Re: [sfc] Progression of OAM work in the SFC WG

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Mon, 14 February 2022 15:06 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56C2C3A1007 for <sfc@ietfa.amsl.com>; Mon, 14 Feb 2022 07:06:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.484
X-Spam-Level:
X-Spam-Status: No, score=-9.484 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=GcSlgwUn; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=dSCqTvyr
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jlcKceSCPwgL for <sfc@ietfa.amsl.com>; Mon, 14 Feb 2022 07:06:14 -0800 (PST)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F05F3A1003 for <sfc@ietf.org>; Mon, 14 Feb 2022 07:06:14 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=92833; q=dns/txt; s=iport; t=1644851173; x=1646060773; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=aVIW/CSc4LlLB9GA1q9toNlHGgjtbHWnyNrXh77SkuY=; b=GcSlgwUnPGt2sQAvUZ6c6atkblrfHE52HTxKoGkQvKJVLT1aEDSBhgFO x0jYxNnRnP3Ck15GTahf38DxatCOEdsPdUD92IaDBonZhzEEZvavLjnF2 M3dhiwNrH6cEVzS/X8cGvP7GTFoYfO2o6BttVqD1SM3kNuH4X0hJ9qPsZ w=;
IronPort-PHdr: A9a23:rV+sTBIUVTG/rjgVgtmcuWEyDhhOgF28FgIW659yjbVIf+zj+pn5J0XQ6L1ri0OBRoTU7f9Iyo+0+6DtUGAN+9CN5XYFdpEfWxoMk85DmQsmDYaMAlH6K/i/aSs8EYxCWVZp8mv9P1JSHZP1ZkbZpTu56jtBcig=
IronPort-Data: A9a23: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
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IronPort-AV: E=Sophos;i="5.88,333,1635206400"; d="scan'208,217";a="726008885"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Feb 2022 15:06:10 +0000
Received: from mail.cisco.com (xbe-aln-004.cisco.com [173.36.7.19]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 21EF69P7018236 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 14 Feb 2022 15:06:09 GMT
Received: from xfe-aln-005.cisco.com (173.37.135.125) by xbe-aln-004.cisco.com (173.36.7.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Mon, 14 Feb 2022 09:06:09 -0600
Received: from xfe-rtp-002.cisco.com (64.101.210.232) by xfe-aln-005.cisco.com (173.37.135.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Mon, 14 Feb 2022 09:06:09 -0600
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-002.cisco.com (64.101.210.232) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Mon, 14 Feb 2022 10:06:08 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=PZngvigxHiqSDi4OyoReL0oRibqhhEA6Rh7LI4xEKdTL7fmUSXJcN8f9TL673ZzhoxdC/ezr7Jy90X92sZPpeFdmC6wJlqk+KgGfPTZbJZQy9nImwyPXiOdNpptJYOjSG3SKIyDYdV4lzf6batWq+gyyO9UryajeZn1u6KsVUPhD/Komxde6h86+/N+fYGIvQuxdp+Lif/5Ci80kuO8d1CTsUnt+Nil/KkjJ9yGJUWb1eFPb8LS4FuI1wxYAnao8/DmpPxkcydGRQ21iDvBxIix6vc/jwTPVCa6dYsUKM8UXgHSiTfTA5gRjz3ign4G6F+DYC2RbWGHBjfZJ+AOWYA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=aVIW/CSc4LlLB9GA1q9toNlHGgjtbHWnyNrXh77SkuY=; b=X7V3ruEjzeFBW6+UipHkdubAGqX0suPXbz7SrHMhJXCM64X714Bz4y5J6xADkuv/fqCQDyaAptv2ngsUVGLdmD9qMZ2f35JBdIacvTGf75iRS3pkVPlsu3d6W2asx2cCAZFai37VUOYZJTCnLU6R2E0UP0HRoPtvoK5jOVUkEuJ/MeEFcViRKWPOBfMTnqtYV5JABenTHlj83g984fa8Q+DXBuKNBjDjfoCjWFR3jXvcQj0AzeMB6uaIo8ELYxdYyztP0OnNp+sl/9lIioTgy2wa76jtmhA1KYUXfUtp4TLWxOdC4bK1BEt2QyTo+ldogJX3tQRfC2u7vsrSVXCzVw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=aVIW/CSc4LlLB9GA1q9toNlHGgjtbHWnyNrXh77SkuY=; b=dSCqTvyr8RQHZ1JzCismlFMhfqqpElaDn+xpJwJJsU+O3JkN0AwI0EkgxQTJ6g6wZNrsg+1WgVSsQV4fhJTkeGDA9C5CCd1jDyniWhsFShdWdBocEVPYXYMZYe+GoyXP/ria4nFRVx7BpoJ0+BRbJeoLSmdw9EKMftSjZ6XShV0=
Received: from DS7PR11MB6039.namprd11.prod.outlook.com (2603:10b6:8:76::6) by BL0PR11MB2931.namprd11.prod.outlook.com (2603:10b6:208:7d::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4975.11; Mon, 14 Feb 2022 15:06:06 +0000
Received: from DS7PR11MB6039.namprd11.prod.outlook.com ([fe80::e131:742a:954d:492c]) by DS7PR11MB6039.namprd11.prod.outlook.com ([fe80::e131:742a:954d:492c%6]) with mapi id 15.20.4975.012; Mon, 14 Feb 2022 15:06:06 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: James N Guichard <james.n.guichard@futurewei.com>
CC: Gyan Mishra <hayabusagsm@gmail.com>, Greg Mirsky <gregimirsky@gmail.com>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: [sfc] Progression of OAM work in the SFC WG
Thread-Index: AdgYYtG+l/ju054uSCa0IEDodR5p4AAI1AYAAgogAwAADsqJgAAEeXQAAAD7PAAAFinEAAAVIwJwAAHkVoA=
Date: Mon, 14 Feb 2022 15:06:06 +0000
Message-ID: <D501B10D-8AA6-4D67-9A57-F799BE9CD517@cisco.com>
References: <MN2PR13MB4206A3B910C9CE55867DA10BD2279@MN2PR13MB4206.namprd13.prod.outlook.com> <CA+RyBmWZU-OL-9kb7byfumcGZ_Xktb7Yp=dRQe3QRdCcTwBZcw@mail.gmail.com> <CABNhwV1Fcb9fmh82LeUKTHO7BdYeWp4HyP9aQBGS+x6FEL=fLA@mail.gmail.com> <a47de7f9-bfa3-979a-0e49-1f1c52161d72@joelhalpern.com> <CA+RyBmVY6PBeQ7O_vhtKO4M7bnZhCAdoVzPZJsd9f0jyaEvTWg@mail.gmail.com> <CABNhwV0-nkH5tV13X-G--qf8u0yi9TGYgo2ee+N8PNosm=b1xg@mail.gmail.com> <3CDEE749-5A40-44FF-9E3A-8C8EBBA94849@cisco.com> <MN2PR13MB420658D888711F1FC921556BD2339@MN2PR13MB4206.namprd13.prod.outlook.com>
In-Reply-To: <MN2PR13MB420658D888711F1FC921556BD2339@MN2PR13MB4206.namprd13.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.60.0.1.1)
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a16ee3ae-9eab-47f4-e4ba-08d9efcb86c6
x-ms-traffictypediagnostic: BL0PR11MB2931:EE_
