Re: [sfc] Progression of OAM work in the SFC WG - OAM Packet

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Mon, 14 February 2022 13:02 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 60DD93A0B72 for <sfc@ietfa.amsl.com>; Mon, 14 Feb 2022 05:02:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.895
X-Spam-Level:
X-Spam-Status: No, score=-11.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Z76g8qhC; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=NAY13Plk
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M-7ObEKslIA6 for <sfc@ietfa.amsl.com>; Mon, 14 Feb 2022 05:02:16 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E47B13A0B64 for <sfc@ietf.org>; Mon, 14 Feb 2022 05:02:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=71881; q=dns/txt; s=iport; t=1644843735; x=1646053335; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=UVE9PrBhf3ZG/ZH8CkP2XffUgghgp2QcnkQprsoObZU=; b=Z76g8qhCNNqL5IebbssN7RaDuorYciQlPL62VfImOW3FNxyW1SBgjm1L HO0KulVa3hLV330mvogBn/NLn3yL8jFdU02bWxtngpZCBjOxPJdq98gSW aHp9GuNDo4ZBTmDg0wHNZVOUiuZy7kGFxsDYC/NYw0sTpw3D31flH48TC 4=;
IronPort-PHdr: A9a23:SEKvwh2kYGBetedCsmDPr1BlVkEcU/3cMg0U788hjLRDOuSm8o/5NUPSrfNqkBfSXIrd5v4F7oies63pVWEap5rUtncEfc9AUhYfgpAQmAotSMeOFUz8KqvsaCo3VMRPXVNo5Te1K09QTc3/fFbV5Ha16G16Jw==
IronPort-Data: A9a23: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
IronPort-HdrOrdr: A9a23:t6W4yqFcLv0yx5B3pLqFS5HXdLJyesId70hD6qkvc31om52j+fxGws516fatskdvZJkh8erwX5VoMkmsi6KdgLNhfItKOTOHhILGFvAY0WKP+UyEJ8S6zJ8g6U4CSdk/NDSTNykBsS+S2mDReLxMrKjlgcKVbKXlvgpQpGpRGsddBnJCe36m+zpNNXB77PQCZf6hz/sCgwDlVWUcb8y9CHVAdfPEvcf3mJXvZgNDLwI76SGV5AnYq4LSIly95FMzQjlPybAt/SzuiAri/JiutPm911v1y3LT1ZJLg9Hso+EzRvBky/JlbwkEuDzYI7iJaIfy+gzdZ9vfsWrCpeO85yvI+f4Ds085MFvF+icFkDOQoQrGo0WSuWNwx0GT+/AQgFkBepZ8bUUzSGqF16NohqAP7Itbm22erJZZFhXGgWD04MXJTQhjkg6urWMlivN7tQ0SbWOPAIUh3rD30XklWqvoJhiKpbzP0dMeev309bJTaxeXfnrZtm5gzJilWWkyBA6PRgwHttaO2zZbkXhlxw9ArfZv0Eso5dY4Ud1J9u7EOqNnmPVHSdIXd7t0AKMETdGsAmLATBrQOCaZIEjhFqsAJ3XRwqSHr4kd9aWvYtgF3ZEykJPOXBdRsnMzYVvnDYmU0JhC4nn2MS6AtPTWu4ljDrRCy8nBrYvQQGS+oQoV4r6dSt0kc7rmZ8o=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0B1AADWHflh/5ldJa1XAxwBAQEBAQEHAQESAQEEBAEBggYHAQELAYFRKC4Hd1oTJDGESYNHA4RZYIUOgwIDgROJfYUqimqBLhSBEQNPBQsBAQENAQEqAQwKBAEBhAWBAAIXg0gCJTQJDgECBAEBARIBAQUBAQECAQYEgQkThWgNhkMBAQEDAQEQCAkdAQEsBAcBDwIBBgIHESABBgMCAgIfBgsUEQIEDgUbB4JiAYIOVwMuAQ6Sco82AYE6AoofeoExgQGCCAEBBgQEgUpBR4I7DQuCNwmBOgGDDYQcAQGBHoVpJxyBSUSBFSccgWZKBzA+giFCAQEDgScBARIBIBgKDBEJglE3gi6RLBoBFEYtFyYBAy8UDwEgAg0sIBYyAhUFIwMPCx4CCR8QkVoaFINHiU4/g0GJcpB0P0NrCoNGiwGILoUzgQKFeQUug3JEi1hahgCRH4cTjzeCR4pIg06Qb1aEIAIEAgQFAg4BAQaBYTxpcHAVOyoBgj4JNRMZD44gg3GFFIVKdAI2AgYBCgEBAwmMb10BAQ
X-IronPort-AV: E=Sophos;i="5.88,333,1635206400"; d="scan'208,217";a="986313106"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Feb 2022 13:02:13 +0000
Received: from mail.cisco.com (xbe-rcd-004.cisco.com [173.37.102.19]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 21ED2Drk021246 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 14 Feb 2022 13:02:13 GMT
Received: from xfe-rtp-004.cisco.com (64.101.210.234) by xbe-rcd-004.cisco.com (173.37.102.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Mon, 14 Feb 2022 07:02:12 -0600
Received: from xfe-aln-004.cisco.com (173.37.135.124) by xfe-rtp-004.cisco.com (64.101.210.234) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Mon, 14 Feb 2022 08:02:11 -0500
