Re: [sfc] New Version Notification for draft-ietf-sfc-multi-layer-oam-05.txt

Greg Mirsky <gregimirsky@gmail.com> Tue, 02 June 2020 23:28 UTC

Return-Path: <gregimirsky@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 434373A1105; Tue, 2 Jun 2020 16:28:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wcCa0KF6qUb9; Tue, 2 Jun 2020 16:28:41 -0700 (PDT)
Received: from mail-lj1-x232.google.com (mail-lj1-x232.google.com [IPv6:2a00:1450:4864:20::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F4B83A1102; Tue, 2 Jun 2020 16:28:40 -0700 (PDT)
Received: by mail-lj1-x232.google.com with SMTP id e4so383346ljn.4; Tue, 02 Jun 2020 16:28:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=V8x9uNtgTRRORETk7MpXg63FiCLV+Rrut941A+hUjbE=; b=oxHuOJ0bUKCMs0KCI1AnBSMWknkKk1SxQ7gNc5oB4gm4lRfOiXpdTXWPpYC/H04iEm IT54bHLpnyGs9Ku3mkdueEkbXr5jM8jhlFrkSQ6OfD1qpHSJtAE9nAA5sJKpZHxRE04F ZqR9CaeNaKpK2kxyqPAS8UlaRcWFtmRXZ5DZg7/SnQ3yE2mFgN5ndYpJnQj1AXOwO3T0 FYAx4PO8baV/4SbDqftBdZlX+mWmTdW2WNT4lMcGs1EZuUz05LkyysxpFWxpPW5ZmJuK hnLeywOD9uVV7DYq4Yv8F0FRkmGcWKzeTB02lgTxbdtyGNmMwZDF4sboifkjBioqt/0r 6dgg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=V8x9uNtgTRRORETk7MpXg63FiCLV+Rrut941A+hUjbE=; b=U3q3yt9XxIaUZN/gIEXapOfF0urCz7WJ8uf3YO9tdVpOhQS37AKk0cKD8XIkw9cuUI CLhtEuGSZUrpk+7U96HUZ3avClu8o7Qru4ewrXAaGuS3w3n8hHHo4t9FQd2JE5791Z8u PO2f7J5qNeOqJZ8y+m1+QNFICCASE1O/AiZLTxqec4AsV3oYyUUSuOcd0MyWz10Dwn31 sgb7Z+GOwkU8kLMuz8jbgu2MPNVcdKvsLaKmvrctRGOCbahwIbVFakEiekSlnfY+wmMR JxD1tq/6tVintYJGJHSX+pDVyPxeUIRcXlIqZ3iibE49zn3kPgor7lkxntEslH09s+X3 IPqw==
X-Gm-Message-State: AOAM533ffbv/H8ymA/ABBpJnfGNYJWkeWK5XU3V7sXyKDDRcLX3qWpht FKn3bKsXgUu0bb9sKw0q76XwE2aY+ofCfVCo7hs=
X-Google-Smtp-Source: ABdhPJwq1JdKit1PlTmUQdKXMeBNrNcqe00L9KDiVQYkiKJNV/OP0nAuX75fpBY5iz9clo29Hd6y4wKnWevuI5zx7vQ=
X-Received: by 2002:a2e:97c3:: with SMTP id m3mr611959ljj.23.1591140513394; Tue, 02 Jun 2020 16:28:33 -0700 (PDT)
MIME-Version: 1.0
References: <159002475323.18843.9559672930298713998@ietfa.amsl.com> <CA+RyBmXXRoPkhXjhpneC8UyBDbxh8P81YDYpRTnbqQiLu64ogQ@mail.gmail.com> <D09FF572-A4CD-464A-BC09-81064B29E517@cisco.com>
In-Reply-To: <D09FF572-A4CD-464A-BC09-81064B29E517@cisco.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 02 Jun 2020 16:28:21 -0700
Message-ID: <CA+RyBmVObnN8=AbpWveoK0V9fZGDF=UFr+L=9iN5G-NxFq0vgg@mail.gmail.com>
To: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
Cc: Service Function Chaining IETF list <sfc@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000016b3cb05a7224592"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/d8e03IL_jXuldbJblR6k5wttTnQ>
Subject: Re: [sfc] New Version Notification for draft-ietf-sfc-multi-layer-oam-05.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jun 2020 23:28:43 -0000

Dear Carlos,
please find my answers and notes in-line under the GIM>> tag.
Please let me know if you have any further questions.

Regards,
Greg

On Wed, May 27, 2020 at 8:15 AM Carlos Pignataro (cpignata) <
cpignata@cisco.com> wrote:

> Dear Greg,
>
> We much appreciate your comments and questions.
>
>
> Thank you for asking and inviting commentary. Here’s some thoughts:
>
> Hello, WG, Chairs,
>
> I believe fundamental concerns with this work remain unanswered — examples:
> https://mailarchive.ietf.org/arch/msg/sfc/NdxlfxBuvaFp3eU8yFuLqKvNteQ/
> https://mailarchive.ietf.org/arch/msg/sfc/TT3L-R05fbIGkfjr-x_oifBrhsc/
> https://mailarchive.ietf.org/arch/msg/sfc/sSO2BcgXereje4PxnGY9Wv_pDOs/
> And since some of those questions were asked during adoption, I’d
> recommend at least un-adopting this document.
>
> Email threading in one-year-old and two-year-old emails is super hard to
> parse and follow, so some key concerns are:
> 1. This document describes an OAM solution, but ignores the WG’s SFC OAM
> framework which sits with the IESG.
>
GIM>> Will add the SFC OAM framework document as Informational Reference
and clarify which functionality the proposed mechanism addresses.

2. Existing protocols can already provide solutions without the need of
> inventing a new protocol on paper. See #1 above.
>
GIM>> Could you kindly reference a document that describes how existing
protocols can be used to troubleshoot SFC NSH? If I look at the SFC OAM
framework draft I can only find the sub-section about the potential use of
ICMP that closes with the following:
   It could be observed that ICMP at its current stage may not be able
   to perform all required SFC OAM functions, but as explained above, it
   can be used for some of the connectivity functions.
If ICMP cannot be used, then what other, unnamed in the SFC OAM Framework
document, existing protocol can be used as SFC NSH Echo Request/Reply
mechanism?


> 3. There are already documented SFC traceroute implementations but this
> document has no implementation experience. See #2 above.
>
GIM>> As mentioned in the SFC OAM Framework draft, ICMP may not fully
address all the needs of tracing SFP. Is there any other document mentioned
in the framework that can?

>
> Dear Greg,
>
> Could you please start responding to previous questions? Apologies in
> advance if I missed any of your responses.
>
> Per our analysis, existing OAM mechanisms cannot support both SFP ping and
> SFP traceroute.
>
>
> Which analysis? Perhaps you could share that analysis?
>
GIM>> Gladly. I was referring to ICMP over SFC NSH. As noted in the
framework draft, ICMP can be used to ping an SFC entity along the SFP if
the sender knows the IP address of that entity and the number of IP hops to
that distance (rather impractical but theoretically achievable). But can
ICMP be used to trace the given SFP without the upfront knowledge of IP
addresses of SFC entities along the SFP? Based on our analysis, not. Assume
that the destination IP address is set to the IP address of the last SFF
(similar to how ICMP traceroute works in IP network) and TTL in NSH is set
to 1. The first downstream from the sender SFF will remove the NSH and
forward the ICMP packet to its destination over the IP network. Similarly,
when NSH' TTL incremented, the second SFF will remove NSH and forward ICMP
packet to its destination, i.e. the last SFF. As a result, all ICMP echo
replies the sender will receive will be from the same SFF, from the last
SFF in the given SFP. Clearly, that is not what a traceroute tool should
produce.

>
> Consider ICMP. When encapsulated in NSH, it supports the ping function
> but, per our analysis, cannot be used as an SFP tracing tool.
>
>
> What exactly did you need to add to have that functionality as opposed to
> your consideration of ICMP?
>
GIM>> A dedicated to SFC NSH OAM protocol type.

>
> Thanks!
>
> Carlos.
>
>
>
> 2020/05/20 午後10:51、Greg Mirsky <gregimirsky@gmail.com>のメール:
>
> Dear All,
> this version includes a minor update to the Security Considerations
> section.
> We, the authors, believe that the draft is ready for the WG LC. It defines
> an essential function of SFC OAM - SFP Echo request/reply. Per our
> analysis, existing OAM mechanisms cannot support both SFP ping and SFP
> traceroute. Consider ICMP. When encapsulated in NSH, it supports the ping
> function but, per our analysis, cannot be used as an SFP tracing tool.
> We much appreciate your comments and questions.
>
> Dear Jim and Joel,
> please kindly consider the WG LC for this draft.
>
> Regards,
> Greg
>
> ---------- Forwarded message ---------
> From: <internet-drafts@ietf.org>
> Date: Wed, May 20, 2020 at 6:32 PM
> Subject: New Version Notification for draft-ietf-sfc-multi-layer-oam-05.txt
> To: Bhumip Khasnabish <vumip1@gmail.com>, Cui(Linda) Wang <
> lindawangjoy@gmail.com>, Greg Mirsky <gregimirsky@gmail.com>, Wei Meng <
> meng.wei2@zte.com.cn>
>
>
>
> A new version of I-D, draft-ietf-sfc-multi-layer-oam-05.txt
> has been successfully submitted by Greg Mirsky and posted to the
> IETF repository.
>
> Name:           draft-ietf-sfc-multi-layer-oam
> Revision:       05
> Title:          Active OAM for Service Function Chains in Networks
> Document date:  2020-05-20
> Group:          sfc
> Pages:          18
> URL:
> https://www.ietf.org/internet-drafts/draft-ietf-sfc-multi-layer-oam-05.txt
> Status:
> https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/
> Htmlized:
> https://tools.ietf.org/html/draft-ietf-sfc-multi-layer-oam-05
> Htmlized:
> https://datatracker.ietf.org/doc/html/draft-ietf-sfc-multi-layer-oam
> Diff:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-multi-layer-oam-05
>
> Abstract:
>    A set of requirements for active Operation, Administration and
>    Maintenance (OAM) of Service Function Chains (SFCs) in networks is
>    presented.  Based on these requirements an encapsulation of active
>    OAM message in SFC and a mechanism to detect and localize defects
>    described.  Also, this document updates RFC 8300 in the definition of
>    O (OAM) bit in the Network Service Header (NSH) and defines how the
>    active OAM message identified in SFC NSH.
>
>
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
>
>