x-microsoft-antispam-prvs: <BL0PR11MB29311634A481C16B894F33A6C7339@BL0PR11MB2931.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DS7PR11MB6039.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(166002)(6916009)(33656002)(36756003)(316002)(2616005)(26005)(186003)(54906003)(71200400001)(38100700002)(508600001)(6486002)(966005)(122000001)(53546011)(2906002)(8676002)(6506007)(6512007)(40140700001)(4326008)(86362001)(76116006)(91956017)(64756008)(66446008)(66476007)(66556008)(66946007)(38070700005)(8936002)(5660300002)(30864003)(83380400001)(45980500001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: JxU90g8LPRUDStGFf9XZX01Mfc8hjElmDehcRibQ6RK8O+MIIBk0EdiiXCsouOIaYp1YJbS1z8FQscgeLBci0YBl5OepiROkcHrcsjtHveZI/3pr+OCvNOIniC59assqY3mjcsQjfpDE8XecH8RgIXKAFXbapJmojfiLpsfG+wx1r+UKNI46oAuaYZ199/NQx04jxW2lNT0k3J70JHxf50CNnfBdQF1WwI0dZxTtBBdIsIONgUBF3Gc7GKjAXRZl1bjZntETGpjGS1/dicNPE9ctQp9fq13g/ez5DLpGRQVlWdUNdBasEq2HAusv1SJkaXbpA9jJIxsR0ZRR9Jte0/ns5AnRqpjJA0PJJVgaTyE7ip6TNvkQOynkXr6b/FMnJyB4ze+FNvmqqY/NsghxWmwbZIXsaNjAqv9UmhO/Vr3apPFr9ssQ9nxHPyF3F0oU1i2do15hNxWIM5+x9vz+QpGlqRTmCWSBw9jRupdoEIlDXy/2X72E/6QKShEWSzbA7eZNiFSBQzYQN/rP8Tlco6VfrL7pN+VCMGPhkMW2AiWlP0yb2ZOucAQvZwp4rCYr1/UmAFQ2bcQ2T00iKXLXwQZ1kbjladrYf1N2tJRVUHNyINCMuNvIwqNyCLeF1kLzjZVlvl5jrqETeNYn7RnG2gbZr0SLoJsAwfwKq0f2JO51tNUIxaB38GDDpwiL91NMwImFABTSs0OanNInavhQQSoAFyfljch6cwrHkFTF/hbqhy2LvqAsmOlNBZIhrWAgVQ91EfvN01Lfabn1LhYCMrH3D1lHJDQTrmp5km+eW67HJinVawa+EGFvoVzMZzkwp8Ns0AToZUjrWjxRLKbuneIu4kv1Q5EYIaH1UrBys9pBgHi0ok2ijkBgAoTpaGMNLbcf0oXmYTptNGyDxJ7w1ZnnyVsBranYDLUlLqeWGO1gaYml0j0+9VJSyQY+bK+6pw6eOrXthtt9FzfYJfa90VG9tlmJxBvLo3cbufl0QLo0DwpdI/5hpe0KhqlIHefeaFq6cOFVc9JzfdMnbMCdItM9TDQ8Lm+SJ/c0mJ26p/7Scgb2KJyooUgbzi3dieDoQO0uJcZv+HP+64zygMb7u9et3tXoMXqeCEP/KDYrV1m5YJoiyGX1Jg26KIZN5+MagiCmsgUJBMBgb92ElONQCOwXPLip6NVOtSA+NXgTHr6BvTkMyZ5mI74dZETdjf4uChAqOiMShUBWzkynLvQiJj/+qyiPCdHBvQMxZi0QB4KLnrFfQvusuFTQyh1+n3GIKs+x7x9NYnL656O7CFseDKPGRDG3s6TX2S6QLmOMHq93qSqkjpxWZ0P8Q+pRcX9qjj76zLy788FNeb6veMvMPwCefKTFelosNtX2CMk86MF9MxW0lQTrF3sh6POnBhOkEi0DjXnJ0ltBGYu5Ot5Q3PIe2GhKrgzErSXVEDuGFUKA1WCMLEMtIETnyZRhauPdS9lPbLiyrpaYl9kCzSZx/VmtkwzPIqfPOMJUGlLDCZ2k/mF6oCAGbniwdfhmj8jeSAT7phwWk1msoEE/PkmOvcQmKeQGiXwmTVFtwp5z/ZlelHcnEWikaq7BLwYZFtg9vLp+rKXun0UTa90wd9Evds8vdr/yJu2a4K6zO45BBts=
Content-Type: multipart/alternative; boundary="_000_D501B10D8AA64D679A57F799BE9CD517ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DS7PR11MB6039.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a16ee3ae-9eab-47f4-e4ba-08d9efcb86c6
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Feb 2022 15:06:06.7123 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 31G8GntnGj21m8X+4FaQzA15AkNwgonTKGvNw1KzYw5zjRf9a9jJ9hBEd2Jwk7m71EKTLho4bnswhcYjVA0foQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB2931
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.19, xbe-aln-004.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/XOIwPmmnWYx-1Z13iC0CfNv1kqI>
Subject: Re: [sfc] Progression of OAM work in the SFC WG
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Feb 2022 15:06:22 -0000

Thanks — I’d expect SFC OAM layer packets only, and would also expect a model that works equally with multilayer-oam approaches or with existing OAMs.

Thanks!

Carlos.

2/14/22 午前9:28、James Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>>のメール:

Hi Carlos,

Some responses in-line …

From: sfc <sfc-bounces@ietf.org<mailto:sfc-bounces@ietf.org>> On Behalf Of Carlos Pignataro (cpignata)
Sent: Sunday, February 13, 2022 11:07 PM
To: Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>>
Cc: Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>; sfc@ietf.org<mailto:sfc@ietf.org>
Subject: Re: [sfc] Progression of OAM work in the SFC WG

Replying to this specific email in the thread, only because it is the latest one at this point in time, but bundling comments from various places on the thread. Please find some follow-up comments and questions marked “CMP”, indicating the “From”, and organized chronologically:

James N Guichard <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>>:

1) The chairs have reviewed the O bit definition in RFC 8300.  That definition is at best open to interpretation and therefore incomplete.  For example, the clear intention is only to mark packets which are intended for SFC OAM at the SFC service layer.  But that is not what the current text says.  There is also, unfortunately, ambiguity as to what constitutes an OAM packet.  So it is reasonable for documents to update 8300 to clarify the exact applicability and action for the O-bit.

CMP: It is unclear to me what exact issues the chairs are calling out. There are two issues mentioned:
CMP: 1. "But that is not what the current text says.” —> what does the text say precisely?  Can you point to the specific RFC 8300 text that is believed to be incomplete, and a detailed use case that showcases the potential issue? An extrapolated counter-example just to make a point: the text does not  say what days of the week OAM packets can be marked, yet there’s an expectation that they will work Mondays and Saturdays all the same — even holidays.


Jim> Currently RFC8300 says “The O bit MUST be set for OAM packets and MUST NOT be set for non-OAM packets”. The first issue is does this mean the O bit should be set for ALL OAM packets regardless of whether they belong to the NSH service plane? Or should it only be set for SFC OAM packets? And what exactly is an SFC OAM packet as the earlier reference to RFC6291 is just a generate set of guidelines for the use of the term OAM. The second issue is that if that O bit is set then Greg’s document is in conflict with IOAM as both use the next protocol field and even if the O bit is set it is meaningless as the protocol action is based solely on the setting of the next protocol field. So in this case can their solutions simply ignore what RFC 8300 says e.g. MUST set the O bit? Or if they set the O bit to be conformant to what RFC 8300 says then do we need clearer rules stating what to do if the next protocol field is NOT an OAM next protocol such as the context headers should then be examined?



CMP: 2. What specifically is the ambiguity with what an OAM packet is? Please grep the RFC series for “oam packet”, it is not a new term.
CMP: Net-net, O-bit=1, OAM packet.

Jim> ambiguity is whether it is only SFC OAM packets that are being discussed or ALL OAM packets nothing that some might be at the service layer and some might not.