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-004.cisco.com (173.37.135.124) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Mon, 14 Feb 2022 07:02:11 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=nsjOdkaO3zyodFGqhbmU7q06BV5Cn//9efeO4ciI64lvuDltMLuYcYFREsofNvoBkPWhEn3/G9if2AXrnGAcW9cv1TYsEudOVLf0CdCBAXIsabSDOyUNgTNqZwgT02EWS/obrLriIxKZVhPOn/9Mb8pNu7AyUXi6t9jYzVG54cTDqD4sCqMGuDf/XQOLaW3gKF0iy9icH8r8ngnz270jmOYzU4b7afBzHN6iD3Gg0wGistDSGXsY/pHbJdlCYpjBDrjzZPLSc8Us65pRJxg8gVO8gzdKnzCW3uOIuX+Gi93mAnLBQRfQnuoTYCIVO6o3kQ00hpT5ejeNsd8CENNJig==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UVE9PrBhf3ZG/ZH8CkP2XffUgghgp2QcnkQprsoObZU=; b=awmEpTGxjD+RQlQXzVLQpka0nnMmFloQ9dif0IOMZEbZmgWWz4luIaMODwP7KwXdZo1keZWRzufPiIZ2oFA+k9Y4GLGsQ7RQyf1i7XsMIymI0UJnJFKRz+AJRnnuEf3Ly0yFze3An6M1EwaA8QefBvdf7ma8Hun1rzCnd4ywN2k0VxBUJH6cBRhN/anXankMYhwWM48ela+HZz4ipvy4SiCPfZXtnD6EZ14SkL8oUVoAENyq1VqNMCwHdFZ74xlAgRs3CBz4S0PPTQqyztaPNu3WMMARWhPpI1U/A8aUibbaFn6flPEgGnGXvGLl1tLU2fHhQ2GcpxLdsglNP/WCqg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UVE9PrBhf3ZG/ZH8CkP2XffUgghgp2QcnkQprsoObZU=; b=NAY13Plk/2jZwptWnycVYCFWqbhhqI1bwYK9ydJEOObeuCZaHeWYpJ0wdUAHaUyl2tnXW5/IqdUskpIoHC3NpFyghYRGm+XC0fLvtPbsithXsML3bE5TytZsuionAzFVWn19kmeHLm6VdKS/Mkf/mNUxbWEOuRcBtaAqfQjBipk=
Received: from DS7PR11MB6039.namprd11.prod.outlook.com (2603:10b6:8:76::6) by BN7PR11MB2865.namprd11.prod.outlook.com (2603:10b6:406:ac::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4975.11; Mon, 14 Feb 2022 13:02:09 +0000
Received: from DS7PR11MB6039.namprd11.prod.outlook.com ([fe80::e131:742a:954d:492c]) by DS7PR11MB6039.namprd11.prod.outlook.com ([fe80::e131:742a:954d:492c%6]) with mapi id 15.20.4975.012; Mon, 14 Feb 2022 13:02:09 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
CC: "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] Progression of OAM work in the SFC WG - OAM Packet
Thread-Index: AQHYIZs0zI0ukiw7l0yxCfkGbsuMUKyTAu+A
Date: Mon, 14 Feb 2022 13:02:09 +0000
Message-ID: <69B3DD8B-1A6D-4D07-B41E-A2958A117E33@cisco.com>
References: <MN2PR13MB4206A3B910C9CE55867DA10BD2279@MN2PR13MB4206.namprd13.prod.outlook.com> <CA+RyBmWZU-OL-9kb7byfumcGZ_Xktb7Yp=dRQe3QRdCcTwBZcw@mail.gmail.com> <CABNhwV1Fcb9fmh82LeUKTHO7BdYeWp4HyP9aQBGS+x6FEL=fLA@mail.gmail.com> <a47de7f9-bfa3-979a-0e49-1f1c52161d72@joelhalpern.com> <CA+RyBmVY6PBeQ7O_vhtKO4M7bnZhCAdoVzPZJsd9f0jyaEvTWg@mail.gmail.com> <CABNhwV0-nkH5tV13X-G--qf8u0yi9TGYgo2ee+N8PNosm=b1xg@mail.gmail.com> <3CDEE749-5A40-44FF-9E3A-8C8EBBA94849@cisco.com> <c525b8fe-f82b-d658-9999-c1b9a3630e86@joelhalpern.com>
In-Reply-To: <c525b8fe-f82b-d658-9999-c1b9a3630e86@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e4f4c79f-884d-4c38-0fa1-08d9efba3601
x-ms-traffictypediagnostic: BN7PR11MB2865:EE_
x-microsoft-antispam-prvs: <BN7PR11MB2865C28A698EF7719F7BD314C7339@BN7PR11MB2865.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6790;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DS7PR11MB6039.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(83380400001)(508600001)(966005)(86362001)(6486002)(8676002)(91956017)(76116006)(66446008)(64756008)(66476007)(36756003)(4326008)(66556008)(66946007)(71200400001)(8936002)(5660300002)(166002)(316002)(186003)(26005)(30864003)(6916009)(38100700002)(33656002)(122000001)(2906002)(2616005)(40140700001)(53546011)(6512007)(38070700005)(6506007)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_69B3DD8B1A6D4D07B41EA2958A117E33ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DS7PR11MB6039.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e4f4c79f-884d-4c38-0fa1-08d9efba3601
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2022 13:02:09.8318 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: GjiFlmMdu5PSNaoJ56/a5wZ9mqvSSbz0iymGfd3oLeC0ezZl0cQxyzGLiYfElVYpSDy6TN5tVHc+wHmNnDyC2Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR11MB2865
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.19, xbe-rcd-004.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/V1tRtHFuwuHF_Mr7Fdp8KeltK80>
Subject: Re: [sfc] Progression of OAM work in the SFC WG - OAM Packet
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Feb 2022 13:02:22 -0000

