Re: [spring] 6man w.g. last call for <draft-ietf-6man-spring-srv6-oam> - END.OTP

"Joel M. Halpern" <jmh@joelhalpern.com> Thu, 19 December 2019 15:21 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF8F31200F1; Thu, 19 Dec 2019 07:21:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W8fHtpJm0ASa; Thu, 19 Dec 2019 07:21:40 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4FCC51200CE; Thu, 19 Dec 2019 07:21:39 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 47dwZq046jz6GDCy; Thu, 19 Dec 2019 07:21:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1576768899; bh=Yt3mpv4G+Lu8ZqGwm4Rk7AWnf5HLGUaR81+rmRACJVU=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=cSrhWA0v7czKtTlA37NsWvpyEvXVRHyFZA1EmNAKwlZb2WLS9lj4FqAtQ1C1VJSwy uh4xhT/MsAYZPjYaHN9/VUS6AwUI5LnXU4tQwupQ9bNQ+KFmX7R8LsjxKqVkxb5u4D 5R27gj+86RHpz8Fixb3rz46TzW1O7tigX9ovvFmQ=
X-Virus-Scanned: Debian amavisd-new at a2.tigertech.net
Received: from [192.168.128.43] (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 47dwZp2MJ3z6GDCw; Thu, 19 Dec 2019 07:21:38 -0800 (PST)
To: Rakesh Gandhi <rgandhi.ietf@gmail.com>
Cc: SPRING WG <spring@ietf.org>, 6man WG <ipv6@ietf.org>
References: <ECC21DA8-0156-41D2-921E-177389D3C904@employees.org> <15bc440b-1dbc-0930-137f-f016ca527c2c@joelhalpern.com> <8FAF234D-B5C9-42C7-B483-F57C4ECB349F@cisco.com> <6c3eabf3-410d-ecb6-324f-967544b29a30@joelhalpern.com> <95afdc48-b88a-ab1f-f51f-13193ba5dc1c@joelhalpern.com> <8F662D6A-1720-4D31-AEB8-6A3F7E40E996@cisco.com> <13540a0f-a653-2e52-d253-062b647454d7@joelhalpern.com> <CAOj+MMF7PKF6-P1Gey5o5N72DFJUHpaf23NXWdpLmVr-Z3ksCQ@mail.gmail.com> <CA+RyBmWtUhzqB78jjMh=WfxhAZ2o_Q8beR=qufEeXFrWMZMWkA@mail.gmail.com> <CAMZsk6e9mc6JuAicuPsnVdKNK6QTznE+YPm_ZKbH_vQye=0V7Q@mail.gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <219d20cc-9ae8-ca1a-1118-0e2eca2eff08@joelhalpern.com>
Date: Thu, 19 Dec 2019 10:21:36 -0500
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <CAMZsk6e9mc6JuAicuPsnVdKNK6QTznE+YPm_ZKbH_vQye=0V7Q@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/F3J7Gn3xlrBza5KmfEDjQGyswtc>
Subject: Re: [spring] 6man w.g. last call for <draft-ietf-6man-spring-srv6-oam> - END.OTP
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Dec 2019 15:21:44 -0000

Rakesh, I appreciate the pointers.

However, I believe some clarification is in order.  RFC 5357 does not 
use END.OTP.  It does not mention END.OTP.  It can't, since END.OTP did 
not exist when it was written.

Your individual draft on twamp does reference END.OTP.  This leads to 
two possible paths that make sense to me.  One way is to define that 
behavior as part of the SRv6 OAM draft.  In that case, the draft would 
define END.OTP and explain a case where it was useful.  So there would 
be a point in defining it.
Alternatively, and more realistically since there is not yet WG 
agreement on your draft, your SR OAM draft could define END.OTP.  In 
which case Zafar could simply remove it from the base draft.
A draft defining a distinction of internal behavior that is not 
externally visible is not providing value in that regard.  I have had 
this same discussion with folks in other working groups.  Defining a 
code point without giving it a usage is not clean standardization.

Yours,
Joel

On 12/19/2019 9:57 AM, Rakesh Gandhi wrote:
> Hi Greg, Joel,
> 
> FYI, END.OTP is used with TWAMP Light (RFC 5357) (and STAMP) in 
> draft-gandhi-spring-twamp-srpmand RFC 6374 in 
> draft-gandhi-spring-rfc6374-srpm-udp, for performance delay measurement 
> use-case.
