Re: [sfc] [ippm] WGLC for https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/

Greg Mirsky <gregimirsky@gmail.com> Tue, 03 May 2022 21:31 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F158C1594A4; Tue, 3 May 2022 14:31:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E-pjydcrsZ9N; Tue, 3 May 2022 14:31:51 -0700 (PDT)
Received: from mail-lj1-x233.google.com (mail-lj1-x233.google.com [IPv6:2a00:1450:4864:20::233]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8F7AC14F743; Tue, 3 May 2022 14:31:50 -0700 (PDT)
Received: by mail-lj1-x233.google.com with SMTP id l19so23592904ljb.7; Tue, 03 May 2022 14:31:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=nz/scVfKPhd8OMA7C9Vc1KChd4al39kbKvAgxR2vk0E=; b=fTqqMlcY+ffegEDOJb0rY8huYp6z+RN/5XZ3FfV1fQIvKo2MNH354j+OnbB89g1r85 Tzt2BQ3/+GVB1mdc5zNiQRdBQgzAbenobqDYQWMNfCf/Fjxhd03rOs8SsbZDC5/d9U5B i1TPy6h0uaDH4axe2ttsv+F9oer3SwlbRuSKJuGH3UHIATzPEvf37CLiOjyIC8j7e1JW kmjoLV3wN1FzeOpMUjnuC2ldAwaDkHYGkuVSFZvSrCsKTKitu9suwR4ohNLd9dkPmWET +6woH6SpOm/rD1lRRF2OookBkZ7qiIaaz5JKV+3WZEGdC4DqZHvErDqW4Izqhc3ZQDKc CoEw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=nz/scVfKPhd8OMA7C9Vc1KChd4al39kbKvAgxR2vk0E=; b=yF3QG5C1Ia/bnGT5UdfRfDog1H0YL2veFl9P1VsEJMAEbW00goODR4/vRV0BTomdaY giUoGg2oMLdcRY4dvHbEi78zD4LQugL4hWakD4wl0w7nX6aZOpCQVPtaT+lUnSl23OK6 rz1t7u6DJre7ShNSB9zYSx8Qa5H6NLRCNVevlz9NLq0CCgL3LHUXCZaH0536zR8gqAsH Q3xD3egmhZcF24tqJGeR376F2zDBcYB4x2rixrc/rG3lpVtzky+8drp8/h5Oj5yOypWx UOm59p3WoxtMPYv2GUemJY3PyoxL0E74gKlLM+88OclMxMNNS3tmI4cLHsqGcWIn+QTc 2M9w==
X-Gm-Message-State: AOAM533O7GnAwsRajO99d02bRKX0ELXndnv7DJtU0+lVSkPSxbq8WfTL AwEvFgoLfQ51NwSAdD2BpFcFyDD8y2cvwURVf88=
X-Google-Smtp-Source: ABdhPJy24sYop0Qm9+Og7NouEfxLQc0pkH4R88cR8THjVHykrflkEC2Kfx/s0smOxiNSI6yf7IJLQjt0EfI7Kqy52qI=
X-Received: by 2002:a2e:9c03:0:b0:24a:fe64:2c12 with SMTP id s3-20020a2e9c03000000b0024afe642c12mr10957544lji.101.1651613508325; Tue, 03 May 2022 14:31:48 -0700 (PDT)
MIME-Version: 1.0
References: <MN2PR13MB4206C91446BA5FBBDA69E233D2FF9@MN2PR13MB4206.namprd13.prod.outlook.com> <CAMFZu3NCCmj4u75taEzBiMmkMQ0YrmK5KsUToSOKfwX1yBxePA@mail.gmail.com> <26916_1649050778_624A849A_26916_245_1_aa5a0049026247d9980f4ebbc8c5ac0b@orange.com> <CY4PR11MB1672FCF27DA2A4822C6E1B40DAED9@CY4PR11MB1672.namprd11.prod.outlook.com> <11111_1649774342_62558F05_11111_493_4_a734de5265ca498bbabf9805a6eaf91d@orange.com> <CAMFZu3N03E-nWYJNik91e+X=gr3s2TVF03ZCM8i02ru4_Q82og@mail.gmail.com> <CA+RyBmWUZcUN2jnpUuyhTmkNpwvh=2prBZDGinWe2v-b3n8+MQ@mail.gmail.com> <CAMFZu3N5+GdFk13oWbi8F1qhgRNsKpSFwza61SG2oeMW9TvaLQ@mail.gmail.com> <525_1649935673_62580539_525_487_2_d0a4949b3d9c4424a0261012c7ce6188@orange.com> <CA+RyBmX3MdqVX5=hEsO+9SMbpXw+enwnm_qb4+-6smqbsTPPwg@mail.gmail.com> <CAMFZu3NZBgKXHrktn04LbwW33S+j+kGG5hx2A+1+jJ8aasCRag@mail.gmail.com> <14665_1651047374_6268FBCD_14665_484_6_addb2a5f712d4307a463d0582cc0a8a0@orange.com> <CAMFZu3O-vEAnrBE6rhuFh_POPD5E2i_bHvdBx=GUjRKxk3AOYw@mail.gmail.com> <3dba81e6-3a42-3643-dc98-a750891d47f5@joelhalpern.com>
In-Reply-To: <3dba81e6-3a42-3643-dc98-a750891d47f5@joelhalpern.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 03 May 2022 14:31:36 -0700
Message-ID: <CA+RyBmU+o5spc8M_54Voe+4E_A2M+Q2oE6LyJgSN4+=MCtVrcg@mail.gmail.com>
To: Joel Halpern <jmh@joelhalpern.com>
Cc: Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>, Med Boucadair <mohamed.boucadair@orange.com>, James Guichard <james.n.guichard@futurewei.com>, "sfc@ietf.org" <sfc@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000078547805de223c7f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/U6wuNsK1QBvPOBg7Fjl14I3YSzk>
Subject: Re: [sfc] [ippm] WGLC for https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 May 2022 21:31:54 -0000

