[sfc] How to progress our control plane requirements document

"Joel M. Halpern" <jmh@joelhalpern.com> Fri, 13 January 2017 18:12 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F840129D1E for <sfc@ietfa.amsl.com>; Fri, 13 Jan 2017 10:12:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.722
X-Spam-Level:
X-Spam-Status: No, score=-2.722 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zj91-pKpU52W for <sfc@ietfa.amsl.com>; Fri, 13 Jan 2017 10:12:05 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 198FC129D1A for <sfc@ietf.org>; Fri, 13 Jan 2017 10:12:05 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 0B655A20608 for <sfc@ietf.org>; Fri, 13 Jan 2017 10:12:05 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1484331125; bh=sMINgeuY0oLjDggi80FLTCdR/g7YCfd41lgXcdy6F5U=; h=To:From:Subject:Date:From; b=lhzfcWOGt+Io1+70dqmMWmKVO+SViejPlUH/bR3xfGUSl5Cwh26FGMGqQjvKy5fff xqFBcPxff3KUHnLxDi+26mxDbPozgCwy9a4AGZwuwBmbp2nXmJQgWV1yG6yrkVOPMd suvbLY8qeryaHFjhGVH5RsHB0K2h1Xe9YunYZYR4=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id ACD381CAE04 for <sfc@ietf.org>; Fri, 13 Jan 2017 10:12:04 -0800 (PST)
To: "sfc@ietf.org" <sfc@ietf.org>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <fee38c1c-bb5b-c2b3-21ae-15b798ed1c52@joelhalpern.com>
Date: Fri, 13 Jan 2017 13:12:03 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.6.0
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/XsOpYzz8j99Eh1OEuEUd0QerlT4>
Subject: [sfc] How to progress our control plane requirements document
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Jan 2017 18:12:07 -0000

Jim and I have been talking with Alia about this, and talking with each 
other.  Along the way we realized that we have some significant concerns 
about what we have done with this document.

We expect to discuss this next week at the interim, looking for ideas. 
And to discuss it further on the list.

The existing control plane document when viewed from the perspective of 
an implementer is hard to decompose into actionable parts. Given that 
the IETF tends to work by solving pieces of problems, rather than an 
entire control solution for all aspects, it is important that 
requriements we define be usable for such piece-wise work. Thus, we need 
to describe the requirements in ways that provide components which may 
be combined into an overall control plane solution for SFC.

While the document provides a set of control plane requirements it does 
not provide guidance on how those requirements can be successfully 
consumed into a standards compliant control plane. In particular, the 
interfaces C1 - C4 are each made up of behaviors likely to be provided 
by different solution components.  Thus, while there is an attempt to 
document a set of interfaces (C1...C4) it is not clear how an 
implementer can provide a solution component that addresses a 
well-defined set of requirements.

Given this, we need to go back and rethink the bundling of functionality 
so as to end up with bundles of requirements that are can be usefully 
addressed by IETF work while avoiding (as we have done well in the 
current version) prescribing the control plane architecture.

In addition, functional objectives are not fine grained enough to 
implement; for example, text such as "Rationalize the management of 
classification rules" is not something one can implement.

Yours,

Jim & Joel