Re: [sfc] WGLC for https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/

Shwetha Bhandari <shwetha.bhandari@thoughtspot.com> Wed, 27 October 2021 01:51 UTC

Return-Path: <shwetha.bhandari@thoughtspot.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A1EF73A1ABE for <sfc@ietfa.amsl.com>; Tue, 26 Oct 2021 18:51:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=thoughtspot.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GlKChsaypovb for <sfc@ietfa.amsl.com>; Tue, 26 Oct 2021 18:51:00 -0700 (PDT)
Received: from mx0b-0055fe01.pphosted.com (mx0b-0055fe01.pphosted.com [205.220.176.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B2923A1ABA for <sfc@ietf.org>; Tue, 26 Oct 2021 18:50:59 -0700 (PDT)
Received: from pps.filterd (m0211452.ppops.net [127.0.0.1]) by mx0b-0055fe01.pphosted.com (8.16.1.2/8.16.1.2) with ESMTP id 19QMiR6c028574 for <sfc@ietf.org>; Tue, 26 Oct 2021 18:50:59 -0700
Received: from mail-qv1-f69.google.com (mail-qv1-f69.google.com [209.85.219.69]) by mx0b-0055fe01.pphosted.com (PPS) with ESMTPS id 3bx4t96xjy-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for <sfc@ietf.org>; Tue, 26 Oct 2021 18:50:58 -0700
Received: by mail-qv1-f69.google.com with SMTP id gw8-20020a0562140f0800b0038366347de1so905243qvb.16 for <sfc@ietf.org>; Tue, 26 Oct 2021 18:50:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=thoughtspot.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=y8CK8A6A/Qj6hMXr4982TlJHZx0VfNEh/Z8alLNfII4=; b=kOYtLUcxojSS2jG6L+MLzUIunISF6zTibbkX/Zkq62UNrrjkE5T0Ps67Hfe5jwMxsh rghOeYoXufcmJFVGwfLbrjMmiGlOfGo+Ty3lyeQLrVC8p0Y9xEn3emD72o4JjLTSMlD1 u7fHd3D36ESwhpqtKrHaQlEBiZorUoVdqpkGFyr87U/H596XhH7RMTunbT3ME6YAtJTV Ab5Y/dtfKnQFQ9axKVbQd3HRzAw2JDsVxu1dLAmX4nkd/X8kgsOqBzOFz8g0wDM0Wr43 jSLZ8qiHp3Ye/KTsqAAXv34eIuUzgDLBxeEHucI/dLPFKqEBAY+ycNh8kY1HbBksLdcd McAg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=y8CK8A6A/Qj6hMXr4982TlJHZx0VfNEh/Z8alLNfII4=; b=PiiFOZwIZdMBCBzx9SFnK4C86P921QJGuwlIIoFKJSzsNtq3WlHkBcXmtY1Od0spHG btzYfLuykMOUnKTH+mqmQjjomKkWMGu6DDjNULWp307DUsa2SSdazLjktP/L3QevDiAh nW4uiDKQ3Oj4pV7gg5YuNsSDO1XSsFVhXh2LlkIJexBO6AWW/IuU3AzYHXI4C3oaHssK Y2KHTYAmbu+wtbMpsVBgCmL5NbllJrj5CKg/QDsDd2zGNHLHpkQQ0gryhtdeb7F8lSwe Iq1aMu6k9x8DmdmUKvpuepEWy1C6i8YV6g3sOFM2sF9rr5Ikdfb+VWVFePBmxZi95H3S jNIw==
X-Gm-Message-State: AOAM532uBJzWUy2+Jr17N0mG/D3atP3zC7V+qF8cjFonpzzGv9fhtP13 Audq16lvzkqoGPvpriU1d762Ba9w0n3NC7zpln31tO6Uj0rh73nf1w1b0IzGgeuU34gsJHs6nfm 2p6Gf23KAqytZkC7yang=
X-Received: by 2002:a0c:c702:: with SMTP id w2mr26720327qvi.24.1635299458036; Tue, 26 Oct 2021 18:50:58 -0700 (PDT)
X-Google-Smtp-Source: ABdhPJwxsXu/svlo3c6KOmQ/e/eIqoa5Yj+GilSe9Fwc93qerkUH7Cu6ca/SvnZ3OCUKRR2hJ3az8EqqQUWgYD9/I84=
X-Received: by 2002:a0c:c702:: with SMTP id w2mr26720314qvi.24.1635299457759; Tue, 26 Oct 2021 18:50:57 -0700 (PDT)
MIME-Version: 1.0
References: <MN2PR13MB4206C91446BA5FBBDA69E233D2FF9@MN2PR13MB4206.namprd13.prod.outlook.com> <CA+RyBmVSrdCaO77P4=1vZ2LmxtR65OmspN_wozyGPNwtM5Uv3A@mail.gmail.com>
In-Reply-To: <CA+RyBmVSrdCaO77P4=1vZ2LmxtR65OmspN_wozyGPNwtM5Uv3A@mail.gmail.com>
From: Shwetha Bhandari <shwetha.bhandari@thoughtspot.com>
Date: Wed, 27 Oct 2021 07:20:46 +0530
Message-ID: <CAMFZu3PaLQrHcBULzsxbdnTJyr-bVDVs1WpnFwLuSkR7DbntuQ@mail.gmail.com>
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: James Guichard <james.n.guichard@futurewei.com>, draft-ietf-sfc-ioam-nsh@ietf.org, "sfc@ietf.org" <sfc@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000480e9005cf4bd3c5"
X-mailroute: internal
X-Proofpoint-GUID: OKOrXPhUszDjGV_vMqCaW1iohr3Z0DHc
X-Proofpoint-ORIG-GUID: OKOrXPhUszDjGV_vMqCaW1iohr3Z0DHc
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 adultscore=0 lowpriorityscore=0 malwarescore=0 spamscore=0 bulkscore=5 phishscore=0 priorityscore=1501 mlxscore=0 mlxlogscore=617 impostorscore=0 clxscore=1011 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2110150000 definitions=main-2110270008
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/wZa8yFPsacZ1eZFlWIlhUSba3zU>
X-Mailman-Approved-At: Tue, 26 Oct 2021 19:08:11 -0700
Subject: Re: [sfc] WGLC for https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Oct 2021 01:51:06 -0000

Hi Greg,

Sorry for the very late reply. Please find responses to your comments
inline @Shwetha:



On Wed, Sep 8, 2021 at 3:30 AM Greg Mirsky <gregimirsky@gmail.com> wrote:

> Dear Authors and All,
> I've read the current version of the draft and have some comments I'd like
> to share with you. I much appreciate your thoughts on where this work
> should go considering developments in other IETF WGs. Please find my notes
> and questions below:
>
>    - It is stated in the Abstract that:
>
>    In-situ Operations, Administration, and Maintenance (IOAM) records
>    operational and telemetry information in the packet while the packet
>    traverses a path between two points in the network.
>
> But that is the case only for the pre-allocated and incremental trace
> option types. The Direct Export option
> <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-direct-export/__;!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKE0jphubQ$>
> does not write telemetry data into the data packet itself but export
> telemetry information in a specially constructed packet.
> And as we are talking about different IOAM trace options, the question of
> the scope of this document seems appropriate. There is a WGLC on two IOAM
> documents
> <https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/ippm/A0OcGQ5LlNjnjfRVp_iUTMYMrcs/__;!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKHOndSFRg$>
> active through September 15th at the IPPM WG. I believe that it would be
> beneficial if we had a single document that describes the applicability of
> IOAM in all its functionality defined by documents in IPPM WG. Of course,
> that cannot be a moving target as that would not be helpful. But since the
> IPPM WG discusses the progress of two IOAM documents, it could be a great
> time to address the applicability of the Direct Export trace type
> <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-direct-export/__;!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKE0jphubQ$>
> and Loopback and Active flags defined in draft-ietf-ippm-ioam-flags
> <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-flags/__;!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKHO7lReVw$>.
> It would be concerning to have more than one SFC document describing the
> applicability of the generic IOAM mechanisms
>
>
Shwetha> This is a fair point. We will revise the  draft with text in the
abstract and Section 3 IOAM-Type to be updated to include the usage of
trace and DEX options.  The encapsulation of IOAM options within NSH itself
in its current form already supports all the IOAM Option Type defined both
from draft-ietf-ippm-ioam-data and draft-ietf-ippm-ioam-direct-export along
with the flags supported within the options. Hence the IOAM-data-field
definitions in the draft will remain unchanged.

>
>
>
>    - The location of the IOAM header in the SFC NSH-encapsulated packet
>    is defined in Section 3:
>
>    IOAM-Data-Fields are carried in NSH
>    using a next protocol header which follows the NSH MD context
>    headers.
>
> I've checked RFC 8300 but couldn't find it defines the Next Protocol
> header. Also, it appears that NSH Context headers are optional. Hence my
> question. Is the presence of an NSH Context header required when using
> IOAM? Could you clarify which mechanism is used to identify the payload of
> an SFC NSH-encapsulated packet as IOAM?
>
> Shwetha> We will reword it, it is not Next Protocol header but using IOAM
as a Next Protocol as described in Section 4.1 and requested in IANA
section. Following is the proposed text to align with the RFC 8300
reference to context headers following base header and service path header:
"The NSH is defined in [RFC8300].  IOAM-Data-Fields are carried in
NSH using a next protocol to identify IOAM data fields that follows NSH
context headers."

>
>    - If I understand the format of the IOAM header defined in Section 3
>    correctly, the header's length is limited by 1020 octets, while the
>    effective length containing IOAM options and data - 1016 octets. Is that
>    correct? What is the recommended technique of collecting IOAM data that
>    exceeds that limit?
>
> Shwetha > IOAM options inherently support specifying the size limits at
the node that added the IOAM options. While operationalizing the solution
the data types included and number of nodes expected to be adding the data
should be selected. This is covered in deployment
considerations draft-brockners-opsawg-ioam-deployment.

>
>    - In Section 4.1, I've found the text reflecting the history of the
>    discussion about how to carry the IOAM header using NSH encapsulation. As
>    the text has no normative value, I suggest moving it into an Appendix.
>
> Shwetha > Agreed, revised draft will have this section moved to Appendix.

>
>    - I find the rules of handling the O-bit in NSH listed in Section 4.2
>    inconsistent and confusing. The IOAM header is not part of NSH
>    encapsulation but is a part of the payload. But in one case, when user data
>    follows it, the O-bit must not be set as. If there's no user data after the
>    IOAM header, then the O-bit must be set. But from the perspective of NSH
>    encapsulation, it includes specially constructed data added for the sole
>    purpose of collecting OAM/telemetry information. Then, why, in one case,
>    the O-bit is cleared and in the other set if, in both cases, the
>    NSH-encapsulated packet is used to perform the OAM function?
>
> Shwetha > The reason for not setting the O-bit for packets that contains
actual user data is because RFC 8300 has " SF/SFF/SFC Proxy/Classifier
implementations that do not support

      SFC OAM procedures SHOULD discard packets with O bit set". It
will be undesirable to discard packets with O-bit set that carry user
data as IOAM can be inserted insitu.

For synthetic traffic created for OAM along with IOAM-data-fields in
NSH following the NSH OAM function with 0-bit set is desirable.


Thanks,
Shwetha

> I much appreciate your consideration of my comments and questions and
> looking forward to your feedback.
>
> Regards,
> Greg
>
> On Wed, Aug 18, 2021 at 5:32 AM James Guichard <
> james.n.guichard@futurewei.com> wrote:
>
>> Dear WG:
>>
>>
>>
>> This email starts a 2 week Working Group Last Call for
>> draft-ietf-sfc-ioam-nsh [1].
>>
>>
>>
>> Please read this document if you haven’t read the most recent version and
>> send your comments to the SFC WG list no later than September 1st 2021.
>>
>>
>>
>> If you are raising a point which you expect will be specifically debated
>> on the mailing list, consider using a specific email/thread for this point.
>>
>>
>>
>> Lastly, if you are an author or contributor please response to indicate
>> whether you know of any undisclosed IPR related to this document.
>>
>>
>>
>> Thanks!
>>
>>
>>
>> Jim & Joel
>>
>>
>>
>> [1] https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/
>> <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-sfc-ioam-nsh/__;!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKHdTiRE6A$>
>>
>>
>>
>>
>>
>>
>> _______________________________________________
>> sfc mailing list
>> sfc@ietf.org
>> https://www.ietf.org/mailman/listinfo/sfc
>> <https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/sfc__;!!MZ3Fw45to5uY!db6q3n8-5YqHkLtf3wyeBoUpO72v7UzeDtfPNhyePahNAYMo9eFdQxxBWM4C7Z0OJKEKMsIVaA$>
>>
>