Re: [spring] 6man w.g. last call for <draft-ietf-6man-spring-srv6-oam>

"Zafar Ali (zali)" <zali@cisco.com> Thu, 19 December 2019 00:19 UTC

Return-Path: <zali@cisco.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02EA9120116; Wed, 18 Dec 2019 16:19:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=MyqHSlaD; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=DfNjbrFR
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FWw_SVMvXxV4; Wed, 18 Dec 2019 16:19:45 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 37987120013; Wed, 18 Dec 2019 16:19:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=61177; q=dns/txt; s=iport; t=1576714785; x=1577924385; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=AAel2EWxE19J6sasJD1EA9pGqR0QtRBqR1z0Cj5Yg9g=; b=MyqHSlaDx2J+R6tW90uJRKKlfd0EcuC4odYGGibeDn4G9JGFOv3mxgHt AhLqYQRfZ5AXV/roccLeTkT2uGLZzyWLkNAD3Gx7yNFOOhkI4ET4VS8D6 xowpNEnwXKHS5pfYdmrAI2ouYiapU/hVTrO9LpYFEuvp/soxZFz+NWwop g=;
IronPort-PHdr: 9a23:ed1kqBxfSmeC3nvXCy+N+z0EezQntrPoPwUc9psgjfdUf7+++4j5YRGN/u1j2VnOW4iTq+lJjebbqejBYSQB+t7A+GsHbIQKUhYEjcsMmAl1EseBCGXwLeXhaGoxG8ERHFI=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BWCQDcwPpd/5ldJa1bChwBAQEBAQcBAREBBAQBAYF8gR4vUAVsWCAECyqDRkCDRgOKcoJfiVyOKoFCgRADUAQJAQEBDAEBGAEKCgIBAYRAAheCAiQ4EwIDDQEBBAEBAQIBBQRthTcMhV4BAQEBAwEBCgYLBgoTAQEsCwEPAgEGAhEDAQIhAQYDAgICHwYLFAkIAgQBDQUigwABgXlNAy4BAgySIJBkAoE4iGF1gTKCfgEBBYFJQYMVDQuCEAMGgTaFHIZ8GoFBP4ERASYggkw+ghtJAQEDAYEnDRM4DQmCWjKCLI06DAmCaIVWgkKHHo4sMUMKgjWGS2aKPYQmG4JDh3mQFY5OiFKCHI9jAgQCBAUCDgEBBYFpIoFYcBUaISoBgkFQGA2NEgwXg1CFFIU/dIEojmRfAQE
X-IronPort-AV: E=Sophos;i="5.69,330,1571702400"; d="scan'208,217";a="683612783"
Received: from rcdn-core-2.cisco.com ([173.37.93.153]) by rcdn-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Dec 2019 00:19:43 +0000
Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by rcdn-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id xBJ0JhsJ022625 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 19 Dec 2019 00:19:43 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 18 Dec 2019 18:19:42 -0600
Received: from xhs-rcd-003.cisco.com (173.37.227.248) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Wed, 18 Dec 2019 19:19:41 -0500
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-003.cisco.com (173.37.227.248) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Wed, 18 Dec 2019 18:19:41 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=iBzkGwFohyZlAWuxyaH7pn8Cizx6BSyXJBn6+N+hlIbs/SaAYCIeNqWjnMTW8p/KEoEjeS6cWBiLUjHBXbr+vyqKQaf5os75r9wi8WBrSoeN2BjD6XhLcYVQA6H/GjAUU2BTHWSjStGW+rRHv2CLk1tlM4D5QeR/n5BJVegCwnsgXzbaWubJeyhuEXWjCVEIrJsbBbMLSTLIf6LxfpgZbyN1y0P1GYLnOiBMohQgoXsFyQ83BpyTT2vVQGIME4bBcRKTap9P/wgMsflfDw51JiImZG1A+WwumE5FaLgFre6bsP3H68d0tCsOTvIPg99nO2Sd4plDaUaGpFbtjFyCwg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AAel2EWxE19J6sasJD1EA9pGqR0QtRBqR1z0Cj5Yg9g=; b=HfCCMrrCVS6p4rdg87BqnkYht8WPKdrawoxu6g5Vz6wSPa+V6fBsy0ugcJP6sJTVgc/dPwNN+n8Cg0db4Q8uGeKhguB92yDvOr6y4xu12mifGbwYs8yLGCX3hiH133rsU99nPJI6SEN2KId4nh/FsgdvImfDDi/7gc6HQ1AEBEXN5c+1fnI644dzeJKDu96aglEMnB/PGbmUJKrxOhhpuLoM3EIOqJWDPAdrviI5K3ENxVLY/4Pa76sPr1CoktgKPf6I4mNN693gKGYUDpXtN2/HSJonzmi15VHzKYE7Mtar8ccdo/7If7KBmI0vQFnlP05tPyzO0Pwp6Ir+CZODhQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AAel2EWxE19J6sasJD1EA9pGqR0QtRBqR1z0Cj5Yg9g=; b=DfNjbrFRktx6AvwkKHbZLamG7Lyf5BV+smaCVQzv3o9hvESCWNd29MGAQJQi4lfafPGjiutiNBq2CV4MnT2ousXnjxy5AQzqBODMmHMImgwylEqd3mZXtfwxqmKmY4a9wkilaVhZ94fPop8OCO+B4HzItHac1FoQ2DcYpLnnCis=
Received: from DM6PR11MB3129.namprd11.prod.outlook.com (20.177.217.75) by DM6PR11MB2972.namprd11.prod.outlook.com (20.177.216.214) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2538.18; Thu, 19 Dec 2019 00:19:40 +0000
Received: from DM6PR11MB3129.namprd11.prod.outlook.com ([fe80::1ca8:c9f1:4a81:74f8]) by DM6PR11MB3129.namprd11.prod.outlook.com ([fe80::1ca8:c9f1:4a81:74f8%4]) with mapi id 15.20.2559.015; Thu, 19 Dec 2019 00:19:40 +0000
From: "Zafar Ali (zali)" <zali@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>, Ole Troan <otroan@employees.org>
CC: SPRING WG <spring@ietf.org>, 6man WG <ipv6@ietf.org>, 6man Chairs <6man-chairs@ietf.org>, "Zafar Ali (zali)" <zali@cisco.com>
Thread-Topic: [spring] 6man w.g. last call for <draft-ietf-6man-spring-srv6-oam>
Thread-Index: AQHVquT4fiT0mGN0ekCReZDXMAlj3aesHu4AgBQ7cQA=
Date: Thu, 19 Dec 2019 00:19:40 +0000
Message-ID: <B496472A-0AB3-42D9-BC4E-14E5E2769008@cisco.com>
References: <ECC21DA8-0156-41D2-921E-177389D3C904@employees.org> <CA+RyBmX5=Z_sMrv8CGO7N_ZFwefQsrr=rNyaJwN+2p+9d8TS3Q@mail.gmail.com>
In-Reply-To: <CA+RyBmX5=Z_sMrv8CGO7N_ZFwefQsrr=rNyaJwN+2p+9d8TS3Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1f.0.191110
authentication-results: spf=none (sender IP is ) smtp.mailfrom=zali@cisco.com;
x-originating-ip: [2001:420:c0cc:1006::31]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0c69e7a1-7e9c-4623-5426-08d7841923a8
x-ms-traffictypediagnostic: DM6PR11MB2972:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DM6PR11MB2972D7A2E7F726C89202274DDE520@DM6PR11MB2972.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0256C18696
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(376002)(366004)(346002)(136003)(39860400002)(189003)(199004)(9326002)(8936002)(107886003)(6486002)(86362001)(2616005)(33656002)(478600001)(316002)(6506007)(2906002)(4326008)(91956017)(966005)(36756003)(71200400001)(5660300002)(76116006)(66446008)(6512007)(81166006)(81156014)(64756008)(186003)(8676002)(66946007)(53546011)(110136005)(54906003)(66476007)(66556008)(4001150100001); DIR:OUT; SFP:1101; SCL:1; SRVR:DM6PR11MB2972; H:DM6PR11MB3129.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: BzxF/HyAQbNZVopD2L6xU/Kic2i3c753gQOJLIWm11QxgXASMqEjUX7CvELIY4GGtWurJDJq+tG9Kzdxy6kguo/AGSKb2ScArq+wgisPtTffDy/VnB20ZmHAtKmBoXuX1tUgGCwF3O2vEJXTZJr+eUcqQr5bwq3uibSXYzmAVyRGOeWE9fkyusTHmcoW5FxQYe/rkFsc8QChDTYw54rvsakR3YdvMBfGqd5SWP6zaBTC+Tb9TNYpGzzWPdezohZFB9LqVyd7ZHN+v8PzNTBguZ2XqQwSqJC0CCzGbKJZaB9oQmIYYR8YBtWM8Vz2or+i07YE19wg2iJeMN/CLIWyDZtUH0nSXuR+Ibi8VAIviXKiNPuUleemm55Q2infDqBNTPjOnItxMDDojJZS+R9bFLa4eUXdyEoWi5XDCm3hqUVKpcT/B0hRS0udsx6gk1JGHueb1o+ZjpNjit8TbF1rkQp9GdjheW1OhhMNllmfUb8=
Content-Type: multipart/alternative; boundary="_000_B496472A0AB342D9BC4E14E5E2769008ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 0c69e7a1-7e9c-4623-5426-08d7841923a8
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Dec 2019 00:19:40.2118 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 6doMTExNm0aeHFiEVoG2XlLpwWIi4WHkusCNT4Qv79HgSFhX1S75OoYu02bo4+HW
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB2972
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.12, xch-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/CT-jL0P4yxvkGgOe48Nxhp9Vndw>
Subject: Re: [spring] 6man w.g. last call for <draft-ietf-6man-spring-srv6-oam>
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Dec 2019 00:19:48 -0000

Hi Greg,

Many thanks for your detailed comments. Much appreciated.

Please see comments in-line and how the new version addresses your comments.
I also look forward to our offline discussion on Friday.

Please note we have been also maintaining the latest version of the draft in the 6man-Github.

Thanks

Regards … Zafar

From: spring <spring-bounces@ietf.org> on behalf of Greg Mirsky <gregimirsky@gmail.com>
Date: Thursday, December 5, 2019 at 5:22 PM
To: Ole Troan <otroan@employees.org>
Cc: SPRING WG <spring@ietf.org>, 6man WG <ipv6@ietf.org>, 6man Chairs <6man-chairs@ietf.org>
Subject: Re: [spring] 6man w.g. last call for <draft-ietf-6man-spring-srv6-oam>

Dear Authors, et al.,
please find my comments, as WG LC comments, questions to this document below.

  *   The Abstract and Introduction describe the document as "defines building blocks for Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Dataplane (SRv6)". I believe it would be helpful to demonstrate that the existing mechanisms used in IPv6 to demultiplex and realize OAM functions, e.g., using the well-known destination UDP port number, are not sufficient and require the introduction of new methods, e.g., O bit in SRH.
[ZA] If you look at section 4 of the draft, it explains how existing probing mechanisms are used and why extensions are needed. In the new revision posted, we have added additional information on why the O-bit in SRH is defined (for telemetry purpose). Please have a look at the latest revision as we have tried to address your comment.

  *   This document introduces the O-flag into SRH as the building block for OAM in SR networks with IPv6 data plane. It appears that the functions that are realized using the O-flag are already supported by the existing OAM protocols that enable fault management (e.g., variations of Echo Request/Reply, BFD) and performance monitoring (e.g., STAMP).
[ZA] The O-bit is for telemetry use. In the new revision posted, we have added additional normative text on O-bit processing to clarify this point.  Please have a look at the latest revision.

  *   Also, the use of the new "building block for OAM" in SRv6 splits the SR OAM suit into two functionally separate toolsets - one for SR-MPLS and another for SRv6.
[ZA] SRv6 uses IPv6 data plane and hence applicability of the IPv6 OAM tools is discussed.

  *   The document defines the support of O-flag as OPTIONAL. In that case, what is the benefit of advertising the support of O-flag by an SR node (even though the advertisement itself is optional)?
[ZA] To let the other nodes/ controller know if the O-bit is supported by a local node.

  *   The document uses the term "accurate timestamp" without the discussion or definition of what level of accuracy is required or expected, methods to acquire an accurate timestamp, format(s) that must or may be used to record a timestamp, and what are possible implications of not providing an accurate timestamp.
[ZA] We have addressed this comment by replacing “accurate” with “a”. It is really up to the local implementation and draft does not add any requirements.

  *   The document asserts that to support "Many scenarios require punting of SRv6 OAM packets at the desired nodes in the network" can be done only with using OAM Endpoint with Punt function. I believe that TTL/Hop Count Expired had been used successfully to achieve the same result.
[ZA] Yes, and tracerouting is done using TTL/ HC. Please see section 4.

  *   what is the apparent need to introduce functional duplication to already existing OAM technique?  How a packet would be processed if both O-flag and the OAM SID End.OP are present (the specification only recommends setting O-flag to 0 when End.OP SID is present)?
[ZA] Good point. The restriction really does not exist and the new version corrects the text.

  *   Section 3.4 introduces function OAM Endpoint with Timestamp and Punt. At the same time, processing the O-flag, defined, as:
            a. Make a copy of the packet.
            b. Send the copied packet, along with an accurate timestamp
Is the difference in making or not making a local copy significant enough to have two mechanisms to achieve essentially the same result? How a packet will be processed if both O-flag and the OAM SID End.OTP are present (the specification only recommends to set O-flag to 0 when END.OTP SID is present) ?

[ZA] Good point. The restriction really does not exist and the new version corrects the text.

  *   Section 3.5 states that:
   SRH TLV plays an important role in carrying OAM and Performance
   Management (PM) metadata.
I cannot find any other text that illustrates how SRH TLV plays any role in FM and/or PM OAM.

[ZA] Indeed, the current draft does not define any TLV for OAM purposes. However, section was added as future drafts may define OAM TLVs.
However, based on your comments, the section has been removed in the new revision.

  *   It is stated in Section 4:
   This section describes how OAM mechanisms can be implemented using
   the OAM building blocks described in the previous section.
As this is the Standard document, using the normative language would be very much desirable. Then it would be clearer whether the use of not only O-flag but of OAM SIDs as well is optional or mandatory.

[ZA] Based on your comment, modified the text in the document to add normative language. Specifically:
o    In the new revision, we have added normative text at the beginning of 3.1.1 where O-bit is defined.
o    Sections 3.3 and 3.4 adds normative texts for OAM SIDs.
o    4.1.2 and 4.2.2 further adds additional normative text for Ping and traceroute use-cases, respectively.


  *   I've noticed that functions used as an example in the document are all part of active OAM functions. At the same time, the defined processing of the O-flag is very much similar to the operation of in-situ OAM. But I don't find any reference to in-situ OAM mechanism, nor discussion of whether both can be used in combination or are mutually exclusive.
[ZA] Based on your comment, we have removed the relevant section.

  *   In Section 4.1.2 the identification of an OAM (active OAM or some other kind of OAM) packet defined as:
   The OAM packets are identified either by setting the O-flag in SRH or
   by inserting the END.OP/ END.OTP SIDs at an appropriate place in the
   SRH.
Is the use of any of these methods required for any OAM? If that is the case, then the normative language must be used. Also, is it required to use any of these methods for, for example, BFD control packets or STAMP test packets? Isn't using assigned by IANA port number sufficient to identify active IP OAM packets? Wouldn't the same be applicable in SRv6 OAM?


[ZA] Normative language has been added to address your comment. 4.1.2 and 4.2.2 further adds additional normative text for Ping and traceroute use-cases, respectively.

  *   I have a question on how a local node selects an application that is to receive a punted packet (whether marked by O-flag that includes one of OAM SIDs)? The document provides examples where the destination is either ICMPv6 or a traceroute (?) process. Is that an exhaustive list?
[ZA] The list is not exhaustive. Furthermore, O-bit is for telemetry use

I greatly appreciate your kind consideration and am looking forward to the productive discussion.

[ZA] Likewise, many thanks for your comments.

Thanks

Regards … Zafar

Regards,
Greg

On Wed, Dec 4, 2019 at 3:53 PM Ole Troan <otroan@employees..org<mailto:otroan@employees.org>> wrote:
Hello,

  As agreed in the working group session in Singapore, this message starts a new two week 6MAN Working Group Last Call on advancing:

  Title    : Operations, Administration, and Maintenance (OAM) in Segment Routing Networks with IPv6 Data plane (SRv6)
  Author   : Z. Ali, C. Filsfils, S. Matsushima, D. Voyer, M.. Chen
  Filename : draft-ietf-6man-spring-srv6-oam-02
  Pages    : 23
  Date     : 2019-11-20

    https://datatracker.ietf.org/doc/draft-ietf-6man-spring-srv6-oam/

as a Proposed Standard.

Substantive comments and statements of support for publishing this document should be directed to the mailing list.
Editorial suggestions can be sent to the author. This last call will end on the 18th of December 2019.

To improve document quality and ensure that bugs are caught as early as possible, we would require at least
two reviewers to do a complete review of the document.  Please let the chairs know if you are willing to be a reviewer.

The last call will be forwarded to the spring working group, with discussion directed to the ipv6 list.

Thanks,
Bob & Ole, 6man co-chairs


--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org<mailto:ipv6@ietf.org>
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------