Re: [sfc] WG LC on draft-ietf-sfc-multi-layer-oam

Gyan Mishra <hayabusagsm@gmail.com> Sun, 05 June 2022 05:05 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54361C14F72A for <sfc@ietfa.amsl.com>; Sat, 4 Jun 2022 22:05:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.837
X-Spam-Level:
X-Spam-Status: No, score=-6.837 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AGGtpUeMPLHL for <sfc@ietfa.amsl.com>; Sat, 4 Jun 2022 22:05:47 -0700 (PDT)
Received: from mail-pl1-x62f.google.com (mail-pl1-x62f.google.com [IPv6:2607:f8b0:4864:20::62f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CE85C14F5E1 for <sfc@ietf.org>; Sat, 4 Jun 2022 22:05:47 -0700 (PDT)
Received: by mail-pl1-x62f.google.com with SMTP id u18so9773812plb.3 for <sfc@ietf.org>; Sat, 04 Jun 2022 22:05:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=JOXrki+MKNrqrLcVI2JKi1gHGnM30Hmm8JlK5Mh7KoI=; b=PDdi3qHfj/rGMITnEbaz8D7S1133Ts2T1thrX2ZgA4MyfUEEv3E863kmOuoiiVki/D wLX+LgZr+8QBJyl3HH+Dd8UXkI7O/U+dOJgUmYG3BTuc21QQEko574XExmns5TfBVirR LvdrovzgtLEGL6LwW0Fc8DkRyYHESG93hRjtHANfLMyTMsyPq6Ig/boeF7LAD2sc5OfH J/ufKEPYajRFI230yyCWk19vMW851pJMa8kWg31nC24zgC717xNkefJFT6UXPux0et5w KrKsOqLRx1u2lO4hM/C/pcT121YYwhhoHvxhWDlrzjTTxgDO405xN84tKIgnVUTerUz3 lZwA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=JOXrki+MKNrqrLcVI2JKi1gHGnM30Hmm8JlK5Mh7KoI=; b=p1WG0I+dy7TU5YnqcRABW8u6WuGZyGJd7b3GbUUqruk4Y6gNARiGHAewSRaK7mdjiO UYSQGIAct731R1LM1vhTy0yBFi2xJ6hMpYcR8oUzadcmCFype/wMPAosj3ycd6ftB4H7 dfDA+vVgmytXCnFuVa/OExFYrZwnXLJZd6G3yfCf3n0TdSD++9I5++EO4U3W5Hs8jXNO 973xQv4K337U2pqc+Qr7z1IxavWhrSggYuxStFLuTtwtE5mi/1ZGpJpanT7hn5WqQpIu CUuOgbh6yF3mgme41mGCRuuQarI8C8eUI3+KEz/+scczdQppbvHQJ/gc28KzEFh8OdeF rSlA==
X-Gm-Message-State: AOAM531mKkXSrL8uw6yPSncjX2SInJQBcw2kcZuc/tJNvVqfU62mB9QI 6Vlniko/fiK8zLcLATB1DWwtqc47oTuVtoSXujsSeSNt
X-Google-Smtp-Source: ABdhPJxCefDlXNkBhxeZBSN+LgF89+HoOhAreJPu1NT57VcavBsYCdWPoBDBA6/cgSQldccgaE1w7hR1oIMJ86XB0VA=
X-Received: by 2002:a17:90b:1e0a:b0:1e3:5e2:2def with SMTP id pg10-20020a17090b1e0a00b001e305e22defmr35345393pjb.26.1654405545418; Sat, 04 Jun 2022 22:05:45 -0700 (PDT)
MIME-Version: 1.0
References: <c26e4142-aa80-6e54-f997-2f81e025076c@joelhalpern.com>
In-Reply-To: <c26e4142-aa80-6e54-f997-2f81e025076c@joelhalpern.com>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Sun, 05 Jun 2022 01:05:34 -0400
Message-ID: <CABNhwV0CO5U-hTGEy8Rk2pw7doYjjZ4MNO0Ssv1G1KKajwadxQ@mail.gmail.com>
To: Joel Halpern <jmh@joelhalpern.com>
Cc: "sfc@ietf.org" <sfc@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d9654d05e0ac4e7c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/uYMZ3W_C77a1BylTjqpK_deL03g>
Subject: Re: [sfc] WG LC on draft-ietf-sfc-multi-layer-oam
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 05 Jun 2022 05:05:51 -0000

Hi Joel & WG

I strongly support publication of this draft.

I believe this would be a valuable specification for operators deploying
SFC.

>From the  WGLC early this year a draft was published by Med - Thank you!  -
to clarify RFC 8300 ambiguity of OAM O bit setting in NSH, and this draft
has been updated with normative reference to draft below.

>From WGLC early this year to now from version 18 to 19 update is related
only to the OAM in NSH O bit setting and resolution of that issue.

SFC OAM Packet
https://datatracker.ietf.org/doc/html/draft-ietf-sfc-oam-packet-01

Troubleshooting SFC is a complex tax for operators and having
additional OAM capabilities
that can provide value to operators in E2E SFC troubleshooting is a major
gain for operators.



RFC 8924 defines the base specification for SFC OAM, requirements analysis
and generically existing OAM mechanisms used at various layers  and how
they can apply to SFC defined in section 7.



This draft provides a comprehensive SFC OAM solution and takes the base SFC
OAM RFC 8924 and existing network layer mechanisms and applies them to SFC
OAM localized SFC fault isolation with a  new Active OAM header,
Authenticated Echo Request/Reply message and Source TLV.



The new functionality in this draft is defining a new procedure  for Active
OAM message on RSP in NSH and OAM command and/or data in NSH and O bit in
NSH must be set per SFC OAM Packet draft above.



Section 5  talks about the issue related to additional IP/UDP headers in an
IPv6 network adds noticeable overhead and this draft defines a new active
OAM header  to demultiplex Active OAM protocols on an SFC.



Section 6 defines a new Active OAM based Authenticated  Echo Request/Reply
message for SFC that addresses additional requirements, fate sharing,
monitoring of continuity between SFPs, RDI by ingress to egress,
connectivity verification, fault localization and tracing to discover RSP
and finally on-demand FM with response back to initiator.



This draft also provides OAM integrity check with authentication of
request/reply message in conjunction with use of source TLV to prevent DDOS
attack vector with SFC OAM.



The critical new functionality provided for operators with Active OAM is
the honed in focus on troubleshooting continuity of an SFP, trace an SFP ,
consistency verification of SFP and fault isolation and localizing of a
failure within an SFP as well as valuable SFF record TLV, SFF information
TLV/Sub-TLV  for multiple SFs as hops of SFP or multiple SFs for load
balancing using SFP consistency verification procedures.


Kind Regards


Gyan

On Thu, Jun 2, 2022 at 2:51 PM Joel Halpern <jmh@joelhalpern.com> wrote:

> Technically, the draft is still in last call from quite some time ago.
>
> For clarity, and as there have been clarifications in relate
> terminology, the chairs have decided to consider taht we are restarting
> the last call today.
>
> This Working Group Last call will run for 2 weeks (and a day) until CoB
> on June 17, 2022.
>
> Please respond positively or negatively to this call.  Note that if we
> do not get enough responses we will likely be unable to advance the
> document before the WG closes.
>
> When responding, please provide clear motivation either for or against
> publication as an RFC.  Substantive comments are MUCH more helpful than
> "yes" or "no".
>
>
> Thank you,
>
> Joel and Jim
>
> _______________________________________________
> sfc mailing list
> sfc@ietf.org
> https://www.ietf.org/mailman/listinfo/sfc
>
-- 

<http://www.verizon.com/>

*Gyan Mishra*

*Network Solutions A**rchitect *

*Email gyan.s.mishra@verizon.com <gyan.s.mishra@verizon.com>*



*M 301 502-1347*