Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT)

wei.yuehua@zte.com.cn Fri, 03 December 2021 09:31 UTC

Return-Path: <wei.yuehua@zte.com.cn>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D583C3A1543; Fri, 3 Dec 2021 01:31:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, CTE_8BIT_MISMATCH=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZZ01OEfemURD; Fri, 3 Dec 2021 01:31:09 -0800 (PST)
Received: from mxde.zte.com.cn (mxde.zte.com.cn [209.9.37.26]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B5953A1542; Fri, 3 Dec 2021 01:31:08 -0800 (PST)
Received: from mse-eu.zte.com.cn (unknown [10.35.13.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxde.zte.com.cn (FangMail) with ESMTPS id 4J56y75hCXzB905t; Fri, 3 Dec 2021 17:30:55 +0800 (CST)
Received: from dgapp01.zte.com.cn ([10.35.13.16]) by mse-eu.zte.com.cn with SMTP id 1B39ZpSQ006460; Fri, 3 Dec 2021 17:35:51 +0800 (GMT-8) (envelope-from wei.yuehua@zte.com.cn)
Received: from mapi (dgapp01[null]) by mapi (Zmail) with MAPI id mid1; Fri, 3 Dec 2021 17:30:53 +0800 (CST)
Date: Fri, 03 Dec 2021 17:30:53 +0800
X-Zmail-TransId: 2af961a9e3cd92753be0
X-Mailer: Zmail v1.0
Message-ID: <202112031730532332374@zte.com.cn>
Mime-Version: 1.0
From: wei.yuehua@zte.com.cn
To: noreply@ietf.org, martin.vigoureux@nokia.com
Cc: iesg@ietf.org, draft-ietf-sfc-nsh-tlv@ietf.org, sfc-chairs@ietf.org, sfc@ietf.org, gregimirsky@gmail.com
Content-Type: text/plain; charset="UTF-8"
X-MAIL: mse-eu.zte.com.cn 1B39ZpSQ006460
X-Fangmail-Gw-Spam-Type: 0
X-FangMail-Miltered: at 10-35-8-63 with ID 61A9E3CF.001 by FangMail milter!
X-FangMail-Envelope: 1638523855/4J56y75hCXzB905t/61A9E3CF.001/10.35.13.51/[10.35.13.51]/mse-eu.zte.com.cn/<wei.yuehua@zte.com.cn>
X-Fangmail-Anti-Spam-Filtered: true
X-Fangmail-MID-QID: 61A9E3CF.001/4J56y75hCXzB905t
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/RBcIJoqh-qrVe1Zy6qVmJFS4U7o>
Subject: Re: [sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT)
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Dec 2021 09:31:14 -0000

Dear Ben,
Thank you. please see the commet resolution inline with Yuehua>>

To Martin,  I really appreciate if you could provide comments to Yuehua-2 and Yuehau-6. 

Best Regards,
Yuehua Wei
ZTE Corporation
------------------原始邮件------------------
发件人:BenjaminKadukviaDatatracker
收件人:The IESG;
抄送人:draft-ietf-sfc-nsh-tlv@ietf.org;sfc-chairs@ietf.org;sfc@ietf.org;gregimirsky@gmail.com;
日 期 :2021年11月30日 02:59
主 题 :[sfc] Benjamin Kaduk's Discuss on draft-ietf-sfc-nsh-tlv-09: (with DISCUSS and COMMENT)
Benjamin Kaduk has entered the following ballot position for
draft-ietf-sfc-nsh-tlv-09: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/blog/handling-iesg-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-tlv/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

(1) RFC 8300 is pretty clear that "Metadata privacy and security
considerations are a matter for the documents that define metadata
format."  Some of the metadata context headers defined in this document
clearly have privacy considerations that need to be documented (e.g.,
policy ID and source/destination group serve to concretely identify
flows that are related in some way), though some may not have much that
needs documenting (e.g., the forwarding context metadata seems to just
be extracting out information that is already present in the packet
being wrapped).  Regardless, we need to have some discussion of the
privacy and security considerations of the new metadata context headers,
even if that is just "no new considerations" for some of them.

Yuehua-1>>Thank you, I update the section to ver10 per you, Stig and John's comments.  please take a look and provide further comments

(2) I think we need to discuss the Flow ID context header further.  Is
it intended to just be a container to hold a flow identifier already
present in the contained packet (such as the IPv6 Flow Label or MPLS
Entropy Label that are called out), or can it also be used to apply a
new flow identifier at the SFC layer?

The named examples of a flow ID are both 20 bits long; if that is an
exhaustive listing, shouldn't we update the figure accordingly (to
include Length=3, four leading bits of padding, and a trailing byte of
padding)?  If that is not an exhaustive listing and longer flow
identifiers are expected, how do we know what length of flow identifier
is being conveyed?

Yuehua-2>>You raised a good question. I prefer to add Context Type (CT) to distinguish different flow IDs. I'd appreciate your advice.

(3) If we are to allow for specifying the "logical grouping of source and/or
destination objects" in §4.6 (emphasis on "and/or"), but the context
header always conveys both a source group and dest group field, do we
need to reserve a dedicated value for "no group information specified"?

Yuehua-3>>Very good observation. Shall we state that if there is   "no group information specified" for the source or dest field, the field MUST be sent as zero and ignored on receipt

----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Section 1

This document does not address metadata usage, updating/chaining of
metadata, or other SFP functions.  Those topics are described in
[RFC8300].

I'm not entirely sure what is meant by "chaining of metadata" (unless
it's just a synonym for "updating of metadata"?), and having reviewed
all 18 instances of "chain" and 88 instances of "metadata" in RFC 8300,
I am not sure which part you're intending to refer to by it.  Could you
please point to a more specific part of RFC 8300 (at least in this email
thread for now, not necessarily in a document update)?

Yuehua-4>> RFC8300 doesn't use “chain”to discribe multiple metadata.
it mentions "If multiple mandatory-to-process Context Headers are required for a   given SFP" and "If multiple instances of the same metadata are included in an NSH   packet" in RFC8300 section 2.5.1
Further comments are welcome


Section 4.1

I suggest putting a context (forgive the pun) indicator in the figure
legends, e.g., "Figure 4: Forwarding Context - 2 (QinQ)".  The
information is already available elsewhere, but having it in the caption
helps focus the reader on the important/relevant part of the figure.

Yuehua-5>> Accepted, will update to ver10

Section 4.3

It might be interesting to say something about when the SPI itself
suffices to identify the ingress node vs. when this metadata context
header is needed.

Node ID: Represents an opaque value of the ingress network node
ID.  The structure and semantics of this field are deployment
specific.  For example, Node ID may be a 4 bytes IPv4 address Node
ID, or a 16 bytes IPv6 address Node ID, or a 6 bytes MAC address,
or 8 bytes MAC address (EUI-64), etc,.

There seems to be some dissonance between saying this field is "an
opaque value" and also saying that it might be an IP or MAC address.  In
the vein of Francesca's Discuss point, I don't think we can have
interoperability if the NSH implementation is expected to process this
as IP/MAC address information (as opposed to just an opaque identifier).

Yuehua-6>> it has relation to 

Section 8.2

URLs for [GROUPBASEDPOLICY] and [GROUPPOLICY] would be helpful.
Yuehua-7>> Accepted, will fix the problem to ver10


_______________________________________________
sfc mailing list
sfc@ietf.org
https://www.ietf.org/mailman/listinfo/sfc