Re: [sfc] TR: I-D Action: draft-boucadair-sfc-oam-packet-00.txt

"Joel M. Halpern" <jmh@joelhalpern.com> Thu, 24 February 2022 13:40 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D05A73A0D5A for <sfc@ietfa.amsl.com>; Thu, 24 Feb 2022 05:40:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.812
X-Spam-Level:
X-Spam-Status: No, score=-2.812 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.714, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pMicBQ1aYFDL for <sfc@ietfa.amsl.com>; Thu, 24 Feb 2022 05:40:03 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 615233A0D61 for <sfc@ietf.org>; Thu, 24 Feb 2022 05:40:03 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 4K4DYH1FnZz1nv1J; Thu, 24 Feb 2022 05:40:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1645710003; bh=Wx3yx3W7o1x7A1ej3EAIcVV/WBXzuK3C34MUtbozW+8=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=hh2/boMsawpu02w/6vXye1e0L+KTdsaHt/B+s3HXCAJ3o1cJeBZ5L4Z+LhdCvKLXJ LsvYgkJ9RmpQ4WmVxAbqOYljQeBmXxYuJYiFrRF0ibaEfnYmswDSx9FnveWR5ldnQP B7O17jqEEdSrfMQQ4ViXPcnllyvRqtU0nv02aTJo=
X-Quarantine-ID: <MHbGLIuWMjir>
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from [192.168.22.111] (50-233-136-230-static.hfc.comcastbusiness.net [50.233.136.230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 4K4DYG3dVpz1nsbZ; Thu, 24 Feb 2022 05:40:02 -0800 (PST)
Message-ID: <a61f9edc-d74c-0548-5c1b-06deafbbc935@joelhalpern.com>
Date: Thu, 24 Feb 2022 08:40:01 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.6.1
Content-Language: en-US
To: mohamed.boucadair@orange.com, Greg Mirsky <gregimirsky@gmail.com>
Cc: "sfc@ietf.org" <sfc@ietf.org>
References: <164502226599.23621.11371897310173936133@ietfa.amsl.com> <14238_1645022412_620D0CCC_14238_64_1_787AE7BB302AE849A7480A190F8B933035494D1E@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <CA+RyBmXTSUdfovvnSpQjoo_Svwm-amC-bRm0eyscUHgY2hYx9g@mail.gmail.com> <30956_1645025435_620D189B_30956_353_1_787AE7BB302AE849A7480A190F8B933035494DD5@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <CA+RyBmWg=-ksKup=-7UkCAW_wxWHUFYF3Q6_pven6=tCMCjRPQ@mail.gmail.com> <3535_1645028520_620D24A8_3535_225_1_787AE7BB302AE849A7480A190F8B933035494EAE@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <5efa6354-4396-d1b1-bec3-122d2aa148c2@joelhalpern.com> <26440_1645082031_620DF5AF_26440_39_1_787AE7BB302AE849A7480A190F8B9330354954F7@OPEXCAUBMA2.corporate.adroot.infra.ftgroup> <16224_1645689365_62173A15_16224_31_1_787AE7BB302AE849A7480A190F8B933035498F45@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
In-Reply-To: <16224_1645689365_62173A15_16224_31_1_787AE7BB302AE849A7480A190F8B933035498F45@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/o3vbalNedlv4WWCJrEppx_pVNsU>
Subject: Re: [sfc] TR: I-D Action: draft-boucadair-sfc-oam-packet-00.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Feb 2022 13:40:08 -0000

May a suggest a small refinement?
     The setting and processing of the O bit neither assumes nor expects 
detailed analysis of the contents of any IP packets carried by NSH.  As 
such, SFFs and SFs SHOULD discard any NSH packets with the O bit set and 
Next protocol set to something that is not itself an OAM protocol.  THis 
includes discarding the packet when O bit is set and the Next Protocol 
is set to 0x01 (IPv4), 0x02 (IPv6), 0x03 (MPLS), or 0x05 (Ethernet).