Jim

2) However, related to point 1), we can't have multiple documents updating the definition differently.  As such, the authors of the SFC iOAM draft and the SFC multi-layer-oam draft need to come together and figure out what the clarification is for the definition of that bit. We do not believe as chairs that either of these documents can move forward from the WG until such clarity has been reached.

CMP: If there is still believed to be an ambiguity or a clear opportunity for improving the definition, I agree with consolidating that update. I had suggested before that if such new text or real clarification is agreed, a separate document that only makes that O-bit clarification is the most clear and clean way to go. That doc should be a one-pager or less. I’d be happy to contribute to that minimal doc, if it is shown to be needed.

CMP: For completeness also, the "SFC multi-layer-oam” document has many outstanding issues besides the O-bit.

Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>

I've reviewed our SFC OAM documents and draft-ietf-sfc-nsh-tlv. As I understand these documents, the Active SFC OAM and IOAM are identified by the respective values for the NSH Next Protocol field (to be assigned by IANA).

CMP: There is a major issue with the sentence above. Active SFC OAM (as a category), as per RFC 8300, needs to be identified by setting the O-bit. No way around that based on RFC 8300. However, the text "the Active SFC OAM” creates confusion since it refer to a specific OAM protocol which has the same name as a the category as well. That name collision is quite unfortunate in my opinion.

At the same time, so far no OAM-specific meta data TLV has been defined. Thus, it appears that one way forward could be to not involve the O bit in the active SFC OAM or IOAM altogether. In other words, to deprecate the NSH O bit.

CMP: RFC 8924 already includes ICMP and BFD as example SFC Action OAM protocols. Those can be encapsulated in IP, in which the Next-Protocol indicates IP — and (as per RFC 8300) the O-bit is set to indicate an OAM packet.
CMP: The proposal of deprecating the O-bit breaks those SFC OAM protocols already included in an RFC.
CMP: That proposal of deprecating the O-bit also breaks Section 4.1 of IOAM.
CMP: This expired I-D yet implemented in open source uses the O-bit: https://www.ietf.org/archive/id/draft-penno-sfc-trace-03.txt<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Farchive%2Fid%2Fdraft-penno-sfc-trace-03.txt&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481196264%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=z%2BkFgDqH24pyY47wH0JOJgeo2maLlCgfFSp3MZ5KzZc%3D&reserved=0>


Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>>

I agree that what makes sense to me as a path forward is to deprecate the O bit and not use in SFC Multilayer OAM and SFC IOAM, as both SFC Multilayer OAM and SFC IOAM are identified by the respective values for the NSH Next Protocol field (to be assigned by IANA), as well as so far no OAM-specific meta data TLV has been yet defined.

CMP: What is the “SFC Multilayer OAM”?
CMP: The O-bit (reading RFC 8300) does not indicate if there is OAM Metadata. It indicates an OAM packet.


"Joel M. Halpern" <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>

As far as I can tell, if we deprecate the O-bit and rely on the next protocol field, we are saying that in practice (not by rule) NSH metadata can not be used for OAM.  That's fine with me as long as we agree on that.

CMP: I do not fully follow this. Can you explain the relationship of the O-bit with Metadata?
CMP: Here’s an example: RFC 8924 shows ICMP as Active OAM. The SFC next protocol is IP, the IP next protocol is ICMP, the O-bit needs to be set.

CMP: Consider the following document, independent submission and in the RFC Publication queue already:
CMP: https://datatracker.ietf.org/doc/draft-mymb-sfc-nsh-allocation-timestamp/<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-mymb-sfc-nsh-allocation-timestamp%2F&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481196264%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=B0%2FQPQTbQruTKzqXfin6ZfEYyauA2KZhq0m8YKSLtLE%3D&reserved=0>
CMP: Is a Timestamp in Metadata an OAM element?

CMP: Consider this proposal https://datatracker.ietf.org/doc/draft-mirsky-sfc-pmamm/<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-mirsky-sfc-pmamm%2F&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481196264%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=JiikGgXG35%2FW518disuIxAvaWa5FuqvkKcG%2Fayg6R48%3D&reserved=0>
CMP: Where the base header borrows a bit for an OAM function.

CMP: Neither of those have any impact on the O-bit.


Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>

I agree that, as we find SFC NSH now, no OAM metadata has been defined. It appears to me that deprecating the O bit does not affect any of the already defined mechanisms in the SFC NSH.

CMP: It actually does, see my example above.


I think that if a new, for example, MD Type = 2 TLV that is used for any OAM functionality to be proposed in the future, deprecated the O bit would not prevent using such NSH TLV.

CMP: I agree with this — because there is no correlation between MD Type field and O-bit as defined.

Best,

Carlos.




2/13/22 午後12:32、Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>>のメール:

Hi Joel

I am in agreement as well with what you have stated that once the O bit is deprecated that NSH metadata cannot be used for OAM and that we would have to now from that point forward rely on the next protocol field as we will be doing for SFC Multilayer and SFC IOAM drafts as well as will have backwards compatible with any already existing defined mechanisms in SFC NSH.

I don’t see any issues or impact with moving forward.

Kind Regards

Gyan

On Sun, Feb 13, 2022 at 12:04 PM Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>> wrote:
Hi Joel,
I agree that, as we find SFC NSH now, no OAM metadata has been defined. It appears to me that deprecating the O bit does not affect any of the already defined mechanisms in the SFC NSH. I think that if a new, for example, MD Type = 2 TLV that is used for any OAM functionality to be proposed in the future, deprecated the O bit would not prevent using such NSH TLV.
What do you think?

Regards,
Greg

On Sun, Feb 13, 2022 at 6:55 AM Joel M. Halpern <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>> wrote:
There is an implication of deprecating the O-bit that I would like to
hear from more WG participants about.

As far as I can tell, if we deprecate the O-bit and rely on the next
protocol field, we are saying that in practice (not by rule) NSH
metadata can not be used for OAM.  That's fine with me as long as we
agree on that.

Yours,
Joel

On 2/13/2022 2:52 AM, Gyan Mishra wrote:
>
> Hi Jim, Joel & SFC WG,
>
> I agree that the RFC 8300 definition of O bit is incomplete and not
> clear as to its intended use.
>
> That is a problem that I agree needs to be rectified.
>
> I understand that we need to get this resolved before we can progress
> Multilayer SFC OAM draft-ietf-sfc-multi-layer-oam-18 and SFC IOAM.
>
> I agree that what makes sense to me as a path forward is to deprecate
> the O bit and not use in SFC Multilayer OAM and SFC IOAM, as both SFC
> Multilayer OAM and SFC IOAM are identified by the respective values for
> the NSH Next Protocol field (to be assigned by IANA), as well as so far
> no OAM-specific meta data TLV has been yet defined.
>
> So we have I believe solid solution and path forward and I support
> deprecating the O bit.
>
> Kind Regards
>
> Gyan
>
> On Wed, Feb 2, 2022 at 5:42 PM Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>
> <mailto:gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>> wrote:
>
>     Thank you, Jim and Joel, for guiding the SFC OAM work and pointing
>     out the issue that must be addressed.
>
>     I've reviewed our SFC OAM documents and draft-ietf-sfc-nsh-tlv. As I
>     understand these documents, the Active SFC OAM and IOAM are
>     identified by the respective values for the NSH Next Protocol field
>     (to be assigned by IANA). At the same time, so far no OAM-specific
>     meta data TLV has been defined. Thus, it appears that one way
>     forward could be to not involve the O bit in the active SFC OAM or
>     IOAM altogether. In other words, to deprecate the NSH O bit.
>
>     I greatly appreciate your comments on the proposal to deprecate the
>     NSH O bit.
>
>     Regards,
>     Greg
>
>     On Wed, Feb 2, 2022 at 10:36 AM James Guichard
>     <james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>
>     <mailto:james.n.guichard@futurewei.com<mailto:james.n.guichard@futurewei.com>>> wrote:
>
>         Hi WG:____
>
>         __ __
>
>         Having reviewed all of the OAM related documents in our WG, the
>         chairs would like to provide a few comments to hopefully
>         generate discussion and forward progress of this work:____
>
>         __ __
>
>         1) The chairs have reviewed the O bit definition in RFC 8300.
>         That definition is at best open to interpretation and therefore
>         incomplete.  For example, the clear intention is only to mark
>         packets which are intended for SFC OAM at the SFC service
>         layer.  But that is not what the current text says.  There is
>         also, unfortunately, ambiguity as to what constitutes an OAM
>         packet.  So it is reasonable for documents to update 8300 to
>         clarify the exact applicability and action for the O-bit.____
>
>         __ __
>
>         2) However, related to point 1), we can't have multiple
>         documents updating the definition differently.  As such, the
>         authors of the SFC iOAM draft and the SFC multi-layer-oam draft
>         need to come together and figure out what the clarification is
>         for the definition of that bit. We do not believe as chairs that
>         either of these documents can move forward from the WG until
>         such clarity has been reached. ____
>
>         __ __
>
>         3) Related to the SFC iOAM, we need a clear definition of iOAM.
>         There seem to be differences between the definitions in
>         published RFCs, the usage (which is not a definition) in the SFC
>         draft, and the various ippm drafts.  Any such definition will
>         need to be vetted with the ippm working group.____
>
>         __ __
>
>         Again, it would be good if members of the working group beyond
>         the two author teams spoke up about their readings of the
>         documents, and their understandings of what we need.____
>
>         __ __
>
>         Yours,____
>
>         Jim and Joel____
>
>         __ __
>
>         __ __
>
>         __ __
>
>         _______________________________________________
>         sfc mailing list
>         sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<mailto:sfc@ietf.org>>
>         https://www.ietf.org/mailman/listinfo/sfc<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsfc&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481196264%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=R120rPMaYbbRLOv5jGA%2BiAJotLq4BO8fahg3452n2PU%3D&reserved=0>
>         <https://www.ietf.org/mailman/listinfo/sfc<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsfc&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481352514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=%2FkotEwodgOcwwpPgrNIIyZ%2BY5tC3bIiegKAjzvo%2BpKI%3D&reserved=0>>
>
>     _______________________________________________
>     sfc mailing list
>     sfc@ietf.org<mailto:sfc@ietf.org> <mailto:sfc@ietf.org<mailto:sfc@ietf.org>>
>     https://www.ietf.org/mailman/listinfo/sfc<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsfc&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481352514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=%2FkotEwodgOcwwpPgrNIIyZ%2BY5tC3bIiegKAjzvo%2BpKI%3D&reserved=0>
>     <https://www.ietf.org/mailman/listinfo/sfc<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsfc&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481352514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=%2FkotEwodgOcwwpPgrNIIyZ%2BY5tC3bIiegKAjzvo%2BpKI%3D&reserved=0>>
>
> --
>
> <http://www.verizon.com/<https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.verizon.com%2F&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481352514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=ONjfg3GZJ5atr1x8BR792XzO%2F9pozjN2GGJBA%2F5jK8w%3D&reserved=0>>
>
> *Gyan Mishra*
>
> /Network Solutions A//rchitect /
>
> /Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com> <mailto:gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com>>//
> /
>
> /M 301 502-1347
>
> /
>
>
--
[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<https://nam11.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.verizon.com%2F&data=04%7C01%7Cjames.n.guichard%40futurewei.com%7C9db2ab0a9382461397f908d9ef6f7ff5%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C1%7C637804084481352514%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=ONjfg3GZJ5atr1x8BR792XzO%2F9pozjN2GGJBA%2F5jK8w%3D&reserved=0>
Gyan Mishra
Network Solutions Architect
Email gyan.s.mishra@verizon.com<mailto:gyan.s.mishra@verizon.com>
M 301 502-1347

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc