqKioqKioqKioqKiolJSoqJSUlJSUlJSUlJSUlJSUlJSUlJQ!!MZ3Fw45to5uY!f5SSgs9VAH1xxjFWgJMfr5ZlZH93z6GJlXoOgCmY8AVbjdeh2YlaUz632nE-HqDItW8h731QiA$>
>>>
>>>