Yours,
Joel

On 2/24/2022 2:56 AM, mohamed.boucadair@orange.com wrote:
> Hi Joel, all,
> 
> FWIW, I updated -02 with the following to reflect one of the points discussed below:
> 
>        When an OAM data is included in the inner packet, the Next
>        Protocol field is set to reflect the structure of that inner
>        packet.  By default, SFFs SHOULD discard NSH packets with O bit
>        set and Next Protocol set to 0x1 (IPv4), 0x2 (IPv6), 0x3 (MPLS),
>        or 0x5 (Ethernet).
> 
> Cheers,
> Med
> 
>> -----Message d'origine-----
>> De : sfc <sfc-bounces@ietf.org> De la part de
>> mohamed.boucadair@orange.com
>> Envoyé : jeudi 17 février 2022 08:14
>> À : Joel M. Halpern <jmh@joelhalpern.com>om>; Greg Mirsky
>> <gregimirsky@gmail.com>
>> Cc : sfc@ietf.org
>> Objet : Re: [sfc] TR: I-D Action: draft-boucadair-sfc-oam-packet-00.txt
>>
>> Hi Joel,
>>
>>> If the NSH payload is an IP packet, and that packet is addressed to
>>> something other than this node, and that packet is carrying  an ICMP
>>> echo, is that an SFC OAM packet requiring the O-bit being set?
>>
>> Med: The NSH can be added by a classifier or directly by an SFC OAM
>> controller that issues the packet. If the original IP/ICMP packet is
>> received by a classifier, the classifier must not set the O bit as per
>> draft-boucadair-sfc-oam-packet because that packet is seen as data
>> packet.
>>
>> Let's now focus on the SFC OAM controller case:
>> * Does it makes sense for an SFC OAM controller to "leverage" IP/ICMP
>> for SFC OAM purposes while it can do it directly using ICMP (without the
>> IP header)?
>>
>> I personally don't see any.
>>
>> * Does it makes sense for an SFC OAM controller to "supply" an IP/ICMP
>> as an input for specific OAM purposes?
>>
>> This is in theory possible for SF testing purposes (e.g., test the
>> behavior of a firewall against such packet. The output of the test will
>> be used to assess if the FW configuration is OK/NOK). However, such test
>> OAM packets have to be unambiguously identified as such. The Next
>> Protocol won't be set to IP but to the value assigned to an OAM
>> protocol.
>>
>>    And
>>> conversely, is an SFF required to check for that case if it sees an
>>> NSH with the O-bit set?
>>
>> Med: SFFs have to support policies whether some OAM messages can be
>> forwarded to SFs. These policies may include a filter on valid next
>> protocol values. I don't have an objection to discard by default packets
>> with O bit set and next protocol = IP/MPLS/Ethernet
>>
>> Cheers,
>> Med
>>
>>> -----Message d'origine-----
>>> De : Joel M. Halpern <jmh@joelhalpern.com> Envoyé : mercredi 16
>>> février 2022 17:30 À : BOUCADAIR Mohamed INNOV/NET
>>> <mohamed.boucadair@orange.com>om>; Greg Mirsky <gregimirsky@gmail.com>
>> Cc
>>> : sfc@ietf.org Objet : Re: [sfc] TR: I-D Action:
>>> draft-boucadair-sfc-oam-packet-00.txt
>>>
>>> Thank you for writing this.  I look forward to more dscussion by more
>>> WG members.
>>>
>>> I want to ask one clarifying quesiton about an example that was raised
>>> earlier.
>>>
>>> If the NSH payload is an IP packet, and that packet is addressed to
>>> something other than this node, and that packet is carrying  an ICMP
>>> echo, is that an SFC OAM packet requiring the O-bit being set?  And
>>> conversely, is an SFF required to check for that case if it sees an
>>> NSH with the O-bit set?
>>>
>>> Yours,
>>> Joel
>>>
>>> On 2/16/2022 11:21 AM, mohamed.boucadair@orange.com wrote:
>>>> Re-,
>>>>
>>>> This is determined by the entity that issues the OAM packet. This is
>>>> typically a dedicated OAM controller or an SFC element (classifier
>>>> for the ioam case, for example).
>>>>
>>>> BTW, I updated the draft to reflect your comments and also those
>>>> from
>>>> Jim:
>>>> https://www.ietf.org/rfcdiff?url2=draft-boucadair-sfc-oam-packet-01
>>>> <https://www.ietf.org/rfcdiff?url2=draft-boucadair-sfc-oam-packet-01
>>>>>
>>>>
>>>> Cheers,
>>>>
>>>> Med
>>>>
>>>> *De :* Greg Mirsky <gregimirsky@gmail.com> *Envoyé :* mercredi 16
>>>> février 2022 16:52 *À :* BOUCADAIR Mohamed INNOV/NET
>>>> <mohamed.boucadair@orange.com> *Cc :* sfc@ietf.org *Objet :* Re:
>>>> [sfc]
>>>> TR: I-D Action: draft-boucadair-sfc-oam-packet-00.txt
>>>>
>>>> Hi Med,
>>>>
>>>> thank you for your expedient response. I have a follow-up question:
>>>>
>>>>      How does one determine the nature, OAM or not-OAM, of data
>>> elements
>>>>      in the NSH Context header?
>>>>
>>>> As I understand it, draft-ietf-sfc-nsh-tlv does not provide that. Do
>>>> we need to add it? Appreciate your thoughts on that.
>>>>
>>>> Regards,
>>>>
>>>> Greg
>>>>
>>>> On Wed, Feb 16, 2022 at 7:30 AM <mohamed.boucadair@orange.com
>>>> <mailto:mohamed.boucadair@orange.com>> wrote:
>>>>
>>>>      Hi Greg,
>>>>
>>>>      Please see inline.
>>>>
>>>>      Cheers,
>>>>
>>>>      Med
>>>>
>>>>      *De :* Greg Mirsky <gregimirsky@gmail.com
>>>>      <mailto:gregimirsky@gmail.com>>
>>>>      *Envoyé :* mercredi 16 février 2022 16:13
>>>>      *À :* BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com
>>>>      <mailto:mohamed.boucadair@orange.com>>
>>>>      *Cc :* sfc@ietf.org <mailto:sfc@ietf.org>
>>>>      *Objet :* Re: [sfc] TR: I-D Action:
>>>>      draft-boucadair-sfc-oam-packet-00.txt
>>>>
>>>>      Hi Med,
>>>>
>>>>      many thanks for taking the lead and putting the proposal on the
>>> table.
>>>>
>>>>      I have a question on the proposed new text for the O bit and its
>>>>      possible effect on IOAM:
>>>>
>>>>          O bit:  Setting this bit indicates an SFC OAM packet.  Such
>>>> a packet
>>>>
>>>>             is any NSH-encapasulated packet that exclusively includes
>>>> an OAM
>>>>
>>>>             command and/or OAM data.
>>>>
>>>>      My understanding of the new definition of the O bit is that the
>>> NSH
>>>>      includes and/or encapsulates only OAM command and/or data. IOAM,
>>> as
>>>>      I understand its application in NSH, may follow the NSH and have
>>>>      user payload after the IOAM data.
>>>>
>>>>      *//*
>>>>
>>>>      */[Med] Packets that include also user data are not considered
>> as
>>>>      “OAM packets” as per the new definition./*
>>>>
>>>>      And another scenario, if Flow ID TLV is used to influence user
>>> data
>>>>      through SFP, OAM will apply the same Flow ID value. Would such
>>>>      packet still be considered as "exclusively includes OAM command
>>>>      and/or data"?
>>>>
>>>>      *//*
>>>>
>>>>      */[Med] Yes, they are. Flow id is just a constraint, if you
>> will,
>>>>      that is used to influence how OAM commands will be executed. /*
>>>>
>>>>      Regards,
>>>>
>>>>      Greg
>>>>
>>>>      On Wed, Feb 16, 2022 at 6:40 AM <mohamed.boucadair@orange.com
>>>>      <mailto:mohamed.boucadair@orange.com>> wrote:
>>>>
>>>>          Hi all,
>>>>
>>>>          A proposal to clarify the intent of SFC OAM packet. Comments
>>> are
>>>>          welcome.
>>>>
>>>>          Cheers,
>>>>          Med
>>>>
>>>>          -----Message d'origine-----
>>>>          De : I-D-Announce <i-d-announce-bounces@ietf.org
>>>>          <mailto:i-d-announce-bounces@ietf.org>> De la part de
>>>>          internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
>>>>          Envoyé : mercredi 16 février 2022 15:38
>>>>          À : i-d-announce@ietf.org <mailto:i-d-announce@ietf.org>
>>>>          Objet : I-D Action: draft-boucadair-sfc-oam-packet-00.txt
>>>>
>>>>
>>>>          A New Internet-Draft is available from the on-line
>>>>          Internet-Drafts directories.
>>>>
>>>>
>>>>                   Title           : Clarifying Ambiguity related to
>>>>          Network Service Header (NSH) OAM Packet
>>>>                   Author          : Mohamed Boucadair
>>>>                   Filename        : draft-boucadair-sfc-oam-packet-
>>> 00.txt
>>>>                   Pages           : 5
>>>>                   Date            : 2022-02-16
>>>>
>>>>          Abstract:
>>>>              This document clarifies an ambiguity in the Network
>>> Service
>>>>          Header
>>>>              (NSH) specification related to the handling of O-
>> bit.  In
>>>>          particular,
>>>>              this document clarifies the meaning of "OAM packet".
>>>>
>>>>              This document updates RFC8300.
>>>>
>>>>
>>>>          The IETF datatracker status page for this draft is:
>>>>          https://datatracker.ietf.org/doc/draft-boucadair-sfc-oam-
>>> packet/
>>>>
>>>> <https://datatracker.ietf.org/doc/draft-boucadair-sfc-oam-packet/>
>>>>
>>>>          There is also an htmlized version available at:
>>>>
>>>> https://datatracker.ietf.org/doc/html/draft-boucadair-sfc-oam-
>>> packet-00
>>>>
>>>> <https://datatracker.ietf.org/doc/html/draft-boucadair-sfc-oam-packe
>>>> t-
>>>> 00>
>>>>
>>>>
>>>>          Internet-Drafts are also available by rsync at
>>>>          rsync.ietf.org::internet-drafts
>>>>
>>>>
>>>>          _______________________________________________
>>>>          I-D-Announce mailing list
>>>>          I-D-Announce@ietf.org <mailto:I-D-Announce@ietf.org>
>>>>          https://www.ietf.org/mailman/listinfo/i-d-announce
>>>>          <https://www.ietf.org/mailman/listinfo/i-d-announce>
>>>>          Internet-Draft directories: http://www.ietf.org/shadow.html
>>>>          <http://www.ietf.org/shadow.html> or
>>>>          ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>>>>          <ftp://ftp.ietf.org/ietf/1shadow-sites.txt>
>>>>
>>>>
>>>> ____________________________________________________________________
>>>> __ ___________________________________________________
>>>>
>>>>          Ce message et ses pieces jointes peuvent contenir des
>>>>          informations confidentielles ou privilegiees et ne doivent
>>> donc
>>>>          pas etre diffuses, exploites ou copies sans autorisation. Si
>>>>          vous avez recu ce message par erreur, veuillez le signaler
>>>>          a l'expediteur et le detruire ainsi que les pieces jointes.
>>> Les
>>>>          messages electroniques etant susceptibles d'alteration,
>>>>          Orange decline toute responsabilite si ce message a ete
>>> altere,
>>>>          deforme ou falsifie. Merci.
>>>>
>>>>          This message and its attachments may contain confidential or
>>>>          privileged information that may be protected by law;
>>>>          they should not be distributed, used or copied without
>>>>          authorisation.
>>>>          If you have received this email in error, please notify the
>>>>          sender and delete this message and its attachments.
>>>>          As emails may be altered, Orange is not liable for messages
>>> that
>>>>          have been modified, changed or falsified.
>>>>          Thank you.
>>>>
>>>>          _______________________________________________
>>>>          sfc mailing list
>>>>          sfc@ietf.org <mailto:sfc@ietf.org>
>>>>          https://www.ietf.org/mailman/listinfo/sfc
>>>>          <https://www.ietf.org/mailman/listinfo/sfc>
>>>>
>>>>
>>>> ____________________________________________________________________
>>>> __ ___________________________________________________
>>>>
>>>>      Ce message et ses pieces jointes peuvent contenir des
>>>> informations confidentielles ou privilegiees et ne doivent donc
>>>>
>>>>      pas etre diffuses, exploites ou copies sans autorisation. Si
>>>> vous avez recu ce message par erreur, veuillez le signaler
>>>>
>>>>      a l'expediteur et le detruire ainsi que les pieces jointes. Les
>>>> messages electroniques etant susceptibles d'alteration,
>>>>
>>>>      Orange decline toute responsabilite si ce message a ete altere,
>>> deforme ou falsifie. Merci.
>>>>
>>>>      This message and its attachments may contain confidential or
>>>> privileged information that may be protected by law;
>>>>
>>>>      they should not be distributed, used or copied without
>>> authorisation.
>>>>
>>>>      If you have received this email in error, please notify the
>>>> sender
>>> and delete this message and its attachments.
>>>>
>>>>      As emails may be altered, Orange is not liable for messages that
>>> have been modified, changed or falsified.
>>>>
>>>>      Thank you.
>>>>
>>>> ____________________________________________________________________
>>>> __ ___________________________________________________
>>>>
>>>> Ce message et ses pieces jointes peuvent contenir des informations
>>>> confidentielles ou privilegiees et ne doivent donc pas etre
>>>> diffuses, exploites ou copies sans autorisation. Si vous avez recu
>>>> ce message par erreur, veuillez le signaler a l'expediteur et le
>>>> detruire ainsi
>>> que les pieces jointes. Les messages electroniques etant susceptibles
>>> d'alteration, Orange decline toute responsabilite si ce message a ete
>>> altere, deforme ou falsifie. Merci.
>>>>
>>>> This message and its attachments may contain confidential or
>>>> privileged information that may be protected by law; they should not
>>> be distributed, used or copied without authorisation.
>>>> If you have received this email in error, please notify the sender
>>>> and
>>> delete this message and its attachments.
>>>> As emails may be altered, Orange is not liable for messages that
>>>> have
>>> been modified, changed or falsified.
>>>> Thank you.
>>>>
>>>>
>>>> _______________________________________________
>>>> sfc mailing list
>>>> sfc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/sfc
>>
>> ________________________________________________________________________
>> _________________________________________________
>>
>> Ce message et ses pieces jointes peuvent contenir des informations
>> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
>> exploites ou copies sans autorisation. Si vous avez recu ce message par
>> erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les
>> pieces jointes. Les messages electroniques etant susceptibles
>> d'alteration, Orange decline toute responsabilite si ce message a ete
>> altere, deforme ou falsifie. Merci.
>>
>> This message and its attachments may contain confidential or privileged
>> information that may be protected by law; they should not be
>> distributed, used or copied without authorisation.
>> If you have received this email in error, please notify the sender and
>> delete this message and its attachments.
>> As emails may be altered, Orange is not liable for messages that have
>> been modified, changed or falsified.
>> Thank you.
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
> 
> _________________________________________________________________________________________________________________________
> 
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.
>