[sfc] draft-ietf-sfc-nsh-tlv-02 - Network Service Header TLVs

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Tue, 31 March 2020 04:03 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DCD53A1A22 for <sfc@ietfa.amsl.com>; Mon, 30 Mar 2020 21:03:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.699
X-Spam-Level:
X-Spam-Status: No, score=-7.699 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=kTGqVy+U; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=xXY6hbq7
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2HXfc-3fLntk for <sfc@ietfa.amsl.com>; Mon, 30 Mar 2020 21:03:40 -0700 (PDT)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A8B413A1A20 for <sfc@ietf.org>; Mon, 30 Mar 2020 21:03:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=50421; q=dns/txt; s=iport; t=1585627420; x=1586837020; h=from:to:subject:date:message-id:mime-version; bh=P9i3nOthQisjNUTpu1Dpzhu2kBuSK1tPUHH9cm3zPi0=; b=kTGqVy+UNt/hd77iTfG4z7JJ6Rm41KhmqeGGC68gPuQ+HQY36n6bwFTA OGHsJuRPrbqp/9Y4U9GgJKWRJ3qTKk0oFgni/mffTdDDx4aKYeXFuS0oJ qUlr9DkJeaYXyriZBl+37BWYIDSzAzrzFIclv2BXReurTh3qTsTr59WZq 0=;
IronPort-PHdr: 9a23:RDGAyRCeHVwykTglBBrPUyQJPHJ1sqjoPgMT9pssgq5PdaLm5Zn5IUjD/qs03kTRU9Dd7PRJw6rNvqbsVHZIwK7JsWtKMfkuHwQAld1QmgUhBMCfDkiuJ+brYCozAM1qX15+9Hb9Ok9QS47z
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DJMwCawIJe/4gNJK1mHgELHIMgLyQsBWxYIAQLKgqEEINFA4prToFsmESBQoEQA1QKAQEBDAEBIwoCBAEBgTCDFBmCGyQ4EwIDAQELAQEFAQEBAgEFBG2FVgyGCREdAQElExEBBhQmAQkCBDAXEAQBNIMEAYF+TQMuAQ6RUpBnAoE5iGJ1gTKCfwEBBYEzAg5BQYJPGIIMAwaBOIwxGoFBP4ERJwwUhXIBAQIBARiBFAESASAYFoJlMoIskHqFeoonjld3CoI8hzwljzQdgkyIMJBwhFGKSIkWjzmDNAIEAgQFAg4BAQWBaSJncXAVGksBgkE+EhgNjh0JAwUSg1CFFIVBdIEpjFQBgQ8BAQ
X-IronPort-AV: E=Sophos;i="5.72,326,1580774400"; d="scan'208,217";a="746586481"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by rcdn-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 31 Mar 2020 04:03:39 +0000
Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by alln-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id 02V43dLR026319 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 31 Mar 2020 04:03:39 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 30 Mar 2020 23:03:38 -0500
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 30 Mar 2020 23:03:38 -0500
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Tue, 31 Mar 2020 00:03:38 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XKL+hqxsAkF4fAmju3pXWUL80SfMEysw1TWKfSuJ40dw/H+rayR2OCTMniJ/TAwqp08WWJxlLrcs2BZvLzGQHMaxVGmMlIowwW47O+0Rwf5MEYSGrBPaiqXs2EUGjYgMlnTGS6oFT8cXlUD8dZJKANm8pipyx2WRExizH7BpWQDauy+KKHF1tx09WMxprX8w6kzL0OYrPaV7Gu+13FrUUUT09i495qvUVeTJineovx7tFy7yQwMuO9HXiMkobez0vsKWo3ViVua3lREDSI2oLJUX1P0jpqSoANenfrkOEA61fpUfgASINnwhF3HXPadLjNH3XEpPqxC/nvyLI5UQHg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=P9i3nOthQisjNUTpu1Dpzhu2kBuSK1tPUHH9cm3zPi0=; b=oecqm7KohT/AvWH8Fway7cJFfq+bGF6ny/dh2pHIo9okIQLZl7hxWEC0BoPW4oHc71upf5opyLtO9YmySVAbb+NMf0GLsHnqnqxG3LP+H4gSKb5HwVSyH9uGp1VgfdvEyRNM5UORAAmwykZp/qKXZP2BBtr3Juyf9dAWyvQ9AlPcIahBuZuefiF+mqnpG0Uv6lu3Skz+T4f4n7762g8McieMnzYvirHvHQlMecXDYiFu1fixmIqWk8vlaJfkkeci01oQP7eCKt7s5G9EAVeCCEjL7SX8p/xKCDWUnwJhMLCu5r3xeF3CP59vuwgdzMNm3Tmedy0ZnZU7pBw6rXmlow==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=P9i3nOthQisjNUTpu1Dpzhu2kBuSK1tPUHH9cm3zPi0=; b=xXY6hbq7TuwmIdDVGCKLFiOz7/+xqVEbxAeJ+jLeSPRea+1FSWtQYznAqtA/VKYkUFvHnHqKGraOzMwMMT3Eo6L5h0FffpQ/oFhxNPqUtUtmWvOnfmtitETkRpnnavluXHI7RriZQA8NozrPWbFnC7fHfxlaOUXz+MDa6VjR3CI=
Received: from BN8PR11MB3635.namprd11.prod.outlook.com (2603:10b6:408:86::20) by BN8PR11MB3683.namprd11.prod.outlook.com (2603:10b6:408:8c::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2856.20; Tue, 31 Mar 2020 04:03:37 +0000
Received: from BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::2c08:cdcf:fc41:fe74]) by BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::2c08:cdcf:fc41:fe74%7]) with mapi id 15.20.2856.019; Tue, 31 Mar 2020 04:03:37 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "wei.yuehua@zte.com.cn" <wei.yuehua@zte.com.cn>, "sfc@ietf.org" <sfc@ietf.org>
Thread-Topic: draft-ietf-sfc-nsh-tlv-02 - Network Service Header TLVs
Thread-Index: AQHWBxFaQB8rSjGP5USjN56H9ct7gw==
Date: Tue, 31 Mar 2020 04:03:37 +0000
Message-ID: <D26A88B6-BE99-4BEA-9739-9DEADAB4D196@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.80.23.2.2)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cpignata@cisco.com;
x-originating-ip: [108.203.7.63]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ebe39494-3dcf-4cff-72a9-08d7d5287d46
x-ms-traffictypediagnostic: BN8PR11MB3683:
x-microsoft-antispam-prvs: <BN8PR11MB3683B55910913908AF1411CDC7C80@BN8PR11MB3683.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0359162B6D
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN8PR11MB3635.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(10009020)(4636009)(136003)(396003)(346002)(39860400002)(376002)(366004)(8936002)(81166006)(6506007)(33656002)(86362001)(8676002)(81156014)(110136005)(36756003)(316002)(478600001)(186003)(76116006)(66946007)(966005)(6486002)(26005)(71200400001)(66556008)(2906002)(2616005)(66446008)(6512007)(64756008)(5660300002)(66476007); DIR:OUT; SFP:1101;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: Ew0hyLvPKIDKwbZ6nNz1DdZ8memjWTBOtc/pFZ0x2xORjYJUDVp0mnh2GytnTIv+y4POQwkrC9aa/sBKLIvu9kX0vEmB1I6io8baji7M47NOyWK4nHiXmV2HH8+M4n6+UAcoLuL6TvnST3l8HwlVdw==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_D26A88B6BE994BEA97399DEADAB4D196ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: ebe39494-3dcf-4cff-72a9-08d7d5287d46
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Mar 2020 04:03:37.2112 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: jdMPFef+4rxiCEYoeSsBATMUv8rsHHICd/wIP/sZrTEvU6qrGE+oX5fsJLtF6HPjrA4stq7iF5zq+iL1m6tuQw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN8PR11MB3683
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.11, xch-aln-001.cisco.com
X-Outbound-Node: alln-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/pCyGJop9_t8FQZiE0olsdlS0AAI>
Subject: [sfc] draft-ietf-sfc-nsh-tlv-02 - Network Service Header TLVs
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Mar 2020 04:03:44 -0000

Hi, Wei, SFCers,

I hope this email finds you well!

I thought it would be useful to send not only specific comments but also text proposals on this draft
https://datatracker.ietf.org/doc/draft-ietf-sfc-nsh-tlv/?include_text=1

Here they go:


                      Network Service Header TLVs
                       draft-ietf-sfc-nsh-tlv-02


The title is a bit of a misnomer. It’s not NSH TLVs. This should be titled “Network Service Header Metadata Type 2 Variable-Length Context Headers”


Abstract

   This draft describes Network Service Header (NSH) MD-Type 2 metadata
   TLVs that can be used within a service function path.


—> "This draft describes Network Service Header (NSH) Metadata (MD) Type 2 variable-length context headers that can be used within a service function path (SFP).”



1.  Introduction

   Network Service Header (NSH) [RFC8300] is the Service Function
   Chaining (SFC) encapsulation protocol used to create Service Function
   Chains.


This reads redundant. Instead:

   Network Service Header (NSH) [RFC8300] is the Service Function
   Chaining (SFC) encapsulation protocol required to support the SFC
   architecture.


As such, NSH provides two key elements:

   1.  Service Function Path identification

   2.  Metadata



This is inconsistent with RC 8300, which says:

   The NSH is composed of the following elements:

   1.  Service Function Path identification.

   2.  Indication of location within a Service Function Path.

   3.  Optional, per-packet metadata (fixed-length or variable).


   [RFC8300] further defines two metadata formats (MD Types): 1 and 2.
   MD Type 1 defines fixed length, 16 bytes-long metadata, whereas MD
   Type 2 defines a variable-length TLV format for metadata.  This draft
   defines some common TLVs for use with NSH MD Type 2.


s/bytes/octets/

Also, strictly, MD Type 2 does not use “TLVs”. It uses “MD Class, MD Type, Length, Value”. As such I recommend removing all mentions of TLV.

“ variable-length TLV format” —> “ variable-length metadata format"



2.1.  Terminology


Add:

"This document uses the terminology defined in the SFC Architecture [RFC 7665] and the Network Service Header [RFC 8300]”.


3.  NSH Type 2 Format


This is “NSH MD Type 2”


       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |Ver|O|C|R|R|R|R|R|R|   Length  |    MD Type    | Next Protocol |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


TTL missing, should be:

      0                   1                   2                   3
      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
     |Ver|O|U|    TTL    |   Length  |U|U|U|U|MD Type| Next Protocol |
     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


   where

      Metadata Class (MD Class): Defines the scope of the Type field to
      provide a hierarchical namespace.

      Type - Indicates the explicit type of metadata being carried.  The
      value is one from the Network Service Header (NSH) TLV Type


[...]

Please remove this as it is from RFC 8300.


4.  NSH Type 2 TLVs


Should be “NSH MD Type 2 Context Headers”



4.1.  Forwarding Context

   This TLV carries a network-centric forwarding context, used for
   segregation and forwarding scope.  Forwarding context can take
   several forms depending on the network environment.  Commonly used
   data includes VXLAN/VXLAN- GPE VNID, VRF identification or VLAN.


Extraneous space in VXLAN- GPE


       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |    Metadata Class = 0x0000    |  Type = 0x01  |U|  Length = 8 |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |   CT  |             Reserved                                  |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                      Tenant ID                                |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+


First, I recommend for now change all the Types to TBAs. For example 0x01 to TBA1. Note this would otherwise collide with other documents being advanced.

I was thinking about this format, and the proposal from Greg Mirsky to do away from CT and instead use the length. I thought that was a good idea. However, on second thoughts, and in looking at the values defined:


         0x0 - 24 bits-long VXLAN/LISP virtual network identifier (VNI)

         0x1 - 32 bits-long MPLS VPN label

         0x2 - VLAN


* An MPLS Label is actually 20 bits.
* A VLAN identifier (VID) is 12 bits.

Neither of those can be expressed as a Length in octets.

So, we need a CT Field. However, change to:

         0x0 - 24-bits VXLAN/LISP virtual network identifier (VNI)

         0x1 - 20-bits MPLS VPN label

         0x2 - 12-bit VLAN identifier


4.3.  Content Type

   Provides explicit information about the content being carried, for
   example, type of video or content value for billing purposes.

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |    Metadata Class = 0x0000    |  Type = 0x03  |U|  Length = 4 |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                     Content Type                              |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                          Figure 5: Content Type


This does not seem to be adequately defined. What is Content Type: 0xCAFECACA?

In fact I wonder if what wants to be defined here is an Application ID: https://tools.ietf.org/html/draft-penno-sfc-appid-05


4.4.  Ingress Network Information

   This data identifies the ingress network node, and, if required,
   ingress interface.

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |    Metadata Class = 0x0000    |  Type = 0x04  |U|  Length = 8 |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                        Node ID                                |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                     Source Interface/Port                     |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

                   Figure 6: Ingress Network Information


As per previous comment from Greg Mirsky, I agree it would make sense to split this into two elements, one from Node ID, one for Interface.


7.  IANA Considerations

   IANA is requested to create a new "Network Service Header (NSH) TLV
   Type" registry according to Table 1.


These are not “TLV Types”. They are "Network Service Header (NSH) MD Type 2 context header metadata types” for example.


   This document defines the following new values (Table 2) in the
   Network Service Header (NSH) TLV Type registry:


This should have “TBAs”.

And these need subsections:

* Context Type (CT)
* Tenant Type (TT)
* Group Type (GT)
* URI Type

Here’s some text:

7.1. Context Type

IANA is requested to create and maintain the “ Forwarding Context Variable Length Context Header, Context Type” registry, with the following initial allocation:

         0x0 - 24-bits VXLAN/LISP virtual network identifier (VNI)
         0x1 - 20-bits MPLS VPN label
         0x2 - 12-bit VLAN identifier
         0x3-0xE - Unassigned
         0xF - Reserved

7.2. Tenant Identifier

IANA is requested to create and maintain the “ Tenant Identifier Variable Length Context Header, Tenant Type” registry, with the following initial allocation:

      *  0x0 - 32 bits-long Tenant ID
      *  0x1 - 64 bits-long Tenant ID

7.3. Group Type

IANA is requested to create and maintain the "Source and/or Destination Groups Context Header, Group Type” registry, with the following initial allocation:

      *  0x0 - Reserved
      *  0x1 - Group Based Policy (GBP) end point group (EPG)
      *  0x2-0xE - Unassigned
      *  0xF - Reserved



Thanks!

Carlos.