Joel,

Happy to.

No, that is not what I meant. I am not sure where (or why) you added the word “external”, but that was key to showing a disconnect (I might not have been clear and/or you might not have read correctly).

Let me try different way:

There is an I-D now, sfc-multi-layer-oam, that sends “SFC Active OAM" packets with a new SFC next protocol for a newly created protocol. In this case, the SFC next protocol is not expected to be used in user packets, at least for now (or people have not thought about that in hierarchical cases)

Imagine now that BFD or ICMP want to be used as an SFC Active OAM protocols, instead of the sfc-multi-layer-oam one. Those can be encapsulated in IP (even with a 127/8 destination). Using the O-bit set and SFC NP as IP is the RFC 8300 expected way. (I imagine creating a new SFC next protocol for “BFD-in-IP-used-in-SFC” so as to avoid an SFC NP expected on external packets would be an approach if there was no O-bit defined)

Best,

Carlos.

2/14/22 午前7:05、Joel M. Halpern <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>のメール:

Thank you for taking the time to provide a careful reply.

It appears, from your description of ICMP packets that your understanding of 8300 is that in SFC an external ICMP packet will get the O bit set in the NSH header.  Presumably, base on this, the SFF or SF are supposed to look through and notice this content?   (Otherwise, why set the bit?)  This seems an undesirable and expensive implications which other readers have not drawn from the RFC 8300 text.  (It also requires the encapsulating node to do extra checking to discover this case.)

Am I reading your expectation correctly?

Yours,
Joel

On 2/13/2022 11:06 PM, Carlos Pignataro (cpignata) wrote:
Replying to this specific email in the thread, only because it is the latest one at this point in time, but bundling comments from various places on the thread. Please find some follow-up comments and questions marked “CMP”, indicating the “From”, and organized chronologically:
*James N Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com> <mailto:james.n.guichard@futurewei.com>>:*
1) The chairs have reviewed the O bit definition in RFC 8300.  That definition is at best open to interpretation and therefore incomplete.  For example, the clear intention is only to mark packets which are intended for SFC OAM at the SFC service layer.  But that is not what the current text says.  There is also, unfortunately, ambiguity as to what constitutes an OAM packet.  So it is reasonable for documents to update 8300 to clarify the exact applicability and action for the O-bit.
CMP: It is unclear to me what exact issues the chairs are calling out. There are two issues mentioned:
CMP: 1. "But that is not what the current text says.” —> what does the text say precisely?  Can you point to the specific RFC 8300 text that is believed to be incomplete, and a detailed use case that showcases the potential issue? An extrapolated counter-example just to make a point: the text does not  say what days of the week OAM packets can be marked, yet there’s an expectation that they will work Mondays and Saturdays all the same — even holidays.
CMP: 2. What specifically is the ambiguity with what an OAM packet is? Please grep the RFC series for “oam packet”, it is not a new term.
CMP: Net-net, O-bit=1, OAM packet.
2) However, related to point 1), we can't have multiple documents updating the definition differently.  As such, the authors of the SFC iOAM draft and the SFC multi-layer-oam draft need to come together and figure out what the clarification is for the definition of that bit. We do not believe as chairs that either of these documents can move forward from the WG until such clarity has been reached.
CMP: If there is still believed to be an ambiguity or a clear opportunity for improving the definition, I agree with consolidating that update. I had suggested before that if such new text or real clarification is agreed, a separate document that only makes that O-bit clarification is the most clear and clean way to go. That doc should be a one-pager or less. I’d be happy to contribute to that minimal doc, if it is shown to be needed.
CMP: For completeness also, the "SFC multi-layer-oam” document has many outstanding issues besides the O-bit.
*Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com> <mailto:gregimirsky@gmail.com>>*
I've reviewed our SFC OAM documents and draft-ietf-sfc-nsh-tlv. As I understand these documents, the Active SFC OAM and IOAM are identified by the respective values for the NSH Next Protocol field (to be assigned by IANA).
CMP: There is a major issue with the sentence above. Active SFC OAM (as a category), as per RFC 8300, needs to be identified by setting the O-bit. No way around that based on RFC 8300. However, the text "the Active SFC OAM” creates confusion since it refer to a specific OAM protocol which has the same name as a the category as well. That name collision is quite unfortunate in my opinion.
At the same time, so far no OAM-specific meta data TLV has been defined. Thus, it appears that one way forward could be to not involve the O bit in the active SFC OAM or IOAM altogether. In other words, to deprecate the NSH O bit.
CMP: RFC 8924 already includes ICMP and BFD as example SFC Action OAM protocols. Those can be encapsulated in IP, in which the Next-Protocol indicates IP — and (as per RFC 8300) the O-bit is set to indicate an OAM packet.
CMP: The proposal of deprecating the O-bit breaks those SFC OAM protocols already included in an RFC.
CMP: That proposal of deprecating the O-bit also breaks Section 4.1 of IOAM.
CMP: This expired I-D yet implemented in open source uses the O-bit: https://www.ietf.org/archive/id/draft-penno-sfc-trace-03.txt <https://www.ietf.org/archive/id/draft-penno-sfc-trace-03.txt>
*Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com> <mailto:hayabusagsm@gmail.com>>*
I agree that what makes sense to me as a path forward is to deprecate the O bit and not use in SFC Multilayer OAM and SFC IOAM, as both SFC Multilayer OAM and SFC IOAM are identified by the respective values for the NSH Next Protocol field (to be assigned by IANA), as well as so far no OAM-specific meta data TLV has been yet defined.
CMP: What is the “SFC Multilayer OAM”?
CMP: The O-bit (reading RFC 8300) does not indicate if there is OAM Metadata. It indicates an OAM packet.
*"Joel M. Halpern" <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com> <mailto:jmh@joelhalpern.com>>*
As far as I can tell, if we deprecate the O-bit and rely on the next protocol field, we are saying that in practice (not by rule) NSH metadata can not be used for OAM.  That's fine with me as long as we agree on that.
CMP: I do not fully follow this. Can you explain the relationship of the O-bit with Metadata?
CMP: Here’s an example: RFC 8924 shows ICMP as Active OAM. The SFC next protocol is IP, the IP next protocol is ICMP, the O-bit needs to be set.
CMP: Consider the following document, independent submission and in the RFC Publication queue already:
CMP: https://datatracker.ietf.org/doc/draft-mymb-sfc-nsh-allocation-timestamp/ <https://datatracker.ietf.org/doc/draft-mymb-sfc-nsh-allocation-timestamp/>
CMP: Is a Timestamp in Metadata an OAM element?
CMP: Consider this proposal https://datatracker.ietf.org/doc/draft-mirsky-sfc-pmamm/ <https://datatracker.ietf.org/doc/draft-mirsky-sfc-pmamm/>
CMP: Where the base header borrows a bit for an OAM function.
CMP: Neither of those have any impact on the O-bit.
*Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com> <mailto:gregimirsky@gmail.com>>*
I agree that, as we find SFC NSH now, no OAM metadata has been defined. It appears to me that deprecating the O bit does not affect any of the already defined mechanisms in the SFC NSH.
CMP: It actually does, see my example above.
I think that if a new, for example, MD Type = 2 TLV that is used for any OAM functionality to be proposed in the future, deprecated the O bit would not prevent using such NSH TLV.
CMP: I agree with this — because there is no correlation between MD Type field and O-bit as defined.
Best,
Carlos.
2/13/22 午後12:32、Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com> <mailto:hayabusagsm@gmail.com>>のメール:

Hi Joel

I am in agreement as well with what you have stated that once the O bit is deprecated that NSH metadata cannot be used for OAM and that we would have to now from that point forward rely on the next protocol field as we will be doing for SFC Multilayer and SFC IOAM drafts as well as will have backwards compatible with any already existing defined mechanisms in SFC NSH.

I don’t see any issues or impact with moving forward.

Kind Regards

Gyan

On Sun, Feb 13, 2022 at 12:04 PM Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com> <mailto:gregimirsky@gmail.com>> wrote:

   Hi Joel,
   I agree that, as we find SFC NSH now, no OAM metadata has been
   defined. It appears to me that deprecating the O bit does not
   affect any of the already defined mechanisms in the SFC NSH. I
   think that if a new, for example, MD Type = 2 TLV that is used for
   any OAM functionality to be proposed in the future, deprecated the
   O bit would not prevent using such NSH TLV.
   What do you think?

   Regards,
   Greg

   On Sun, Feb 13, 2022 at 6:55 AM Joel M. Halpern
   <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com> <mailto:jmh@joelhalpern.com>> wrote:

       There is an implication of deprecating the O-bit that I would
       like to
       hear from more WG participants about.

       As far as I can tell, if we deprecate the O-bit and rely on
       the next
       protocol field, we are saying that in practice (not by rule) NSH
       metadata can not be used for OAM.  That's fine with me as long
       as we
       agree on that.

       Yours,
       Joel

       On 2/13/2022 2:52 AM, Gyan Mishra wrote:
       >
       > Hi Jim, Joel & SFC WG,
       >
       > I agree that the RFC 8300 definition of O bit is incomplete
       and not
       > clear as to its intended use.
       >
       > That is a problem that I agree needs to be rectified.
       >
       > I understand that we need to get this resolved before we can
       progress
       > Multilayer SFC OAM draft-ietf-sfc-multi-layer-oam-18 and SFC
       IOAM.
       >
       > I agree that what makes sense to me as a path forward is to
       deprecate
       > the O bit and not use in SFC Multilayer OAM and SFC IOAM, as
       both SFC
       > Multilayer OAM and SFC IOAM are identified by the respective
       values for
       > the NSH Next Protocol field (to be assigned by IANA), as
       well as so far
       > no OAM-specific meta data TLV has been yet defined.
       >
       > So we have I believe solid solution and path forward and I
       support
       > deprecating the O bit.
       >
       > Kind Regards
       >
       > Gyan
       >
       > On Wed, Feb 2, 2022 at 5:42 PM Greg Mirsky
       <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com> <mailto:gregimirsky@gmail.com>
       > <mailto:gregimirsky@gmail.com
       <mailto:gregimirsky@gmail.com>>> wrote:
       >
       >     Thank you, Jim and Joel, for guiding the SFC OAM work
       and pointing
       >     out the issue that must be addressed.
       >
       >     I've reviewed our SFC OAM documents and
       draft-ietf-sfc-nsh-tlv. As I
       >     understand these documents, the Active SFC OAM and IOAM are
       >     identified by the respective values for the NSH Next
       Protocol field
       >     (to be assigned by IANA). At the same time, so far no
       OAM-specific
       >     meta data TLV has been defined. Thus, it appears that
       one way
       >     forward could be to not involve the O bit in the active
       SFC OAM or
       >     IOAM altogether. In other words, to deprecate the NSH O bit.
       >
       >     I greatly appreciate your comments on the proposal to
       deprecate the
       >     NSH O bit.
       >
       >     Regards,
       >     Greg
       >
       >     On Wed, Feb 2, 2022 at 10:36 AM James Guichard
       >     <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>
       <mailto:james.n.guichard@futurewei.com>
       >     <mailto:james.n.guichard@futurewei.com
       <mailto:james.n.guichard@futurewei.com>>> wrote:
       >
       >         Hi WG:____
       >
       >         __ __
       >
       >         Having reviewed all of the OAM related documents in
       our WG, the
       >         chairs would like to provide a few comments to hopefully
       >         generate discussion and forward progress of this
       work:____
       >
       >         __ __
       >
       >         1) The chairs have reviewed the O bit definition in
       RFC 8300.
       >         That definition is at best open to interpretation
       and therefore
       >         incomplete.  For example, the clear intention is
       only to mark
       >         packets which are intended for SFC OAM at the SFC
       service
       >         layer.  But that is not what the current text says.         There is
       >         also, unfortunately, ambiguity as to what
       constitutes an OAM
       >         packet.  So it is reasonable for documents to update
       8300 to
       >         clarify the exact applicability and action for the
       O-bit.____
       >
       >         __ __
       >
       >         2) However, related to point 1), we can't have multiple
       >         documents updating the definition differently.  As
       such, the
       >         authors of the SFC iOAM draft and the SFC
       multi-layer-oam draft
       >         need to come together and figure out what the
       clarification is
       >         for the definition of that bit. We do not believe as
       chairs that
       >         either of these documents can move forward from the
       WG until
       >         such clarity has been reached. ____
       >
       >         __ __
       >
       >         3) Related to the SFC iOAM, we need a clear
       definition of iOAM.
       >         There seem to be differences between the definitions in
       >         published RFCs, the usage (which is not a
       definition) in the SFC
       >         draft, and the various ippm drafts.  Any such
       definition will
       >         need to be vetted with the ippm working group.____
       >
       >         __ __
       >
       >         Again, it would be good if members of the working
       group beyond
       >         the two author teams spoke up about their readings
       of the
       >         documents, and their understandings of what we need.____
       >
       >         __ __
       >
       >         Yours,____
       >
       >         Jim and Joel____
       >
       >         __ __
       >
       >         __ __
       >
       >         __ __
       >
       >         _______________________________________________
       >         sfc mailing list
       > sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
       <mailto:sfc@ietf.org>>
       > https://www.ietf.org/mailman/listinfo/sfc
       <https://www.ietf.org/mailman/listinfo/sfc>
       >         <https://www.ietf.org/mailman/listinfo/sfc
       <https://www.ietf.org/mailman/listinfo/sfc>>
       >
       >     _______________________________________________
       >     sfc mailing list
       > sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org> <mailto:sfc@ietf.org
       <mailto:sfc@ietf.org>>
       > https://www.ietf.org/mailman/listinfo/sfc
       <https://www.ietf.org/mailman/listinfo/sfc>
       >     <https://www.ietf.org/mailman/listinfo/sfc
       <https://www.ietf.org/mailman/listinfo/sfc>>
       >
       > --
       >
       > <http://www.verizon.com/ <http://www.verizon.com/>>
       >
       > *Gyan Mishra*
       >
       > /Network Solutions A//rchitect /
       >
       > /Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com>
       <mailto:gyan.s.mishra@verizon.com>
       <mailto:gyan.s.mishra@verizon.com
       <mailto:gyan.s.mishra@verizon.com>>//
       > /
       >
       > /M 301 502-1347
       >
       > /
       >
       >

--

<http://www.verizon.com/>

*Gyan Mishra*
/Network Solutions A//rchitect /
/Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com> <mailto:gyan.s.mishra@verizon.com>//
/
/M 301 502-1347

/

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc
_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc