Re: [sfc] New Version Notification for draft-ietf-sfc-multi-layer-oam-05.txt

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Wed, 03 June 2020 23:31 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE9CE3A0A3D; Wed, 3 Jun 2020 16:31:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=aSkQ726M; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=cisco.onmicrosoft.com header.b=v/mNUUW1
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LdiNuwsj2rYJ; Wed, 3 Jun 2020 16:30:57 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79A9C3A0A39; Wed, 3 Jun 2020 16:30:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=55461; q=dns/txt; s=iport; t=1591227057; x=1592436657; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=98XNEZkc157CbPY5rFM2KtVH1JwIla3uopuWIthzgXU=; b=aSkQ726M41LuqH1ehmhM9dzCpxY0Zc6mvrfLC0SAAhaXzaEg7jPXwPXj CgRtG1U4spvphJoJqp4l5P5EhrZoa+GSncFL/K1OR+E9KItZXqCcd/OYZ fxGTWDTGvLmYYY8hYL3EJW+5IKv+e2lKVdBX5/tC1jqUNLmU2mBkLYjeb k=;
X-Files: signature.asc : 873
IronPort-PHdr: 9a23:9KkMqBRnWwHfsf7J58n21ppuBdpsv++ubAcI9poqja5Pea2//pPkeVbS/uhpkESQBNmJ5PdNiu6QuKflCiQM4peE5XYFdpEEFxoIkt4fkAFoBsmZQVb6I/jnY21ffoxCWVZp8mv9PR1TH8DzNFLXq3y2qzUVH0a3OQ98PO+gHInUgoy+3Pyz/JuGZQJOiXK9bLp+IQ/wox/Ws5wdgJBpLeA6zR6arw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DmAABXMthe/4cNJK1mGgEBAQEBAQEBAQEDAQEBARIBAQEBAgIBAQEBggqBIy8jBikHb1gvLAqEG4NGA40jJYEBhlOCKY5TgUKBEANQBQQHAQEBCQMBARgBDAgCBAEBhEQCghsCJDgTAgMBAQsBAQUBAQECAQYEbYVbDIVyAQEBAQIBAQEQCAkdAQEsBgMCAQQLAgEGAhEDAQIBIAEGAwICIQYLFAkIAgQOBQ4NB4MEAYJLAw4gAQ6UF5BnAoE5iFEQdoEygwEBAQWBMgEDAg5BQoMGDQuCBwcJgTiBU4ERgk0PhwwagUE/gREnDBCCGDU+gh5JAQECAQEYgQ8FARECAUANEYJWM4ItjnQGiViBDIljj0AjTAqCWYQiglOBP4hfgwGEYAMdgmeBFId4hRKNNZJSiB2CT40kS3KCWgIEAgQFAg4BAQWBQCoiZnBwFRohKgGCCgEBMgk1EhcCDVWPIEsMF4EDAQiCQ4UUhUJ0AjUCBgEHAQEDCXyMXQGBDwEB
X-IronPort-AV: E=Sophos;i="5.73,470,1583193600"; d="asc'?scan'208,217";a="504799290"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 03 Jun 2020 23:30:40 +0000
Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 053NUeIC001687 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 3 Jun 2020 23:30:40 GMT
Received: from xhs-aln-001.cisco.com (173.37.135.118) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 3 Jun 2020 18:30:40 -0500
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 3 Jun 2020 18:30:40 -0500
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Wed, 3 Jun 2020 18:30:40 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QECVwaQLX44vOafibdjGhEj7KatMEa5DugFtWc/235zaZajBICiWTI43HhTIVB9C18m4LUKne3c9VoVm+glUzqMIE/R7JE3ow/BNAH3JG75J5saMPs0zg4gDiG5yhSzlgq+eNEIkZ10gKzZzdCSwaq9YMYSshm+4Rw5Z1b/89U0nBJ0nppgxDTuqTuU9/+x5VwYeF1DG/XjOYE6pTwNvpnoC3g6RQ0EM31FMos1hYdW9EbRK7Tp0dkyDfaUxje2FsG/LE3KhB3m9Z7MxrU+rkaJzF0BRij4xiDwAx1X0X4F0isq2K9vj4Pgz/Byp1PmBbRoPKSX7bc44L+qmxmk1nQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=G/CiR9w3kM0JrWLLFTD0tfhEIC44kWbi40ipcOc9ktw=; b=lfs/Y1egUkpZacm4oR/dN7tnWd9FZ1eFFUZhNRPPMHDzDrMlCWLi5hja6eJV0b2Kg9LmHhIgc6sBuj5zPGL1Y21WDMMKzckdK+k7bPztsR3LmWOewUoov+nMkfTYdra8p3//OTVjkjSGwFFT8XXD5ScsqDDpN4Y7nK7PfnHsxab3B5GmQus/TnlguQzVxZmqcN52gblxiiEu8KtjafpfNnSsfwO4dr4DA4V4YJSNskfC9qRswCSgBORGzq5K7Hv/So3Py+quUuEomsBQaAJiOWULZe35djjJMVfRHBmG3aCOKMeTsGBbCB8WwFbG6xtFR2vtDKaQtSdtJIiBbKWNgg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=G/CiR9w3kM0JrWLLFTD0tfhEIC44kWbi40ipcOc9ktw=; b=v/mNUUW11JzO/6o1oMET1i1J2ARzfCeZd1SbsyCYl1DzUD10jKv0P+9UnUcWafI9ITTMBFBjmPRUzgEw22Y4Pk4Hrmm18wKwXosnQ6LzT+3vB2Gml0YAccyT2GNn6EmorurnY0HdQrT0o/U+vECDFRd5cW2bsAD9p7k3nPWtNjs=
Received: from BN8PR11MB3635.namprd11.prod.outlook.com (2603:10b6:408:86::20) by BN8PR11MB3732.namprd11.prod.outlook.com (2603:10b6:408:83::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.18; Wed, 3 Jun 2020 23:30:37 +0000
Received: from BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::c0e8:9942:9972:5590]) by BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::c0e8:9942:9972:5590%5]) with mapi id 15.20.3045.024; Wed, 3 Jun 2020 23:30:37 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: Service Function Chaining IETF list <sfc@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>
Thread-Topic: [sfc] New Version Notification for draft-ietf-sfc-multi-layer-oam-05.txt
Thread-Index: AQHWNDmeVIt1YNUip0qgLxabcbg+LqjGAo6AgAAp3gCAAVk/gIAAD9kA
Date: Wed, 03 Jun 2020 23:30:37 +0000
Message-ID: <AF508D34-AAAA-49D2-8710-CB2674399FCD@cisco.com>
References: <159002475323.18843.9559672930298713998@ietfa.amsl.com> <CA+RyBmXXRoPkhXjhpneC8UyBDbxh8P81YDYpRTnbqQiLu64ogQ@mail.gmail.com> <D09FF572-A4CD-464A-BC09-81064B29E517@cisco.com> <CA+RyBmVObnN8=AbpWveoK0V9fZGDF=UFr+L=9iN5G-NxFq0vgg@mail.gmail.com> <0A514F1F-342B-4DC7-B7E9-F81BE0AFEA02@cisco.com> <CA+RyBmU8Q3N91YEgdFaJvYpttm9ZzcZzQdV9TDEctyLh9Jiu7w@mail.gmail.com>
In-Reply-To: <CA+RyBmU8Q3N91YEgdFaJvYpttm9ZzcZzQdV9TDEctyLh9Jiu7w@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.80.23.2.2)
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [136.56.129.159]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 30ec3971-39b6-45e6-8e73-08d808161f13
x-ms-traffictypediagnostic: BN8PR11MB3732:
x-microsoft-antispam-prvs: <BN8PR11MB373254F1B0FCDD51CF06988AC7880@BN8PR11MB3732.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 04238CD941
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: bBIWy8zJp8C04bkno8AiLmV186y/Yv0f6bLIF0d3mUa9L2iDKhKI7ReYmIq2teQycyI7nIidVLUKRH2/oMphzFPuILeAiV8HWoYD44a6N6H+1RqiuBR69QccOhbkZ1E9R2EBobQqZSChDBJlAAc0WFP46PRHgeEcH1UWgttt1vobbUy7WPQAmvNaHWlNyWbX6WKiR237H/Xl3n3PgL0RvMYxCYmsHtvFS0h2KcXCXnpkkZRL/hvTE29Tp64CzlmJadxELb3yr/tQ5FIVzu8+5iVn9noHynhEfcuJ9O5xNsngKZPEF06yFpV2GyKbEBUq4oGy5fmvVHalJ36B2KyxZnP5y3z+1Gei+wrYDMwZpZDW2qfkObMFyd5g40ERZngDzrGBVESS3u7bAXnfNlYOgw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN8PR11MB3635.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(376002)(136003)(39860400002)(396003)(346002)(366004)(33656002)(2616005)(83380400001)(478600001)(66574014)(166002)(966005)(4326008)(99936003)(86362001)(316002)(6486002)(8676002)(6512007)(66446008)(91956017)(53546011)(5660300002)(66476007)(186003)(8936002)(15650500001)(6506007)(66946007)(30864003)(26005)(66616009)(36756003)(2906002)(71200400001)(54906003)(66556008)(64756008)(6916009)(76116006); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; boundary="Apple-Mail=_F2941EC6-7474-46D7-A2BD-8E06799EEBB5"; protocol="application/pgp-signature"; micalg="pgp-sha256"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 30ec3971-39b6-45e6-8e73-08d808161f13
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jun 2020 23:30:37.4954 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: RgLvQXvYa9ZpP06e3ZjsnezNdyX4EKs9adPU6o5uvswyn8VjKmnrAGM7o17hn1DVpy23WWbbL2QsXKKVYvgs4w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3732
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.11, xch-aln-001.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/lIHfKDU_LqdYUVF1cB3H7Ow_v_o>
Subject: Re: [sfc] New Version Notification for draft-ietf-sfc-multi-layer-oam-05.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Jun 2020 23:31:01 -0000