Hi Joel,
thank you for highlighting this question, I've missed it.

As we've discussed earlier, several IOAM trace options have been defined:

   - pre-allocated
   - incremental
   - edge-to-edge
   - proof-of-transit
   - direct export
   - hybrid two-step

I cannot find a scenario when using more than one IOAM trace option that
could be beneficial, and useful for an operator. I think that if there is
no use case, then the restricting number of IOAM trace options used is
reasonable and helps implementors in developing interoperable
implementations.

Regards,
Greg

On Mon, May 2, 2022 at 2:42 PM Joel Halpern <jmh@joelhalpern.com> wrote:

> (Sorry, catching up on some emails I missed.)
>
> If we want to allow multiple iOAM headers (up to the WG) then I think the
> document needs to be clear on the meaning.  If there are multiple are all
> supposed to be processed, just the top one until something removes it, a
> random one of the receivers choice?  (Yes, that last is unlikely.)
>
> Yours,
>
> Joel
> On 4/27/2022 4:44 AM, Shwetha Bhandari wrote:
>
> Hi Med,
>
> Thanks for the confirmation and quick review.
>
> On,
>
>> This means the new requested TBD_IOAM value will also be a valid next
>> protocol. However, I wonder whether IOAM in IOAM in NSH is really something
>> you want to have. If not, I suggest the text is updated to exclude it from
>> the allowed value in the above excerpt.
>
> Per earlier discussion in this thread, quoting Frank's mail here for reference:
>
> In addition, I don’t think that draft-ietf-sfc-ioam-nsh would be the
>> appropriate place to discuss and restrict deployment options. E.g., I’m not
>> sure why we’d want to restrict a deployment to using a single IOAM header
>> only. E.g., one could think of using different headers for different
>> namespaces or groups of namespaces for operational reasons. IMHO, such a
>> discussion – if we really need it - would belong into
>> draft-ietf-ippm-ioam-deployment, rather than into a draft that defines the
>> encap of IOAM into NSH.
>
> I think the text on Next Protocol should be as is. We should not add
> restrictions on number of IOAM headers that could be added to the packet.
>
> Thanks,
> Shwetha
>
>
>
>
> On Wed, Apr 27, 2022 at 1:46 PM <mohamed.boucadair@orange.com> wrote:
>
>> Hi Shwetha, all,
>>
>>
>>
>> The changes look great. Thanks.
>>
>>
>>
>> There is one specific point not addressed in previous replies. This is
>> related to this text:
>>
>>
>>
>>       Next Protocol:  8-bit unsigned integer that determines the type of
>>
>>          header following IOAM.  The semantics of this field are
>>
>>          identical to the Next Protocol field in [RFC8300].
>>
>>
>>
>> This means the new requested TBD_IOAM value will also be a valid next protocol. However, I wonder whether IOAM in IOAM in NSH is really something you want to have. If not, I suggest the text is updated to exclude it from the allowed value in the above excerpt.
>>
>>
>>
>> Other than that, I think that the draft is ready to move forward.
>>
>>
>>
>> Cheers,
>>
>> Med
>>
>>
>>
>> *De :* Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>
>> *Envoyé :* mercredi 27 avril 2022 10:06
>> *À :* James Guichard <james.n.guichard@futurewei.com>;
>> sfc-chairs@ietf.org
>> *Cc :* BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>; Frank
