Re: [sfc] Fwd: I-D Action: draft-ietf-sfc-multi-layer-oam-14.txt

mohamed.boucadair@orange.com Wed, 13 October 2021 14:54 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: sfc@ietfa.amsl.com
Delivered-To: sfc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B0673A0B57; Wed, 13 Oct 2021 07:54:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c_T5BQdudubq; Wed, 13 Oct 2021 07:54:52 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.70.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9EBA63A0ADC; Wed, 13 Oct 2021 07:54:51 -0700 (PDT)
Received: from opfednr07.francetelecom.fr (unknown [xx.xx.xx.71]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfednr26.francetelecom.fr (ESMTP service) with ESMTPS id 4HTwYQ1rP2z104M; Wed, 13 Oct 2021 16:54:50 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1634136890; bh=x+lwYKNES/ahl9IrNmEiLDgtIP3hXE56PzMVbaHOzA0=; h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version; b=dQRhwA5eqh6UiEcl3ZgKAzTqUAbKo5fGhzw/mmBhsqUrKmxTPj/h8vbsjBeoy/f5K 2lMXPXg5WphnTR8iLqsZofacggy2J9YvPyjp23x8tXiUw84duczO0+xTrjJHd6CLIk CXDvL+w2J5vGkXfb35uFGdeL/l85JANhSApch8U9xaUlbSe6/4UZKzKYFmnMejdpA1 T4R7v35dKCkeO91+TMBxfQdZ9TFrTV5mv1JK9XXVSHYKsROd1DhRPSkkuxqnwnbcQ2 346llebKoKB18Ae6Xy3EQchBfvxYHmwOHN8Z+XO772JRF1O0LJGGIxc8YNDgDq9ZgT iK6iNIuIYsrHA==
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by opfednr07.francetelecom.fr (ESMTP service) with ESMTPS id 4HTwYQ1t8BzFpXC; Wed, 13 Oct 2021 16:54:50 +0200 (CEST)
From: mohamed.boucadair@orange.com
To: Greg Mirsky <gregimirsky@gmail.com>, Service Function Chaining IETF list <sfc@ietf.org>, "sfc-chairs@ietf.org" <sfc-chairs@ietf.org>
Thread-Topic: [sfc] Fwd: I-D Action: draft-ietf-sfc-multi-layer-oam-14.txt
Thread-Index: AQHXvGBiK7RfWHmjWU6gg0xCt5bbJavRCIcw
Content-Class:
Date: Wed, 13 Oct 2021 14:54:48 +0000
Message-ID: <10112_1634136890_6166F33A_10112_380_1_787AE7BB302AE849A7480A190F8B93303542B55C@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <163370962115.18283.9043697369207976285@ietfa.amsl.com> <CA+RyBmXVH-W4d_kbJDX=6Z-BY_nACw5yQsJsOy-A0SsGDLjkKw@mail.gmail.com>
In-Reply-To: <CA+RyBmXVH-W4d_kbJDX=6Z-BY_nACw5yQsJsOy-A0SsGDLjkKw@mail.gmail.com>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Enabled=true; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SetDate=2021-10-13T14:52:13Z; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Method=Privileged; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_Name=unrestricted_parent.2; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ActionId=f7014d50-8406-4adb-b22e-9b48480024a8; MSIP_Label_07222825-62ea-40f3-96b5-5375c07996e2_ContentBits=0
x-originating-ip: [10.114.13.245]
Content-Type: multipart/alternative; boundary="_000_787AE7BB302AE849A7480A190F8B93303542B55COPEXCAUBMA2corp_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sfc/yvn-4LE2fTsSdk720RGQ91Z_XHk>
Subject: Re: [sfc] Fwd: I-D Action: draft-ietf-sfc-multi-layer-oam-14.txt
X-BeenThere: sfc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Service Chaining <sfc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sfc>, <mailto:sfc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sfc/>
List-Post: <mailto:sfc@ietf.org>
List-Help: <mailto:sfc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sfc>, <mailto:sfc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Oct 2021 14:55:04 -0000

Hi Greg, all,

Please find below some quick comments about this version:

(1)

“While SFC Echo Request always traverses the SFP, it is directed to,
the corresponding Echo Reply usually is sent over an IP network.”

I’m not sure to get the intent here, especially that an SFP is still “over an IP network”.

I have the same concern with this one:

“There are scenarios when it is beneficial to direct the responder to
use a path other than the IP network“

(2) You may want align these two statements to avoid what may be perceived as an internal inconsistency (or redundant requirements):

      The Message Authentication Code (MAC) Context Header that is defined
      in [I-D.ietf-sfc-nsh-integrity] MAY be used to protect the SFC Echo
      Request's integrity when using the SFC Return Path TLV

vs.

      When the integrity protection for SFC active OAM, and SFC Echo
      Request/Reply in particular, is required, it is RECOMMENDED to use
      one of the Context Headers defined in [I-D.ietf-sfc-nsh-integrity].

Cheers,
Med

De : sfc <sfc-bounces@ietf.org> De la part de Greg Mirsky
Envoyé : vendredi 8 octobre 2021 18:19
À : Service Function Chaining IETF list <sfc@ietf.org>; sfc-chairs@ietf.org
Objet : [sfc] Fwd: I-D Action: draft-ietf-sfc-multi-layer-oam-14.txt

Dear All,
following the discussion on the SFC WG mailing list and the direction from the SFC WG Chairs, we've merged substantive parts of draft-ao-sfc-oam-path-consistency and draft-ao-sfc-oam-return-path-specified with this draft where the base functionality of the SFC NSH Echo Request/Reply is defined. The authors greatly appreciate and welcome your comments, questions, and suggestions. We're looking forward to the discussion that will help to progress this document to the WG LC.

Regards,
Greg (on behalf of the authors).
---------- Forwarded message ---------
From: <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>
Date: Fri, Oct 8, 2021 at 9:13 AM
Subject: [sfc] I-D Action: draft-ietf-sfc-multi-layer-oam-14.txt
To: <i-d-announce@ietf.org<mailto:i-d-announce@ietf.org>>
Cc: <sfc@ietf.org<mailto:sfc@ietf.org>>



A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Service Function Chaining WG of the IETF.

        Title           : Active OAM for Service Function Chaining
        Authors         : Greg Mirsky
                          Wei Meng
                          Ting Ao
                          Kent Leung
                          Gyan Mishra
        Filename        : draft-ietf-sfc-multi-layer-oam-14.txt
        Pages           : 37
        Date            : 2021-10-08

Abstract:
   A set of requirements for active Operation, Administration, and
   Maintenance (OAM) of Service Function Chains (SFCs) in a network is
   presented in this document.  Based on these requirements, an
   encapsulation of active OAM messages in SFC and a mechanism to detect
   and localize defects are described.

   This document updates RFC 8300.  Particularly, it updates the
   definition of O (OAM) bit in the Network Service Header (NSH) (RFC
   8300) and defines how an active OAM message is identified in the NSH.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sfc-multi-layer-oam/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-sfc-multi-layer-oam-14.html

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sfc-multi-layer-oam-14


Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


_______________________________________________
sfc mailing list
sfc@ietf.org<mailto:sfc@ietf.org>
https://www.ietf.org/mailman/listinfo/sfc

_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.