Hi, Greg,

Thanks for the quick response.

I feel that your responses are diverging from addressing the issues I brought up.
I also want to ensure there is unpolluted space for others to share their thoughts. This draft has shown in the past that silence can be very loud, as the interest level seems challenged.

As such, this is my last email on this thread.

Please find some closing comments inline, prefaced with “CMP: "

> 2020/06/03 午後6:33、Greg Mirsky <gregimirsky@gmail.com>のメール:
> 
> Dear Carlos,
> please find my answers and notes below in-line under GIM2>> tag.
> 
> Regards,
> Greg
> 
> On Tue, Jun 2, 2020 at 6:58 PM Carlos Pignataro (cpignata) <cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
> Dear Greg,
> 
> A top-level response first:
> 
>> GIM>> Will add the SFC OAM framework document as Informational Reference and clarify which functionality the proposed mechanism addresses.
> 
> This superficial patch does not address my deep and foundational concern, expressed initially 2 years ago before draft-ietf-sfc-multi-layer-oam adoption.
> 
> The idea is to start from the framework’s evaluation to understand what is needed based on that gap study, and produce a solutions that build on existent — not work in a vacuum, and then add an Informational Reference orthogonally.
> 

CMP: Greg, you selectively skipped responding to this issue which is a critical one, in my humble opinion.

> 
> ~~~
> As a complete aside, I got curious about the filename of this I-D, which has nothing to do with the content.
> 
> This document went from:
>             Multi-Layering OAM for Service function Chaining
> Abstract
>    This document tries to discuss some problems in SFC OAM framework
>    document and proposes the SFC OAM multi-layering requirements in SFC
>    domain to improve the troubleshooting efficiency.
> 
> To something completely different.
> 
> It is as if the filename was reused to write 2 or 3 different drafts. Looking at diffs, there is not a single sentence that remained from earlier versions.
> ~~~
> GIM2>> In the opinion of authors, that is the reflection of the evolution of the document. do you see that to be a violation of any IETF process?

CMP: I made no inference or judgement — it was a factual comment.
CMP: That said, the “violation of any IETF process” response from you is a straw man argument.
CMP: Since you implicitly ask, seems like a Trojan horse disguising lack of value, rather than process violation.

> 
> Comments inline.
> 
>> 2020/06/02 午後7:28、Greg Mirsky <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>>のメール:
>> 
>> Dear Carlos,
>> please find my answers and notes in-line under the GIM>> tag.
>> Please let me know if you have any further questions.
>> 
>> Regards,
>> Greg
>> 
>> On Wed, May 27, 2020 at 8:15 AM Carlos Pignataro (cpignata) <cpignata@cisco.com <mailto:cpignata@cisco.com>> wrote:
>> Dear Greg,
>> 
>>> We much appreciate your comments and questions.
>> 
>> 
>> Thank you for asking and inviting commentary. Here’s some thoughts:
>> 
>> Hello, WG, Chairs,
>> 
>> I believe fundamental concerns with this work remain unanswered — examples:
>> https://mailarchive.ietf.org/arch/msg/sfc/NdxlfxBuvaFp3eU8yFuLqKvNteQ/ <https://mailarchive.ietf.org/arch/msg/sfc/NdxlfxBuvaFp3eU8yFuLqKvNteQ/>
>> https://mailarchive.ietf.org/arch/msg/sfc/TT3L-R05fbIGkfjr-x_oifBrhsc/ <https://mailarchive.ietf.org/arch/msg/sfc/TT3L-R05fbIGkfjr-x_oifBrhsc/>
>> https://mailarchive.ietf.org/arch/msg/sfc/sSO2BcgXereje4PxnGY9Wv_pDOs/ <https://mailarchive.ietf.org/arch/msg/sfc/sSO2BcgXereje4PxnGY9Wv_pDOs/>
>> And since some of those questions were asked during adoption, I’d recommend at least un-adopting this document.
>> 
>> Email threading in one-year-old and two-year-old emails is super hard to parse and follow, so some key concerns are:
>> 1. This document describes an OAM solution, but ignores the WG’s SFC OAM framework which sits with the IESG.
>> GIM>> Will add the SFC OAM framework document as Informational Reference and clarify which functionality the proposed mechanism addresses.
> 
> See above.


CMP: You also did not respond to this. Another example of selectively not responding.

CMP: I was happy to engage into a technical and architectural discussion to improve the outcomes produced by a WG. That is not possible if you selectively skip comments.

> 
>> 
>> 2. Existing protocols can already provide solutions without the need of inventing a new protocol on paper. See #1 above.
>> GIM>> Could you kindly reference a document that describes how existing protocols can be used to troubleshoot SFC NSH? If I look at the SFC OAM framework draft I can only find the sub-section about the potential use of ICMP that closes with the following:
>>    It could be observed that ICMP at its current stage may not be able
>>    to perform all required SFC OAM functions, but as explained above, it
>>    can be used for some of the connectivity functions.
>> If ICMP cannot be used, then what other, unnamed in the SFC OAM Framework document, existing protocol can be used as SFC NSH Echo Request/Reply mechanism?
>> 
> 
> What I read in that paragraph is:
> 1. ICMP can as-is solve many (but not ALL) required OAM functions.
> 2. Adding to ICMP is the path of least resistance, it is largely there, but needs additions to support ALL OAM functions.
> GIM2>> We appreciate you sharing your ideas but authors decided to develop an alternative approach.

CMP: Yes, I know that the authors of this document chose to develop a brand new protocol on paper. That is one of my concerns.

> Also, we note that as you've mentioned above, you have made this suggestion two years ago. IETF, as we understand, is a contribution-driven organization and the fact that in, at least, two years no one, including you, produced a document, using the suggested by you approach, probably can be interpreted as lack of interest to that idea.

CMP: I’m trying to decide which type of fallacy this argument falls under — I think more than one.

CMP: Unfortunately, this direction of discussion does not help advance or solve anything.

CMP: Since you attempt to turn this into my intentions, I chose to focus on the bigger picture (framework) first, and on the milestones agreed by the WG first.

CMP: Let me be clear: no other active OAM contributions do not imply this document is useful or sensible.

CMP: As I already mentioned, the framework document shows how ICMP is enough for most needs, it can be enhanced, it also shows other existing approaches.

> 
>> 3. There are already documented SFC traceroute implementations but this document has no implementation experience. See #2 above.
>> GIM>> As mentioned in the SFC OAM Framework draft, ICMP may not fully address all the needs of tracing SFP. Is there any other document mentioned in the framework that can?
> 
> Greg,
> 1. Yes, I-D.penno-sfc-trace has the indisputable running code proof.
> GIM2>> It is interesting that you present a draft that was abandoned by its authors for more than five years as a possible foundation of a specification to facilitate interoperable implementations.

CMP: Greg, I-D.penno-sfc-trace *has* interoperable implementations already.

CMP: Since you bring this up, can you please explain to the WG which implementations exist of draft-ietf-sfc-multi-layer-oam? Please :-)

> Personally, I am not questioning that there are tools to address the problem that we are addressing with the SFC NSH Echo Request/Reply proposal. But these are proprietary tools and, at least so far, none of its authors stepped in with a document sufficient to have interoperable implementations.

CMP: Do you realize that none of these are valid explanations of why it makes sense to start a brand new protocol from scratch without answering the comparative to existing?

> 2. Instead of copying MPLS LSP Ping into a brand new protocol, fill in the gaps based on existing modules.
> GIM2>> Again, thank you for sharing your suggestions. True, SFC NSH shares ideas with the design proven by MPLS LSP.

CMP: "Shares ideas" is an understatement, for the record.

> Our approach is no different from the approach taken by authors, including you and me, of draft-ietf-bier-ping <https://datatracker.ietf.org/doc/draft-ietf-bier-ping/>.

CMP: Another diversion. Let’s talk about your document in SFC :)
CMP: That said, the approach is hugely different, for multicast vs. unicast service path chaining. Is that an oversimplification fallacy?

> As noted earlier, the fact that there's no contribution that uses the path you've been advocating for 2+ years may be interpreted as the indication that it is not a practical direction.

CMP: Greg, another fallacy. There are many potential reasons.

CMP: If you ask me, frankly, I think the WG does not care enough about this topic to begin with — that is no reason to let any idea in paper go through.

> 
> The point here is implementation experience — could you answer the still unanswered question #1 here?
> https://mailarchive.ietf.org/arch/msg/sfc/NdxlfxBuvaFp3eU8yFuLqKvNteQ/ <https://mailarchive.ietf.org/arch/msg/sfc/NdxlfxBuvaFp3eU8yFuLqKvNteQ/>
> GIM2>> I will look into it and respond in a separate mail.

CMP: Thanks. That said, I’m signing off from this thread as the ROI of responding does not add up.

Best,

Carlos.

> 
> 
>> 
>> Dear Greg,
>> 
>> Could you please start responding to previous questions? Apologies in advance if I missed any of your responses.
>> 
>>> Per our analysis, existing OAM mechanisms cannot support both SFP ping and SFP traceroute.
>> 
>> Which analysis? Perhaps you could share that analysis?
>> GIM>> Gladly. I was referring to ICMP over SFC NSH. As noted in the framework draft, ICMP can be used to ping an SFC entity along the SFP if the sender knows the IP address of that entity and the number of IP hops to that distance (rather impractical but theoretically achievable). But can ICMP be used to trace the given SFP without the upfront knowledge of IP addresses of SFC entities along the SFP? Based on our analysis, not. Assume that the destination IP address is set to the IP address of the last SFF (similar to how ICMP traceroute works in IP network) and TTL in NSH is set to 1. The first downstream from the sender SFF will remove the NSH and forward the ICMP packet to its destination over the IP network.
> 
> NOT.
> 
> As I had pointed out earlier, there are MANY ways of intercepting a packet. Use an IP option or a flag in the NSH.
> GIM2>> I don't argue that the solution described in the draft is the only possible. But can you point to a document that describes, sufficiently accurately
> 
> Problems with your logic:
> 1. When you say ICMP you are thinking unmodified ICMP Echo packet. Think outside that box.
> GIM2>> Again, thank you for sharing your ideas. Probably some of your colleagues will get interested and develop a solution based on them.
> 2. Whatever you use you need to intercept.
> GIM2>> Agree. I believe that the solution described in the draft addresses that problem.
> 
>> Similarly, when NSH' TTL incremented, the second SFF will remove NSH and forward ICMP packet to its destination, i.e. the last SFF. As a result, all ICMP echo replies the sender will receive will be from the same SFF, from the last SFF in the given SFP. Clearly, that is not what a traceroute tool should produce.
>> 
>>> Consider ICMP. When encapsulated in NSH, it supports the ping function but, per our analysis, cannot be used as an SFP tracing tool.
>> 
>> What exactly did you need to add to have that functionality as opposed to your consideration of ICMP?
>> GIM>> A dedicated to SFC NSH OAM protocol type.
>> 
> 
> Incorrect again. There is no technical need to add an SFC NSH OAM protocol type. There are many ways of marking a pak as OAM and demultiplexing the protocol.
> GIM2>> We, the authors, are not claiming that the proposed solution is the only one possible. We've analyzed options and decided to develop this approach. Others can decide differently and present their work as a draft.
> 
> I do understand you have a solution in mind.
> GIM2>> Indeed, it is documented in the draft being discussed. Also, there are several individual SFC OAM drafts that use SFC NSH Echo Request/Reply mechanism.
> 
> Carlos.
> 
>> Thanks!
>> 
>> Carlos.
>> 
>> 
>> 
>>> 2020/05/20 午後10:51、Greg Mirsky <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>>のメール:
>>> 
>>> Dear All,
>>> this version includes a minor update to the Security Considerations section.
>>> We, the authors, believe that the draft is ready for the WG LC. It defines an essential function of SFC OAM - SFP Echo request/reply. Per our analysis, existing OAM mechanisms cannot support both SFP ping and SFP traceroute. Consider ICMP. When encapsulated in NSH, it supports the ping function but, per our analysis, cannot be used as an SFP tracing tool.
>>> We much appreciate your comments and questions.
>>> 
>>> Dear Jim and Joel,
>>> please kindly consider the WG LC for this draft.
>>> 
>>> Regards,
>>> Greg
>>> 
>>> ---------- Forwarded message ---------
>>> From: <internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
>>> Date: Wed, May 20, 2020 at 6:32 PM
>>> Subject: New Version Notification for draft-ietf-sfc-multi-layer-oam-05.txt
>>> To: Bhumip Khasnabish <vumip1@gmail.com <mailto:vumip1@gmail.com>>, Cui(Linda) Wang <lindawangjoy@gmail.com <mailto:lindawangjoy@gmail.com>>, Greg Mirsky <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com>>, Wei Meng <meng.wei2@zte.com.cn <mailto:meng.wei2@zte.com.cn>>
>>> 
>>> 
>>> 
>>> A new version of I-D, draft-ietf-sfc-multi-layer-oam-05.txt
>>> has been successfully submitted by Greg Mirsky and posted to the
>>> IETF repository.
>>> 
>>> Name:           draft-ietf-sfc-multi-layer-oam
>>> Revision:       05
>>> Title:          Active OAM for Service Function Chains in Networks
>>> Document date:  2020-05-20
>>> Group:          sfc
>>> Pages:          18
>>> URL:            https://www.ietf.org/internet-drafts/draft-ietf-sfc-multi-layer-oam-05.txt <https://www.ietf.org/internet-drafts/draft-ietf-sfc-multi-layer-oam-05.txt>
>>> Status:         https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/ <https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/>
>>> Htmlized:       https://tools.ietf.org/html/draft-ietf-sfc-multi-layer-oam-05 <https://tools.ietf.org/html/draft-ietf-sfc-multi-layer-oam-05>
>>> Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-sfc-multi-layer-oam <https://datatracker.ietf.org/doc/html/draft-ietf-sfc-multi-layer-oam>
>>> Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-multi-layer-oam-05 <https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-multi-layer-oam-05>
>>> 
>>> Abstract:
>>>    A set of requirements for active Operation, Administration and
>>>    Maintenance (OAM) of Service Function Chains (SFCs) in networks is
>>>    presented.  Based on these requirements an encapsulation of active
>>>    OAM message in SFC and a mechanism to detect and localize defects
>>>    described.  Also, this document updates RFC 8300 in the definition of
>>>    O (OAM) bit in the Network Service Header (NSH) and defines how the
>>>    active OAM message identified in SFC NSH.
>>> 
>>> 
>>> 
>>> 
>>> Please note that it may take a couple of minutes from the time of submission
>>> until the htmlized version and diff are available at tools.ietf.org <http://tools.ietf.org/>.
>>> 
>>> The IETF Secretariat
>>> 
>>> 
>>> _______________________________________________
>>> sfc mailing list
>>> sfc@ietf.org <mailto:sfc@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/sfc <https://www.ietf.org/mailman/listinfo/sfc>