>> Brockners (fbrockne) <fbrockne=40cisco.com@dmarc.ietf.org>; sfc@ietf.org;
>> ippm@ietf.org; Tal Mizrahi <tal.mizrahi.phd@gmail.com>;
>> draft-ietf-sfc-ioam-nsh@ietf.org; Greg Mirsky <gregimirsky@gmail.com>
>> *Objet :* Re: [sfc] WGLC for
>> https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
>> <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/__;!!MZ3Fw45to5uY!NGDq-VFOnDYhCxrwRIz1KbT5hb_RKKqKigks-nyqK1RKq5UgpwytWb7clzmlN3o0X0XBWL0KnE3aQfL7wrrx5ZezQN_YdhHpnETuWA$>
>>
>>
>>
>> Dear SFC chairs,
>>
>>
>>
>> A new version of the draft I-D.ietf-sfc-ioam-nsh has been submitted per
>> the discussion in this thread.
>>
>> https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-ioam-nsh-09
>> <https://urldefense.com/v3/__https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-ioam-nsh-09__;!!MZ3Fw45to5uY!NGDq-VFOnDYhCxrwRIz1KbT5hb_RKKqKigks-nyqK1RKq5UgpwytWb7clzmlN3o0X0XBWL0KnE3aQfL7wrrx5ZezQN_YdhFd29kDew$>
>>
>>
>> Can we please progress this draft to IESG if there are no further
>> comments?
>>
>>
>>
>> Thanks,
>>
>> Shwetha
>>
>>
>>
>> On Thu, Apr 14, 2022 at 6:41 PM Greg Mirsky <gregimirsky@gmail.com>
>> wrote:
>>
>> Hi Shwetha,
>>
>> thank you for the proposed resolution. I agree with Med, direct normative
>> reference to I-D.ietf-sfc-oam-packet seems like the logical conclusion of
>> our discussion of the use of the NSH O bit. Please note that we're
>> referring to I-D.ietf-sfc-oam-packet in the Active SFC OAM draft, e.g.,:
>>
>> The O bit in NSH MUST be set, according to [I-D.ietf-sfc-oam-packet].
>>
>>
>>
>> Regards,
>>
>> Greg
>>
>>
>>
>> On Thu, Apr 14, 2022 at 4:27 AM <mohamed.boucadair@orange.com> wrote:
>>
>> Hi Shwetha,
>>
>>
>>
>> I prefer we go for an explicit reference to I-D.ietf-sfc-oam-packet
>> rather than “any update to RFC8300”. This is consistent with the usage in
>> the other OAM draft.
>>
>>
>>
>> Thank you.
>>
>>
>>
>> Cheers,
>>
>> Med
>>
>>
>>
>> *De :* Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>
>> *Envoyé :* jeudi 14 avril 2022 12:06
>> *À :* Greg Mirsky <gregimirsky@gmail.com>
>> *Cc :* BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com>; Frank
>> Brockners (fbrockne) <fbrockne=40cisco.com@dmarc.ietf.org>;
>> sfc-chairs@ietf.org; sfc@ietf.org; ippm@ietf.org; James Guichard <
>> james.n.guichard@futurewei.com>; Tal Mizrahi <tal.mizrahi.phd@gmail.com>;
>> draft-ietf-sfc-ioam-nsh@ietf.org
>> *Objet :* Re: [sfc] WGLC for
>> https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
>> <https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/__;!!MZ3Fw45to5uY!LWQuxxxKpUum5gUoK44-znjehj2YRtlGMOATxfRVSc-7JOrPsk4BA4iP0oLQE4d0rObPhOCG_1iiipywftwMIMOEWh8lJI4$>
>>
>>
>>
>> Hi Med, Greg,
>>
>>
>>
>> How about this text :
>>
>>
>>
>> “The O-bit MUST be handled following the rules in and any updates
>> to [RFC8300] ."
>>
>>
>>
>> Given that I-D.ietf-sfc-oam-packet  will update RF8300 and there could
>> be others in future?
>>
>>
>>
>> Thanks,
>>
>> Shwetha
>>
>>
>>
>> On Tue, Apr 12, 2022 at 9:24 PM Greg Mirsky <gregimirsky@gmail.com>
>> wrote:
>>
>> Hi Shwetha,
>>
>> I believe that the text you've quoted is helpful. I would suggest
>> changing references from [RFC8300] to [I-D.ietf-sfc-oam-packet] throughout
>> that paragraph.
>>
>>
>>
>> Regards,
>>
>> Greg
>>
>>
>>
>> On Tue, Apr 12, 2022 at 7:56 AM Shwetha Bhandari <
>> shwetha.bhandari@thoughtspot.com> wrote:
>>
>> Med,
>>
>>
>>
>> Thanks for the details: this is exactly what we had before the latest
>> revision:
>>
>> *4.2 <https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/draft-ietf-sfc-ioam-nsh-06*section-4.2__;Iw!!MZ3Fw45to5uY!NBsrzhHEf0Y_-Sindy74K4QDA6EWJjx35STSH-UxEi3eYIX0GVli9Sn1azrOPJVcI2qUzWfezK_1D2RpyFB_FOIpJPfzrvI$>.  IOAM and the use of the NSH O-bit*
>>
>>
>>
>>    [RFC8300] defines an "O bit" for OAM packets.  Per [RFC8300 <https://urldefense.com/v3/__https:/datatracker.ietf.org/doc/html/rfc8300__;!!MZ3Fw45to5uY!NBsrzhHEf0Y_-Sindy74K4QDA6EWJjx35STSH-UxEi3eYIX0GVli9Sn1azrOPJVcI2qUzWfezK_1D2RpyFB_FOIpEB5AbbE$>] the O
>>
>>    bit must be set for OAM packets and must not be set for non-OAM
>>
>>    packets.  Packets with IOAM data included MUST follow this
>>
>>    definition, i.e. the O bit MUST NOT be set for regular customer
>>
>>    traffic which also carries IOAM data and the O bit MUST be set for
>>
>>    OAM packets which carry only IOAM data without any regular data
>>
>>    payload.
>>
>>
>>
>> This was removed as per the discussion in this thread. Please check
>> https://mailarchive.ietf.org/arch/msg/sfc/srMit5zE8UseNOhxknAw_dqvj6M/
>> <https://urldefense.com/v3/__https:/mailarchive.ietf.org/arch/msg/sfc/srMit5zE8UseNOhxknAw_dqvj6M/__;!!MZ3Fw45to5uY!NBsrzhHEf0Y_-Sindy74K4QDA6EWJjx35STSH-UxEi3eYIX0GVli9Sn1azrOPJVcI2qUzWfezK_1D2RpyFB_FOIp-CeLfeA$>
>>
>> It looks like we are going in a loop here. This definition of SFC OAM
>> packet to include the OAM data that comes in inner packets via the next
>> protocol header chain is introduced in draft-ietf-sfc-oam-packet to update
>> the RFC8300.
>>
>> Jim, What are you thoughts on this? Should we reintroduce the above text ?
>>
>> Thanks,
>> Shwetha
>>
>>
>>
>> _________________________________________________________________________________________________________________________
>>
>>
>>
>> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>>
>> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>>
>> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>>
>> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>>
>>
>>
>> This message and its attachments may contain confidential or privileged information that may be protected by law;
>>
>> they should not be distributed, used or copied without authorisation.
>>
>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>>
>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>>
>> Thank you.
>>
>> _________________________________________________________________________________________________________________________
>>
>> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
>> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
>> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
>> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>>
>> This message and its attachments may contain confidential or privileged information that may be protected by law;
>> they should not be distributed, used or copied without authorisation.
>> If you have received this email in error, please notify the sender and delete this message and its attachments.
>> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
>> Thank you.
>>
>> _______________________________________________
> ippm mailing list
> ippm@ietf.org
> https://www.ietf.org/mailman/listinfo/ippm
>