> 
> thanks,
> Rakesh
> 
> 
> On Thu, Dec 19, 2019 at 9:49 AM Greg Mirsky <gregimirsky@gmail.com 
> <mailto:gregimirsky@gmail.com>> wrote:
> 
>     Hi Robert,
>     could you please clarify your statement "there is huge value
>     in defining packet timestamping in all oam documents IETF produces
>     these days"? Is that applicable to Active OAM methods or to other
>     OAM methodologies, including, Passive and Hybrid? If the
>     timestamping operation is entirely local to a networking node is
>     applied to a data flow, in other words, the timestamp value is not
>     stored in the forwarded downstream data packet, which performance
>     metric your expect to produce? Or is the expectation to use the
>     Alternate Marking methodology, as described in RFC 8321, in
>     combination with the local timestamping? If the product of the
>     timestamping operation is stored in the data packet, then how is
>     that different from what is already described in the iOAM draft
>     you've referenced? I believe that iOAM already has defined a method
>     to collect timestamps and the method to trigger timestamping
>     described in the draft we're discussing is duplicating that. Would
>     you agree?
> 
>     Regards,
>     Greg
> 
>     On Thu, Dec 19, 2019 at 1:56 AM Robert Raszuk <robert@raszuk.net
>     <mailto:robert@raszuk.net>> wrote:
> 
>         Hi Joel,
> 
>          >  However, there is no defined behavior that I know of that
>         can make use
>          > of this timestamp.
> 
>         Not sure how to read that statement. Are you expecting IETF
>         draft to tell vendor that computing delta of N values is needed
>         ? Or is IETF draft needed to tell packet analyzers to evaluate
>         the quality of the path based on packets timestamps ? Yes
>         routers may never be involved in such processing, but other
>         network monitoring components do.
> 
>         Sure current networking in this regard is in stone ages, but
>         there are real efforts and working code which goes beyond that
>         already in place. Example:
>         https://tools.ietf.org/html/draft-ietf-ippm-ioam-data-08
> 
>         So there is huge value in defining packet timestamping in all
>         oam documents IETF produces these days and it would be rather
>         disservice to remove such important option.
> 
>         Thx,
>         r.
> 
> 
>         On Thu, Dec 19, 2019 at 1:45 AM Joel M. Halpern
>         <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> wrote:
> 
>             If I am reading the draft correctly, the difference between
>             END.OP and
>             END.OTP is that an internal process is to attach in some
>             internal
>             location a timestamp to the packet.  In the abstract, I
>             understand why
>             such cna be useful.
> 
>             However, there is no defined behavior that I know of that
>             can make use
>             of this timestamp.  Until such a behavior is defined, what
>             is the value
>             in defining the END.OTP behavior?  (Taken in the extreme,
>             until there is
>             such a definition, any implementation which treated END.OTP
>             as END.OP
>             would seem to be indistinguishable from proper operation in
>             terms of
>             behavior on the wire.)
> 
>             Yours,
>             Joel
> 
>             On 12/18/2019 7:01 PM, Zafar Ali (zali) wrote:
>              > Hi Joel,
>              >
>              > Thanks for your review.
>              >
>              > The processing details were embedded in the Section 4.
>              >
>              > We brought them up in the Section 3 and also added
>             additional normative
>              > language in Section 4.
>              >
>              > We have been maintaining the latest version of the draft
>             in the Github...
>              >
>              > However, we also posted the latest diffs, which addresses
>             your comments
>              > as follows:
>              >
>              >   * In the new revision, we have added normative text at
>             the beginning
>              >     of 3.1.1 where O-bit is defined.
>              >   * Sections 3.3 and 3.4 adds normative texts for OAM SIDs.
>              >   * 4.1.2 and 4.2.2 further adds additional normative
>             text for Ping and
>              >     traceroute use-cases, respectively.
>              >
>              > Latest version is kept in the Github and also uploaded as
>              >
>             https://www.ietf.org/staging/draft-ietf-6man-spring-srv6-oam-03.txt.
>              >
>              > Thanks
>              >
>              > Regards … Zafar
>              >
>              > *From: *"Joel M. Halpern" <jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com>>
>              > *Date: *Thursday, December 5, 2019 at 10:01 PM
>              > *To: *"Zafar Ali (zali)" <zali@cisco.com
>             <mailto:zali@cisco.com>>, 6man WG <ipv6@ietf.org
>             <mailto:ipv6@ietf.org>>,
>              > SPRING WG <spring@ietf.org <mailto:spring@ietf.org>>
>              > *Subject: *Re: 6man w.g. last call for
>             <draft-ietf-6man-spring-srv6-oam>
>              >
>              > Sorry, minor typo.  SRH, not NSH, in the 4th paragraph.
>              >
>              > Joel
>              >
>              > On 12/5/2019 9:42 PM, Joel M. Halpern wrote:
>              >
>              >     The normative behavior for the bits in various places
>             says that the
>              >
>              >     packet is punted to the control process.  In and of
>             itself, that is
>              >     fine.
>              >
>              >     However, in order for that to be useful, the control
>             process has to
>              >     know
>              >
>              >     what to do with the packet when it gets there.  In
>             the classic case of
>              >
>              >     router redirect, this is coupled with definition of
>             various content to
>              >
>              >     be processed by the router control logic.
>              >
>              >     In the case of this document, there is no normative
>             definition of what
>              >
>              >     the control process is to do with the packet.  And
>             particularly
>              >     since in
>              >
>              >     many of the cases described the packet that is punted
>             still has an SRH,
>              >
>              >     normal packet processing would simply reach the same
>             "punt" step.  With
>              >
>              >     nowhere to punt it.
>              >
>              >     You asssume in the examples that some forms of
>             parsing that bypass the
>              >
>              >     NSH will take place.  But processing does not take
>             place by instinct or
>              >
>              >     magic.  It takes place because we write RFCs that
>             describe what has to
>              >
>              >     happen.  Without some definition of the required
>             parsing, and I believe
>              >
>              >     (although I am guessing due to the lack of
>             description) we also need
>              >
>              >     some normative description of what the control
>             process is required
>              >     to do.
>              >
>              >     Note that in most OAM, we define the behavior that is
>             required, and
>              >     then
>              >
>              >     indicate where it is permitted to use the control
>             plane to achieve it.
>              >
>              >     This results in a clear specification, and
>             implementation flexibility.
>              >
>              >     Yours,
>              >
>              >     Joel
>              >
>              >     On 12/5/2019 9:34 PM, Zafar Ali (zali) wrote:
>              >
>              >         Hi Joel,
>              >
>              >         I did not understand your comment.
>              >
>              >         Can you please point to specific text in the
>             draft for which the
>              >         draft
>              >
>              >         needs to define normative behavior for the "node
>             punt processor
>              >         look
>              >
>              >         past the SRH and make determinations based on the
>             content."?
>              >
>              >         Thanks
>              >
>              >         Regards … Zafar
>              >
>              >         *From: *ipv6 <ipv6-bounces@ietf.org
>             <mailto:ipv6-bounces@ietf.org>
>              >         <mailto:ipv6-bounces@ietf.org
>             <mailto:ipv6-bounces@ietf.org>>> on behalf of "Joel M. Halpern"
>              >
>              >         <jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern...com> <mailto:jmh@joelhalpern.com
>             <mailto:jmh@joelhalpern.com>>>
>              >
>              >         *Date: *Wednesday, December 4, 2019 at 4:37 PM
>              >
>              >         *To: *Ole Troan <otroan@employees.org
>             <mailto:otroan@employees.org>
>              >         <mailto:otroan@employees.org
>             <mailto:otroan@employees.org>>>, 6man WG <ipv6@ietf.org
>             <mailto:ipv6@ietf.org>
>              >         <mailto:ipv6@ietf.org <mailto:ipv6@ietf.org>>>,
>              >
>              >         SPRING WG <spring@ietf.org
>             <mailto:spring@ietf.org> <mailto:spring@ietf.org
>             <mailto:spring@ietf.org>>>
>              >
>              >         *Subject: *Re: 6man w.g. last call for
>              >         <draft-ietf-6man-spring-srv6-oam>
>              >
>              >         I re-read this draft, and I am afraid it is currently
>              >         under-specified.
>              >
>              >         In order for the various examples to work, there
>             is assumed
>              >         behavior by
>              >
>              >         the processor to which packets are punted.  I
>             could not find
>              >         where this
>              >
>              >         normative behavior is described explicitly.  It
>             appears that the
>              >
>              >         behavior requires that the node "punt processor"
>             look past the
>              >         SRH and
>              >
>              >         make determinations based on the content.  This
>             needs to be
>              >         described
>              >
>              >         explicitly.  And it needs some discussion of why
>             it is legitimate to
>              >
>              >         look past the SRH when the SRH does not show SL=0.
>              >
>              >         Yours,
>              >
>              >         Joel
>              >
>              >         On 12/4/2019 3:53 PM, Ole Troan wrote:
>              >
>              >              Hello,
>              >
>              >                   As agreed in the working group session
>             in Singapore, this
>              >
>              >              message starts a new two week 6MAN Working
>             Group Last Call on
>              >
>              >         advancing:
>              >
>              >                   Title    : Operations, Administration,
>             and Maintenance
>              >         (OAM) in
>              >
>              >              Segment Routing Networks with IPv6 Data
>             plane (SRv6)
>              >
>              >                   Author   : Z. Ali, C. Filsfils, S.
>             Matsushima, D.
>              >         Voyer, M. Chen
>              >
>              >                   Filename :
>             draft-ietf-6man-spring-srv6-oam-02
>              >
>              >                   Pages    : 23
>              >
>              >                   Date     : 2019-11-20
>              >
>              >
>             https://datatracker.ietf.org/doc/draft-ietf-6man-spring-srv6-oam/
>              >
>              >              as a Proposed Standard.
>              >
>              >              Substantive comments and statements of
>             support for
>              >         publishing this
>              >
>              >              document should be directed to the mailing list.
>              >
>              >              Editorial suggestions can be sent to the
>             author. This last
>              >         call will
>              >
>              >              end on the 18th of December 2019.
>              >
>              >              To improve document quality and ensure that
>             bugs are caught
>              >         as early
>              >
>              >              as possible, we would require at least
>              >
>              >              two reviewers to do a complete review of the
>              >         document.  Please let
>              >
>              >              the chairs know if you are willing to be a
>             reviewer.
>              >
>              >              The last call will be forwarded to the
>             spring working
>              >         group, with
>              >
>              >              discussion directed to the ipv6 list.
>              >
>              >              Thanks,
>              >
>              >              Bob & Ole, 6man co-chairs
>              >
>              >
>              >       
>               --------------------------------------------------------------------
>              >
>              >              IETF IPv6 working group mailing list
>              >
>              > ipv6@ietf.org <mailto:ipv6@ietf.org>
>             <mailto:ipv6@ietf.org <mailto:ipv6@ietf.org>>
>             <mailto:ipv6@ietf.org <mailto:ipv6@ietf.org>>
>              >
>              >              Administrative Requests:
>              > https://www.ietf.org/mailman/listinfo/ipv6
>              >
>              >
>              >       
>               --------------------------------------------------------------------
>              >
>              >       
>               --------------------------------------------------------------------
>              >
>              >         IETF IPv6 working group mailing list
>              >
>              > ipv6@ietf.org <mailto:ipv6@ietf.org>
>             <mailto:ipv6@ietf.org <mailto:ipv6@ietf.org>>
>             <mailto:ipv6@ietf.org <mailto:ipv6@ietf.org>>
>              >
>              >         Administrative Requests:
>             https://www.ietf.org/mailman/listinfo/ipv6
>              >
>              >       
>               --------------------------------------------------------------------
>              >
>              >   
>               --------------------------------------------------------------------
>              >
>              >     IETF IPv6 working group mailing list
>              >
>              > ipv6@ietf.org <mailto:ipv6@ietf.org>
>             <mailto:ipv6@ietf.org <mailto:ipv6@ietf.org>>
>              >
>              >     Administrative Requests:
>             https://www.ietf.org/mailman/listinfo/ipv6
>              >
>              >   
>               --------------------------------------------------------------------
>              >
> 
>             _______________________________________________
>             spring mailing list
>             spring@ietf.org <mailto:spring@ietf.org>
>             https://www.ietf.org/mailman/listinfo/spring
> 
>         --------------------------------------------------------------------
>         IETF IPv6 working group mailing list
>         ipv6@ietf.org <mailto:ipv6@ietf.org>
>         Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>         --------------------------------------------------------------------
> 
>     _______________________________________________
>     spring mailing list
>     spring@ietf.org <mailto:spring@ietf.org>
>     https://www.ietf.org/mailman/listinfo/spring
>