Re: [sfc] Regarding last call for draft-ietf-sfc-multi-layer-oam
"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Sun, 14 November 2021 07:50 UTC
Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 74D463A0B45
for <sfc@ietfa.amsl.com>; Sat, 13 Nov 2021 23:50:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001,
RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001,
USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key)
header.d=cisco.com header.b=FeL2rmjq;
dkim=pass (1024-bit key)
header.d=cisco.onmicrosoft.com header.b=WYLhQYAQ
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id vqT_SzjolV2X for <sfc@ietfa.amsl.com>;
Sat, 13 Nov 2021 23:50:19 -0800 (PST)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94])
(using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 719FD3A0B42
for <sfc@ietf.org>; Sat, 13 Nov 2021 23:50:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple;
d=cisco.com; i=@cisco.com; l=70929; q=dns/txt;
s=iport; t=1636876219; x=1638085819;
h=from:to:cc:subject:date:message-id:references:
in-reply-to:mime-version;
bh=sjM6z64SmrbPvhkP/qqsUqTejf+KmTGac85lcpMKhRM=;
b=FeL2rmjqIGO1jYR+6WtsSpvNfavEj59vvX46lrljxBvl0DGkNP6GBlsV
VM+m83Kh8RmSDey3TCmX9RQIe6mdSQugA4fQO0tSgv3uVxn6nv1+b8SJO
N5QRvnl5r4CljnUUwAAL0OlhThmS49D2QyuQsfIZhwTHmoYTTs5YQsYA3 8=;
X-IPAS-Result: =?us-ascii?q?A0AYAAB4v5Bhl4cNJK1QChwBAQEBAQEHAQESAQEEBAEBg?=
=?us-ascii?q?gUHAQELAYEgMSMGKH5aNzGER4NHA4RZYIgQkC2KYoEuFIERA08FCwEBAQ0BA?=
=?us-ascii?q?SoBCgwEAQGFBAIXgkkCJTQJDgECBAEBAQEDAgMBAQEBBQEBBQEBAQIBBgQUA?=
=?us-ascii?q?QEBAQEBAQGBCIVoDYZDAgEDAQEQCAMGHQEBJQcLAQ8CAQYCOAEGAwICAiULF?=
=?us-ascii?q?BECBA4FGweCTwGBflcDLwECDEKOR482AYE6AoofeoExgQGCCAEBBgQEhQoYg?=
=?us-ascii?q?jUDBoE6AYMLgnwTQUoBAYRXgi0nHIFJRIEUASccgmc+gmMBAYErAQcLASCDG?=
=?us-ascii?q?TeCLo8NAWsIPhkLBB0FBQgkAiA5IAoTNRIjAgYJHwspEZFbBAeCd0eJFTuNH?=
=?us-ascii?q?ZEPgSQKgzmfAgUtg2yLc4ZMi1CFMZYUoHoEEwkBSgGEHQIEAgQFAg4BAQaBM?=
=?us-ascii?q?DE5a3BwFTsqAYI+PhMZD44gGYENAQKCSUaEToVKdDgCBgEKAQEDCY9bAQE?=
IronPort-PHdr: A9a23:2GPp0BX6T4viGzy0ZzJP3i9sGC3V8K0UAWYlg6HPw5pMdamn/53mJ
EHF47Nmi1qaFYnY6vcRje3QvuigXGEb+p+OvTgEd4AETB4Kj8ga3mlCSM6IAEH2NrjmOio9G
skRVlho+3GyNVBYAsC4bFrX8TW+6DcIEUD5Mgx4bu3+Bo/ViZGx0Oa/s53eaglFnnyze7R3e
R63tg7W8MIRhNgKFw==
IronPort-Data: A9a23:3WZSAq71x7SXqtjQ1nVAqAxRtPfHchMFZxGqfqrLsTDasY5as4F+v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IronPort-HdrOrdr: A9a23:lwMJAqNYSfncfMBcT2L155DYdb4zR+YMi2TDiHoRdfUFSKKlfp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-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.87,233,1631577600";
d="scan'208,217";a="776314938"
Received: from alln-core-2.cisco.com ([173.36.13.135])
by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA;
14 Nov 2021 07:50:10 +0000
Received: from mail.cisco.com (xbe-aln-007.cisco.com [173.36.7.22])
by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 1AE7oA26003293
(version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK);
Sun, 14 Nov 2021 07:50:10 GMT
Received: from xfe-aln-001.cisco.com (173.37.135.121) by xbe-aln-007.cisco.com
(173.36.7.22) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Sun, 14 Nov
2021 01:50:10 -0600
Received: from xfe-rtp-003.cisco.com (64.101.210.233) by xfe-aln-001.cisco.com
(173.37.135.121) with Microsoft SMTP Server (version=TLS1_2,
cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Sun, 14 Nov
2021 01:50:09 -0600
Received: from NAM02-BN1-obe.outbound.protection.outlook.com (64.101.32.56) by
xfe-rtp-003.cisco.com (64.101.210.233) with Microsoft SMTP Server
(version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15
via Frontend Transport; Sun, 14 Nov 2021 02:50:09 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=jV6OHVzOIXEbM+oWGvKUbkQPFBivVOMQLUY7BF+Iv6vZq2bOOcwKbAV3kH0yJf+90bDRtTFROClxmPzsdzX0499qMJFgvAblJigYB5k1oC5FEt1P7eZOXVSxw7oCAk5QxAGvZYrOLqJYNf0TDEZosCrQcwuzXEc/yogPeIIMpjaDhWdU4jAiVKeH20MSdZGG+/9/uBqeEvOD64WuUjyRk9/hlRnvbXFt4DyoMScLpTXESZ/mR8IqQwYCnB1/qkxuP+Q78bcHqaHjoCTMOkUjK8Nm8yppBYCDL1C4dN30/yge8Ff+KRW3NAALSEoVviiwar8RRKoj9Ax6hpvm5i6NIQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=sjM6z64SmrbPvhkP/qqsUqTejf+KmTGac85lcpMKhRM=;
b=Tc+6TjrNRCD4dedcc1BD6o+OMgwjlQ/OO+4m6T1D2+uicjqIn8QH2yWvcOzG4Rl+MY+gtFU+LjlzGjzew089nUHHHYPokWU23HUsI6+IukVq5WU0ZpqVCaDEaemRuSROdtWurFRh/vR0K+OW/Dd3FfqB0uocFcPjVcITz3OYQKnp3fZg3ZL+3b0Mu96NCBnGcMDn8ZNoRzde+j1UDR3KMZndImR2WtM2RxBWW5viqpsCrY9kLa3zHqHusUaiZz2eHT+ZwUPbflBBDUMFCa3MZX30PJE0bepmgll5yzz9Ex1MPQndblOuk5hKdLyz6kTpiki3xpI3Vkqc+01f7UTUbA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com;
dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com;
s=selector2-cisco-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=sjM6z64SmrbPvhkP/qqsUqTejf+KmTGac85lcpMKhRM=;
b=WYLhQYAQXCvb/VnrvFlRYUP/xHOpHdKrSJSFiP2f6f+GPrkj+IYLCxYEfkjT1cERijMsvEQV/nQrYo0v7tTdKDe2MOvCjT3zMluQCn4ibQmhaBb4NqwdEsh7caMCHU7Wof3sARh0uc8uqG1Ogg1W9bWF9qluW8/cyqLw09gUxdk=
Received: from SJ0PR11MB5629.namprd11.prod.outlook.com (20.183.94.109) by
SJ0PR11MB5678.namprd11.prod.outlook.com (20.183.93.214) with Microsoft SMTP
Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id
15.20.4669.13; Sun, 14 Nov 2021 07:50:08 +0000
Received: from SJ0PR11MB5629.namprd11.prod.outlook.com
([fe80::b038:49b7:ed0:b4f7]) by SJ0PR11MB5629.namprd11.prod.outlook.com
([fe80::b038:49b7:ed0:b4f7%4]) with mapi id 15.20.4690.027; Sun, 14 Nov 2021
07:50:08 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Joel Halpern Direct <jmh.direct@joelhalpern.com>
CC: "sfc@ietf.org" <sfc@ietf.org>, James N Guichard
<james.n.guichard@futurewei.com>, Greg Mirsky <gregimirsky@gmail.com>
Thread-Topic: [sfc] Regarding last call for draft-ietf-sfc-multi-layer-oam
Thread-Index: AQHXz1F5VJOSQmp5JUWoFDH4F9jk5KwCudcA
Date: Sun, 14 Nov 2021 07:50:07 +0000
Message-ID: <05FDF1D8-6CBD-403B-8F51-88E51346A36F@cisco.com>
References: <4bb5abb4-a8dc-c8f0-9b99-549f683e7729@joelhalpern.com>
In-Reply-To: <4bb5abb4-a8dc-c8f0-9b99-549f683e7729@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3693.20.0.1.32)
authentication-results: joelhalpern.com; dkim=none (message not signed)
header.d=none;joelhalpern.com; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0b3429c3-1a14-4013-6f8d-08d9a74360ea
x-ms-traffictypediagnostic: SJ0PR11MB5678:
x-microsoft-antispam-prvs: <SJ0PR11MB5678393F188763164C1C7F55C7979@SJ0PR11MB5678.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM;
H:SJ0PR11MB5629.namprd11.prod.outlook.com; PTR:; CAT:NONE;
SFS:(366004)(508600001)(30864003)(86362001)(966005)(2906002)(2616005)(83380400001)(186003)(6486002)(26005)(8936002)(33656002)(122000001)(91956017)(76116006)(54906003)(6916009)(66556008)(6506007)(66946007)(66446008)(64756008)(36756003)(5660300002)(316002)(6512007)(4326008)(38070700005)(71200400001)(38100700002)(66476007)(8676002)(45980500001);
DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?YlM1U0MvajhoMkh3L2p4bFowZEdYWmVjT1J1cDc3a2RnVHFlQ0tjSzNrMERt?=
=?utf-8?B?N0k1MEY4d0d5eWRPZ0VuRTZxVkNSYmpIaFJtQWJ1Y1dUV2NiVWxIeFNuVTR3?=
=?utf-8?B?dUlrRWFOVHRDcEVFSlNzN1RBYjQxdVZ4SmVGZFozbUNSZnJDMWRJS1VVd2k3?=
=?utf-8?B?YXl6TWJXUU5QR1ZUQ3MwVE9xVmlZT3ZxNzB1TXlaa09PbGJMY1NOZld1Q3BM?=
=?utf-8?B?SFZqK1AvV3BUT0pSdzRpNytra25oY0FSU25GTndBcHJrNVhZMEwzWFZZVlRJ?=
=?utf-8?B?NmRQYXhYN2JabE00bDlVVHh3UG1nYzVWVXVoYjBNQ0xmdW5vL0gwR1I4YnRT?=
=?utf-8?B?ZUcrYnVNc0wzdm8vUXowSTZDUVBURG5uQ1NTVytmRVEyN2haaTRQYXdkU3Bl?=
=?utf-8?B?ZXowS3VPdi9lSzJJNytsR0ZvUXExL0lFbjZ1RlJqRW4vWjRLd3djZ0VNUjVF?=
=?utf-8?B?MVBTdFRWaERxSkRPYTZWU1d2U1ErMFRFK1pQeEs0dFFVaXFxVmJSRWtZSTVW?=
=?utf-8?B?ZUxOUW9ISjV3eVNwZjQxRWFZdzFYN2RZV0srazdRMXNMRVRneFhFdFdvdENE?=
=?utf-8?B?MUxVV3ZSOThveitpSkxHaURhREJtNXovWnp0N0ZlL2dJMVhOUlEvWExNNDVL?=
=?utf-8?B?UTdTQWhETGdkc2U2RVNEdUsrcnAzcks5UTFDV3p0cWFHM011SXB0VERaUGFp?=
=?utf-8?B?L1R5UVhUYlJXcnZvbjdSRTYzc3RnQU5oZFJZNXB6MWFTbWtxRWRzZkt5aCtF?=
=?utf-8?B?emFGT0V1Q3E3UmhqRGVHbVRzMkJIemNTZ2RwaEk1dmttQk03Skpud1ZaejlJ?=
=?utf-8?B?QzM5cTVqcGpvVzBJK3U1Y0UvMFpWNW02ZnZXUGFuRGN2c1VDMmV1a3pnOElE?=
=?utf-8?B?V29yeW9NTFdQOUFZZUsxZ3huK2FwRUN4enlIZmFoN01wZ29rSk5IdFBjVjdr?=
=?utf-8?B?Ym5qQkpPbERTdFpOWmEvOFluMnVNTzZYY1RPUmduYmtFcTEyTWdYR2czMTNX?=
=?utf-8?B?Y25wakRpU2QydnNPbS9RelEzK2R6L2pybHJUNzdtcmZWUUI1aDl4YkNrZHNM?=
=?utf-8?B?SW81MGQ4VExleUF0d1lZakZPOGR6ZzRQZU9YeGt5c21KcUJObnRKWmE3TmVX?=
=?utf-8?B?clBuUWNXdndUTzMyNDZkT3hzZHlYUTdDTURvc1pJT0d1Y1NDS2NGb2pVajF0?=
=?utf-8?B?TzlOTUtQNjhDTFFURGRxU1ROMkxOWEVnQmUwVnV6cDAxbXV4czZZZ3BFbmc2?=
=?utf-8?B?Q25YZXlFZDRkMGVnbmEyVnB0TGkyUWZHc04rVDd6WWNBcDF2dnlKdXA4b1hI?=
=?utf-8?B?L3pGc3NwY2lyekhNdzFYNWpXRWR4U2NDT0FzTmRhYVREcG9jK3plZDczcTZa?=
=?utf-8?B?Nms1M0hRdStCNXRjeUJ0MFFOR3REVmh1OXhUNzNla2VpVjJUeXoweU56SG1U?=
=?utf-8?B?OCt0NWZVZHYxb2ZCSStSeVhUQWdub1JpL094Y1IzU01ZRGZKMUhaeXJxRE02?=
=?utf-8?B?aGUyZ2h4MFlsL2FSSUlaeFNpZXBzNVBxMTlDMURiMzdZTUVRUlVsaGNmM01R?=
=?utf-8?B?Q3hXc2dhNkxONE9na3RoNEVyOGNoOHhlSWZYMzQ1ekZOUGtZdlZRdUE0TGtE?=
=?utf-8?B?bllSWHVIUEd4cGtIZDJNamIydVJNZUdKVzFIMWFQdXlTYlM3VmxqUmVMQXcy?=
=?utf-8?B?bGdoemVuaVN1djFCVXVCVjJaVjk3djNuck0xS0FDczBGU3NxVnhWMXpxQjdy?=
=?utf-8?B?UHl2c1grdHpjamJDUTR1NlZ6bGZvRlY1V2tHVGFidWI5M2lQcXF6UmZVVnFK?=
=?utf-8?B?YnpURXIrL0V4Tlk5WWUwaDh6ZS9KUDJ4c2pZeEZIeTRxRlVIME1SNjVCQ00w?=
=?utf-8?B?RUtKZVd3MkFiUGdJRFlncVY3Nk1XZzNtZzF5WHkyTStjK0YweXl0c29CejFI?=
=?utf-8?B?L1pIbkJiVjU3WldZcko5RlhyMFRMU2tLTnJNZFpycVBiNTR1R0RjL2krdDFv?=
=?utf-8?B?SHlpVjFyZmFMSHFPNDJ4bGhTdU9xMmxuUURQMmgvL0lkMEVMcUZrMEVWWDdS?=
=?utf-8?B?cHZSd3JUS3V3bjZyaVY5VzhsU1pheERzbmdBZUdtK2szeFBFRkg2MWZ6L1Z3?=
=?utf-8?B?cWM5aXROMUt2WFZUTHFNczB6SVJFalY0aXVpeWZ0NTZ1ZVBETkdkbjVsRTkw?=
=?utf-8?Q?N1VijnVrx5MDuIGt41vXpEk=3D?=
Content-Type: multipart/alternative;
boundary="_000_05FDF1D86CBD403B8F5188E51346A36Fciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5629.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0b3429c3-1a14-4013-6f8d-08d9a74360ea
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Nov 2021 07:50:07.8547 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: gveGyCrfupn5oiNZE1dn8UavekvJzqXwOUci2nqjdp2dRUsPBKOaGtMBth9yeC1BDJqFpEEEWQYOSsizKqlmmg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB5678
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.22, xbe-aln-007.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/lh3O6B1ftF7zuq3xtd4LGzxS6qk>
Subject: Re: [sfc] Regarding last call for draft-ietf-sfc-multi-layer-oam
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>,
<mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>,
<mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Nov 2021 07:50:25 -0000
Hello, WG,
In reviewing draft-ietf-sfc-multi-layer-oam-16, I find that the issues listed below are such that I cannot support publication.
Observing what appears to be a single non-author response to the original WGLC email, and one more after this extension, I also perceive the energy level to work on this to be low.
Please find some review comments and observations, I hope these are useful:
Active OAM for Service Function Chaining
draft-ietf-sfc-multi-layer-oam-16
Abstract
A set of requirements for active Operation, Administration, and
Maintenance (OAM) of Service Function Chains (SFCs) in a network is
presented in this document. Based on these requirements, an
encapsulation of active OAM messages in SFC and a mechanism to detect
and localize defects are described.
First, a generic comment on the whole document: Even though the WG produces an SFC OAM framework in rfc8924, I cannot find exactly how draft-ietf-sfc-multi-layer-oam follows or maps to such framework.
* rfc8924 lists requirements in S4, but this document mentions them in passing. Instead, as per the Abstract above, this document creates new requirements and based on them creates a new OAM protocol.
* rfc8924 lists candidate SFC OAM tools, but this document does not consider them. Or compare requirements to options. Perhaps I could be pointed to the discussion on the list?
Additionally, I wonder: Why the file name “sfc-multi-layer-oam”?
Active OAM tools,
conformant to the requirements listed in Section 3, improve, for
example, troubleshooting efficiency and defect localization in SFP
because they specifically address the architectural principles of
NSH. For that purpose, SFC Echo Request and Echo Reply are specified
in Section 6.
I do not fully follow these cause-consequence pair of sentences. They seem to be foundational to the rational of the document, is this why a new OAM protocol is used?
Specifically, I feel this document over-reaches in that it presumes that the only “Active OAM” protocol for NSH SFCs is this new protocol, whereas some of the existing protocols listed in rfc8924 are also “Active OAM”.
This mechanism enables on-demand Continuity Check,
Connectivity Verification, among other operations over SFC in
networks, addresses functionalities discussed in Sections 4.1, 4.2,
and 4.3 of [RFC8924].
This could be well the case — however many others (including existing) mechanisms also enable in these broad terms all the connectivity+continuity+trace functions.
At the same time, this mechanisms is very complex.
I would like to see a study of comparative benefits of this added complexity vis-a-vis existing approaches that can be extended.
The ingress may be
capable of recovering from the failure, e.g., using redundant SFC
elements. Thus, it is beneficial for the egress to signal the new
defect state to the ingress, which in this example is the Classifier.
Hence the following requirement:
REQ#3: SFC OAM MUST support Remote Defect Indication notification
by the egress to the ingress.
I see a gap between “it is beneficial” and “MUST”. What is "Remote Defect Indication” in the context of SFC OAM since it is not in the OAM framework? Is this "Remote Defect Indication” the only way to achieve the rerouting or redundancy triggering?
4. Active OAM Identification in the NSH
The O bit in the NSH is defined in [RFC8300] as follows:
O bit: Setting this bit indicates an OAM packet.
This document updates that definition as follows:
O bit: Setting this bit indicates an OAM command and/or data in
the NSH Context Header or packet payload.
Active SFC OAM is defined as a combination of OAM commands and/or
data included in a message that immediately follows the NSH. To
identify the active OAM message, the "Next Protocol" field MUST be
set to Active SFC OAM (TBA1) (Section 9.1).
This is an example of over-reach. A “Next Protocol” pointing to IPv4, in turn pointing to ICMP, in turn pointing to Echo is already one example of “Active SFC OAM”. I wonder if this new protocol might be best served by choosing a name that is not so generic? It could be called “One of many active SFC OAM protocols” :-)
Otherwise, the “MUST” in the last sentence seems to not follow.
The rules for
interpreting the values of the O bit and the "Next Protocol" field
are as follows:
I am extremely concerned about this attempted re-definition (of the O-bit and Protocol fields). On several fronts as explained below. During RFC8300 the WG evaluated these and provided a solution already.
* O bit set and the "Next Protocol" value does not match one of
identifying active or hybrid OAM protocols (per classification
defined in [RFC7799]), e.g., defined in Section 9.1 Active SFC OAM
(TBA1).
This potentially breaks the concept of nodes not understanding OAM (i.e,. Partial deployment of a new protocol)
- a Fixed-Length Context Header or Variable-Length Context
Header(s) contain an OAM command or data.
- the "Next Protocol" field determines the type of payload.
The semantic of Context Headers is outside this definition. For example the types in MD Type 2 define the variable headers.
This potentially breaks also OAM, since things like ECMP can be encoded in context headers that the OAM needs. (e.g., "Flow ID” from draft-ietf-sfc-nsh-tlv).
Further, is this describing a Hybrid OAM use?
* O bit set and the "Next Protocol" value matches one of identifying
active or hybrid OAM protocols:
- the payload that immediately follows the NSH MUST contain an
OAM command or data.
This is also unclear — what is an OAM command or data? If the O-bit is set, it is an OAM packet.
* O bit is clear:
- no OAM in a Fixed-Length Context Header or Variable-Length
Context Header(s).
- the payload determined by the "Next Protocol" field MUST be
present.
It is unclear the rational for this.
* O bit is clear, and the "Next Protocol" field identifies active or
hybrid OAM protocol MUST be identified and reported as an
erroneous combination. An implementation MAY have control to
enable processing of the OAM payload.
This seems to break the existing usage in draft-ietf-sfc-ioam-nsh. Section 4.2 of draft-ietf-sfc-ioam-nsh says clearly:
4.2. IOAM and the use of the NSH O-bit
[RFC8300] defines an "O bit" for OAM packets. Per [RFC8300] the O
bit must be set for OAM packets and must not be set for non-OAM
packets. Packets with IOAM data included MUST follow this
definition, i.e. the O bit MUST NOT be set for regular customer
traffic which also carries IOAM data and the O bit MUST be set for
OAM packets which carry only IOAM data without any regular data
payload.
5. Active SFC OAM Header
As demonstrated in Section 4 [RFC8924] and Section 3 of this
document, SFC OAM is required to perform multiple tasks. Several
active OAM protocols could be used to address all the requirements.
When IP/UDP encapsulation of an SFC OAM control message is used,
protocols can be demultiplexed using the destination UDP port number.
But extra IP/UDP headers, especially in an IPv6 network, add
noticeable overhead. This document defines Active OAM Header
(Figure 2) to demultiplex active OAM protocols on an SFC.
Does this paragraph imply that the main reason for this protocol is this perceived overhead? If so, experience seems to show that in practice IP-encaped OAM works fine (as e.g., for LSP Ping).
Alternatively, “Next Protocols” could be defined for “raw” existing protocols.
Msg Type - six bits long field identifies OAM protocol, e.g., Echo
Request/Reply or Bidirectional Forwarding Detection.
Why does BFD get encapsulated in this new protocol, as opposed to using a “Next Protocol” for it? That looks like unnecessary overhead and indirection.
Flags - eight bits long field carries bit flags that define
optional capability and thus processing of the SFC active OAM
control packet, e.g., optional timestamping.
Does this timestamp conflict with context header timestamps? E.g., rfc8592 or draft-mymb-sfc-nsh-allocation-timestamp.
6. Echo Request/Echo Reply for SFC
Echo Request/Reply is a well-known active OAM mechanism extensively
used to verify a path's continuity, detect inconsistencies between a
state in control and the data planes, and localize defects in the
data plane. ICMP ([RFC0792] for IPv4 and [RFC4443] for IPv6
networks, respectively) and [RFC8029] are examples of broadly used
active OAM protocols based on the Echo Request/Reply principle. The
SFC Echo Request/Reply defined in this document addresses several
requirements listed in Section 3. Specifically, it can be used to
check the continuity of an SFP, trace an SFP, or localize the failure
within an SFP. The SFC Echo Request/Reply control message format is
presented in Figure 3.
This seems to be an important paragraph — would be useful to also understand how other existing and broadly used protocols cannot fulfill requirements.
Length - two-octet-long field equal to the Value field's length in
octets.
There are several nested lengths defined in this document — would be useful to analyze that they do not result in issues such as piggybacking unaccounted data.
6.3.1. Source TLV
Responder to the SFC Echo Request encapsulates the SFC Echo Reply
message in IP/UDP packet if the Reply mode is "Reply via an IPv4/IPv6
UDP Packet". Because the NSH does not identify the ingress node that
generated the Echo Request, the source ID MUST be included in the
message and used as the IP destination address and destination UDP
port number of the SFC Echo Reply. The sender of the SFC Echo
Request MUST include an SFC Source TLV (Figure 5).
This seems to negate the benefit of less overhead, if the IP/UDP fields are embedded as OAM TLVs.
This also seems to be a bit of an invitation for an attack.
6.4.1. Errored TLVs TLV
I wonder at this point if it is easier to use LSP Ping directly instead of re-define it.
6.5.1. SFC Reply Path TLV
…
* Service Index: the value for the Service Index field in the NSH of
the SFC Echo Reply message.
How is the service index in a reply constructed?
6.5.3. SFC Echo Reply Reception
An SFF SHOULD NOT accept SFC Echo Reply unless the received message
passes the following checks:
* the received SFC Echo Reply is well-formed;
* it has an outstanding SFC Echo Request sent from the UDP port that
matches destination UDP port number of the received packet;
Is the demultiplexing based on UDP, OAM handle, or combination?
6.6. Verification of the SFP Consistency
* Collect information of the traversed by the CVReq packet SFs and
send it to the ingress SFF as CVRep packet over IP network;
What if NSH is not over IP?
SF Type: Two octets long field. It is defined in [RFC9015] and
indicates the type of SF, e.g., Firewall, Deep Packet Inspection, WAN
optimization controller, etc.
Is RFC 9015 a hard dependency to implement this OAM?
IANA is requested to assign a new type from the SFC Active OAM
Message Type sub-registry as follows:
+=======+=============================+===============+
| Value | Description | Reference |
+=======+=============================+===============+
| TBA2 | SFC Echo Request/Echo Reply | This document |
+-------+-----------------------------+---------------+
Is there a single value for both Request and Reply?
9.2.1. Version in the Active SFC OAM Header
9.3.1. SFC Echo Request/Reply Version
There seems to be a version for the OAM and a version for the msg type. Is this correct? Are they hierarchical versions? Or independent?
This seems to overly complicate parsing and compliance.
9.3.3. SFC Echo Request/Echo Reply Message Types
Does this mean that there’s a protocol number for “Active OAM” with a protocol number for “Request/Reply” with a protocol number for either request or reply?
Values defined for the Return Codes sub-registry are listed in
Table 14.
Various values in this table are not defined in the document. The procedures seem lacking.
9.7. SF Identifier Types
This document seems to be creating a space for identifying SFs — which I thought was mostly outside the scope of OAM to test SFs.
Does this further imply that there’s a new requirement to have unique identifiers within the domain for all SFs?
I hope these comments and review questions and concerns are useful for the WG discussion and consideration.
Thanks,
Carlos.
Nov 1, 2021 2:50 PM、Joel Halpern Direct <jmh.direct@joelhalpern.com<mailto:jmh.direct@joelhalpern.com>>のメール:
I have received a polite request with explanation for delay asking for more time to read and review the subject document. Given the state of the working group, i want to encourage any and all review. So I am extending the last call by two additional weeks.
Please read and review the document.
Also, if you are willing to serve as shepherd for this, please let the chairs know. (Don't worry if you have not shepherded a document before. The chairs are more than happy to help you with the process.)
Thank you,
Joel
_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc
- [sfc] Regarding last call for draft-ietf-sfc-mult… Joel Halpern Direct
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Dirk.von-Hugo
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Donald Eastlake
- Re: [sfc] Regarding last call for draft-ietf-sfc-… wei.yuehua
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Gyan Mishra
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Gyan Mishra
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Gyan Mishra
- [sfc] SFC OAM gap analysis [Was Re: Regarding las… Greg Mirsky
- Re: [sfc] SFC OAM gap analysis [Was Re: Regarding… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Linda Dunbar
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Dirk.von-Hugo
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Huzhibo
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Frank Brockners (fbrockne)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Joel Halpern Direct
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Greg Mirsky
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Joel Halpern Direct
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Carlos Pignataro (cpignata)
- Re: [sfc] Regarding last call for draft-ietf-sfc-… Joel M. Halpern
- Re: [sfc] Regarding last call for draft-ietf-sfc-… mohamed.boucadair