Re: [sfc] New Version Notification for draft-ietf-sfc-multi-layer-oam-03.txt

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Sun, 16 June 2019 04:56 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4B801200F7 for <sfc@ietfa.amsl.com>; Sat, 15 Jun 2019 21:56:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=JAxVldqQ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=hSeIsFNm
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eqXypUqFzhGg for <sfc@ietfa.amsl.com>; Sat, 15 Jun 2019 21:56:04 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 910B61200E0 for <sfc@ietf.org>; Sat, 15 Jun 2019 21:56:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=44955; q=dns/txt; s=iport; t=1560660964; x=1561870564; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=WEVU4joq4cexZF0mxB39Pg5iv0nLYT/RfSIBl4IaR4M=; b=JAxVldqQejrxtD47YOGlDOqbXIr4RiI0lOvqOK9fTIZog5rLm2YuokA4 tLpcvy6GYD0Y7SdT0Rl0JdfJ2nQ8b0XqfkqSAtuHULD7bVBcVNIKd9hRu jvYwkxaUXIbKBzu3E9bOR44G6gmcVhx0i8cV/pFlpnye8fGp1Tj1TqVUq 8=;
IronPort-PHdr: 9a23:d+/90BPyxXOLZkoD/ZYl6mtXPHoupqn0MwgJ65Eul7NJdOG58o//OFDEu6w/l0fHCIPc7f8My/HbtaztQyQh2d6AqzhDFf4ETBoZkYMTlg0kDtSCDBjwNP/laSUmFexJVURu+DewNk0GUMs=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AXAADcygVd/4gNJK1cChsBAQEBAwEBAQcDAQEBgVEGAQEBCwGBDi8kBScDalUgBAsoCoQMg0cDhFKKD4JXiUWNcYEuFIEQA1AECQEBAQwBARgBDAgCAQGEQAIXgjUjNAkOAQMBAQQBAQIBBG0cDIVKAQEBAQMBARAICR0BASwJAgEPAgEIEQMBAiEBBgMCAgIfBgsUCQgCBA4FGweDAAGBHU0DHQECDAObRQKBOIhfcYExgnkBAQWBMgEDAg5BQIIyDQuCEAmBNAGLXReBQD+BEAEnH4JMPoIaRwEBAgEBFoEPBQEHCwEeIQYHEYJMMoImi0wJDwwHK4IZhHQjggCGJ40oPgkCghCGSIReggWCPINrAhmCJ2mGGgWEBYV6hAKOSUSFMoFpilBUgjQCBAIEBQIOAQEFgT0TOGdxcBUaISoBgkEJNYFRgSUBAgaCQoUUhT9yAYEojHeBIgGBIAEB
X-IronPort-AV: E=Sophos;i="5.63,380,1557187200"; d="scan'208,217";a="287983155"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 16 Jun 2019 04:56:03 +0000
Received: from XCH-RCD-005.cisco.com (xch-rcd-005.cisco.com [173.37.102.15]) by alln-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id x5G4u2bm010519 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 16 Jun 2019 04:56:03 GMT
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by XCH-RCD-005.cisco.com (173.37.102.15) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sat, 15 Jun 2019 23:56:02 -0500
Received: from xhs-aln-002.cisco.com (173.37.135.119) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sat, 15 Jun 2019 23:56:01 -0500
Received: from NAM04-SN1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Sat, 15 Jun 2019 23:56:01 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WEVU4joq4cexZF0mxB39Pg5iv0nLYT/RfSIBl4IaR4M=; b=hSeIsFNmfgk3inZ4eCSePND/dwbpiB7W4bNCkuSauWVQfyBztp3/uJYy6xYGOdPVO0/BRF6m7ISrLmqtSoKb4VfZ2S7avPI+OPFMQFRn9jH++EVt+YSzay2eGMMqJvaVS80qbQMn2EZRV7HwRYntRPmkv4SuzVf6OyyKjWHZnoI=
Received: from BYAPR11MB3030.namprd11.prod.outlook.com (20.177.225.91) by BYAPR11MB3143.namprd11.prod.outlook.com (20.177.228.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1987.11; Sun, 16 Jun 2019 04:56:00 +0000
Received: from BYAPR11MB3030.namprd11.prod.outlook.com ([fe80::f43a:b77f:bb21:f99a]) by BYAPR11MB3030.namprd11.prod.outlook.com ([fe80::f43a:b77f:bb21:f99a%7]) with mapi id 15.20.1965.019; Sun, 16 Jun 2019 04:56:00 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: Service Function Chaining IETF list <sfc@ietf.org>
Thread-Topic: [sfc] New Version Notification for draft-ietf-sfc-multi-layer-oam-03.txt
Thread-Index: AQHVB6S3vuqtmZ+lwU+/KBkoNG/gmqZxWZKAgCyWuIA=
Date: Sun, 16 Jun 2019 04:55:59 +0000
Message-ID: <90048274-5219-4033-8607-C4D85F0410BC@cisco.com>
References: <155737926141.22620.15797109690906794999.idtracker@ietfa.amsl.com> <CA+RyBmXKNGqd8NCirzOrY4cREGB3dQHCMV7EhpKEWi8ft8vUUg@mail.gmail.com> <E0EA0543-0A53-42F2-9070-81569EFA0C86@cisco.com> <CA+RyBmUv3PxosxrC17tFT4UeNwLoUJsfM3dV6mNmJQUiVacUBA@mail.gmail.com>
In-Reply-To: <CA+RyBmUv3PxosxrC17tFT4UeNwLoUJsfM3dV6mNmJQUiVacUBA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3445.104.11)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cpignata@cisco.com;
x-originating-ip: [173.38.117.70]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 54d26e76-5e1a-4e22-578f-08d6f216ed27
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BYAPR11MB3143;
x-ms-traffictypediagnostic: BYAPR11MB3143:
x-ms-exchange-purlcount: 11
x-microsoft-antispam-prvs: <BYAPR11MB31432F64A6418BA3C2A6905CC7E80@BYAPR11MB3143.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-forefront-prvs: 0070A8666B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(376002)(346002)(366004)(39860400002)(136003)(189003)(199004)(22974007)(6436002)(413944005)(966005)(5070765005)(66574012)(3846002)(6116002)(8676002)(606006)(71200400001)(71190400001)(68736007)(486006)(7110500001)(15650500001)(186003)(33656002)(81156014)(256004)(14444005)(81166006)(76176011)(14454004)(26005)(50226002)(8936002)(316002)(6486002)(229853002)(66556008)(2906002)(6512007)(54896002)(6306002)(86362001)(236005)(5660300002)(36756003)(4326008)(102836004)(7736002)(476003)(11346002)(6246003)(25786009)(99286004)(478600001)(446003)(64756008)(2616005)(57306001)(53936002)(30864003)(66446008)(2420400007)(66476007)(91956017)(6506007)(76116006)(1411001)(66946007)(6916009)(53546011)(73956011)(66066001); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR11MB3143; H:BYAPR11MB3030.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: H4iH3j5Z5oOH5JDA3FsAjmh6TWPPtgmBpZZFWpWd8duaAVG/I+0JEcrOPl/VhhLKd39YUsqXbdMRoOPiRC5w2kRt60G4zD6/u2QdEqNHONg6PMZD7WGbzfPgjVaasYqNR0378Gsp5iJ+nJwbpGjaja5Z1GJ1HzEBnPHTZRolqBrc9DfzD2aQ1BdoWBg1e2S6MQiEnC08ocPFgCVIacshkDVUuG8vnxUKRAJwXwA6h+vA2jcD3Ni1UcQZBzeT0cqU1Q2hi2bGD8qq4uxaNCQUVnF7FjpwVwdHrIEmTidLyyPNFvRHM3e1enf7bJiWPjVdbLvHhLAnNGLkOdsElSahiGbu7taNLuOEhtYFQb/ndVPQWHeIQTl2GQlrlW+Smz8voMJvcOa+B5Hy9X0z3shA9aOoQ/1M0U7yhOpMbmMsFuM=
Content-Type: multipart/alternative; boundary="_000_90048274521940338607C4D85F0410BCciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 54d26e76-5e1a-4e22-578f-08d6f216ed27
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Jun 2019 04:55:59.9905 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cpignata@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB3143
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.15, xch-rcd-005.cisco.com
X-Outbound-Node: alln-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/sSO2BcgXereje4PxnGY9Wv_pDOs>
Subject: Re: [sfc] New Version Notification for draft-ietf-sfc-multi-layer-oam-03.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Jun 2019 04:56:10 -0000

Hi, Greg,

Please find some follow-ups inline.

Dear Chairs,

Three quick points:

  1.  Some of the questions that are still not answered are lingering and being dodged since before the WG Adoption call of this document. Would un-adopting this document until those are answered be an appropriate counsel? What do you propose?
  2.  For the record, I cannot see the WG inventing a full solution in this document without implementation and without reference to existing protocols that can solve the problem or the WG framework.
  3.  Based on the statement below "The goal of writing, developing standards is to ensure interoperability among implementations.”, can we have clarity on implementations?

On May 18, 2019, at 4:01 PM, Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>> wrote:

Hi Carlos,
please find responses to your questions in-line and tagged GIM>>.

Regards,
Greg

On Fri, May 10, 2019 at 7:53 PM Carlos Pignataro (cpignata) <cpignata@cisco.com<mailto:cpignata@cisco.com>> wrote:
Hi, Greg, SFC,

In order to understand the positioning of draft-ietf-sfc-multi-layer-oam, please find 3 high-level yet very important questions and associated comments for consideration.

To avoid potential misinterpretation and to be explicit on this note's intention: this email does not imply interest in this draft, does not mean support, I have not read the document fully.

But a quick note for completeness:

1. “Implementation Status” Section.

The authors seem to selectively respond to comments.

I asked for an “Implementation Status” Section [RFC7942] at least two or three times:
* March 29, 2018, on draft-wang-sfc-multi-layer-oam https://mailarchive.ietf.org/arch/msg/nvo3/eNRV-7GLWO_lLeeXwI97HhTrtBo
* October 27, 2018, on adoption https://mailarchive.ietf.org/arch/msg/sfc/wuK4MiyeOMNbXrRIYjiW7zCtZ70

Instead, this drafts seems to be inventing a full blown protocol without implementation practice.

SFC Chairs, could we please follow-up on repeated comments made on the list and track a disposition? These are over a year old, and part of an adoption call.

Request: Can we please add an “Implementation Status” section?
GIM>> As usual, the implementation status will be reflected in the Shepherd write-up.

I do not understand the “As usual” portion of your response.

Please see below.



2. New protocol invention outside of / rogue to an SFC OAM Framework.

draft-ietf-sfc-multi-layer-oam does not reference any other SFC I-Ds. It does not build upon existing work in progress, and instead invents a new protocol with RFC8300 as the only Normative reference from SFC.
GIM>> Isn't it a contradiction between your statements "draft-ietf-sfc-multi-layer-oam does not reference any other SFC I-Ds" and "RFC8300 as the only Normative reference from SFC"?
On the state of the SFC OAM Framework document. I don't recall a discussion of the draft at any recent SFC WG meeting. Indeed, there were many updates, plenty of information added that should be reviewed by the WG. At the same time, contributions to draft-ietf-sfc-multi-layer-oam are always welcome. Will be glad to discuss them.

Greg, I am not sure what you are answering, but this is a non-sequitur to my comment. The response about SFC OAM Framework is also a red-herring

No contradiction. My point is that this shows as a solution in isolation to the WG’s work.

Chairs, Diverting answers about another document (SFC OAM Framework) is not a response to questions and fundamental concerns  on this document (Active OAM for SFC).


The draft-ietf-sfc-oam-framework at https://tools.ietf.org/html/draft-ietf-sfc-oam-framework-06 takes a holistic approach of including an analysis (selecting only some section titles):
4.  SFC OAM Functions . . . . . . . . . . . . . . . . . . . . . .   8
5.  Gap Analysis  . . . . . . . . . . . . . . . . . . . . . . . .  11
5.1.  Existing OAM Functions  . . . . . . . . . . . . . . . . .  11
5.2.  Missing OAM Functions . . . . . . . . . . . . . . . . . .  12
6.4.  OAM Toolset applicability . . . . . . . . . . . . . . . .  13
       6.4.1.  ICMP Applicability  . . . . . . . . . . . . . . . . .  13

This analysis ought to guide protocol definition.
GIM>> draft-ietf-sfc-oam-framework has not been discussed by the SFC WG since even though much of material has been added to it.

Comments on draft-ietf-sfc-oam-framework asymptoted due to its maturity. But more importantly, see the next response.


Question: Can this draft consider existing protocols and gap performed before re-inventing? Specifically Normatively cite the SFC OAM Framework and see where reuse is best?
GIM>> SFC OAM Framework has Informational document track and I don't see a good reason of making it Normative reference for draft-ietf-sfc-multi-layer-oam.

Greg, just to be explicit: are you stating that draft-ietf-sfc-multi-layer-oam is simply not even considering the content and existence of draft-ietf-sfc-oam-framework? Even though that document’s Abstract states:
   This document provides a reference framework for Operations,
   Administration and Maintenance (OAM) for Service Function Chaining
   (SFC).




3. Existing implementation of OAM functions.

Hows does this draft work with existing OAM functions with existing implementation, such as https://tools.ietf.org/html/draft-penno-sfc-trace-03 ? The fact that the draft is expired does not mean the implementation is uncoded.
GIM>> How it can interwork with something that is not fully documented, which state is unknown, uncertain? The goal of writing, developing standards is to ensure interoperability among implementations.

Greg, following your statement about, can you please explain which implementations of draft-ietf-sfc-multi-layer-oam are you ensuring interoperability among?

Otherwise, following your statement, would you say that this document should not be developed without implementations to ensure interop among?

If someone is not committed to the development of their solution for the interoperable multi-vendor environment, then what we can do in such case?

Greg, is this a hypothetical statement, or are you stating this about someone specific, and quantifying that person’s commitment to standards development? Please clarify.

You are the co-author of the draft and I encourage you to re-start the work, bring to WG for the discussion.

Thanks, will consider. That work already interops in the wire.

Best,

Carlos.



Many thanks,

— Carlos Pignataro

On May 9, 2019, at 1:31 AM, Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>> wrote:

Dear All,
the update to the draft addresses the comment received from Joel at the meeting in Prague:
- Joel: if we get an echo request we can't parse, how do we know that it is an echo request, and do we have the information to return it to the correct source?
- Greg: we will clarify this in the draft. It has to practical so the sender can understand the situation.. We introduced two classes of TLVs: mandatory and optional. Will add clearer text.

A new TLV, Errored TLVs, introduced to be optionally used to pass in an echo reply mandatory TLVs that were not understood because either the implementation on the receiver does not support them or couldn't parse them correctly.

Also, please review the update to the interpretation of O-bit and the value of the Next Protocol field to address Adrian's comments at the meeting in Bangkok:
The rules of
   interpreting the values of O bit and the Next Protocol field are as
   follows:

   o  O bit set, and the Next Protocol value is not one of identifying
      active or hybrid OAM protocol (per [RFC7799] definitions), e.g.,
      defined in this specification Active SFC OAM - a Fixed-Length
      Context Header or Variable-Length Context Header(s) contain OAM
      command or data.  and the type of payload determined by the Next
      Protocol field;

   o  O bit set, and the Next Protocol value is one of identifying
      active or hybrid OAM protocol - the payload that immediately
      follows SFC NSH contains OAM command or data;

   o  O bit is clear - no OAM in a Fixed-Length Context Header or
      Variable-Length Context Header(s) and the payload determined by
      the value of the Next Protocol field;

   o  O bit is clear and the Next Protocol value is one of identifying
      active or hybrid OAM protocol MUST be identified and reported as
      the erroneous combination.  An implementation MAY have control to
      enable processing of the OAM payload.

   From the above-listed rules follows the recommendation to avoid
   combination of OAM in a Fixed-Length Context Header or Variable-
   Length Context Header(s) and in the payload immediately following the
   SFC NSH because there is no unambiguous way to identify such
   combination using the O bit and the Next Protocol field.

Regards,
Greg

---------- Forwarded message ---------
From: <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>
Date: Wed, May 8, 2019 at 10:21 PM
Subject: New Version Notification for draft-ietf-sfc-multi-layer-oam-03.txt
To: <sfc-chairs@ietf.org<mailto:sfc-chairs@ietf.org>>, Gregory Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>, Bhumip Khasnabish <vumip1@gmail.com<mailto:vumip1@gmail.com>>, Wei Meng <meng.wei2@zte.com.cn<mailto:meng.wei2@zte..com.cn>>, Cui(Linda) Wang <lindawangjoy@gmail.com<mailto:lindawangjoy@gmail.com>>



A new version of I-D, draft-ietf-sfc-multi-layer-oam-03.txt
has been successfully submitted by Greg Mirsky and posted to the
IETF repository.

Name:           draft-ietf-sfc-multi-layer-oam
Revision:       03
Title:          Active OAM for Service Function Chains in Networks
Document date:  2019-05-08
Group:          sfc
Pages:          18
URL:            https://www.ietf.org/internet-drafts/draft-ietf-sfc-multi-layer-oam-03.txt
Status:         https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/
Htmlized:       https://tools.ietf.org/html/draft-ietf-sfc-multi-layer-oam-03
Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-sfc-multi-layer-oam
Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-multi-layer-oam-03

Abstract:
   A set of requirements for active Operation, Administration and
   Maintenance (OAM) of Service Function Chains (SFCs) in networks is
   presented.  Based on these requirements an encapsulation of active
   OAM message in SFC and a mechanism to detect and localize defects
   described.  Also, this document updates RFC 8300 in the definition of
   O (OAM) bit in the Network Service Header (NSH) and defines how the
   active OAM message identified in SFC NSH.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org<http://tools.ietf.org/>.

The IETF Secretariat

_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc