Re: [Tsv-art] Tsvart last call review of draft-ietf-sfc-nsh-19

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Fri, 01 September 2017 04:25 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: tsv-art@ietfa.amsl.com
Delivered-To: tsv-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87E631326EA; Thu, 31 Aug 2017 21:25:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.521
X-Spam-Level:
X-Spam-Status: No, score=-14.521 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lNj4CJnTsBpU; Thu, 31 Aug 2017 21:25:56 -0700 (PDT)
Received: from alln-iport-2.cisco.com (alln-iport-2.cisco.com [173.37.142.89]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5BD53132F2F; Thu, 31 Aug 2017 21:25:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5526; q=dns/txt; s=iport; t=1504239956; x=1505449556; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=18h61dS+FxVOuwa2vAS4aWU0I5nVf4za32bc6WH2Ilg=; b=IUnhg1LDHNtslITwBCaTGjBrP1QpXgQ5Oo8WqG0a3yTrrvN/u6iZ4ZWi ftAHhP+61LjORc4crTulpc+/b0og/Id4rZwPemOapl9iXBzUP7SCQYjsn F1x3T/6s5gLbGlCUAdxk9hDOHH8x6wN3BRvFGHYsz8anrLPOCk6Zbgeao o=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0C+AAAF4ahZ/51dJa1dGQEBAQEBAQEBAQEBBwEBAQEBg1qBeQeOEJAfgU8ilieCEoVHAhqDdT8YAQIBAQEBAQEBayiFGAEBAQECASMRMxIFCwIBCA4KAgImAgICMBUQAgQOBYopCK9PgieLYgEBAQEBAQEBAQEBAQEBAQEBAQEBHoENgh2CAoFOgg4LgnKEdYMTMIIxBYl1jjyIPgKUT4IThWeKdIocjCgBHziBDXcVWwGFBRyBZ3aJT4EPAQEB
X-IronPort-AV: E=Sophos;i="5.41,456,1498521600"; d="scan'208";a="474880743"
Received: from rcdn-core-6.cisco.com ([173.37.93.157]) by alln-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 01 Sep 2017 04:25:45 +0000
Received: from XCH-RTP-018.cisco.com (xch-rtp-018.cisco.com [64.101.220.158]) by rcdn-core-6.cisco.com (8.14.5/8.14.5) with ESMTP id v814PjAx024706 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Fri, 1 Sep 2017 04:25:45 GMT
Received: from xch-rtp-020.cisco.com (64.101.220.160) by XCH-RTP-018.cisco.com (64.101.220.158) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Fri, 1 Sep 2017 00:25:44 -0400
Received: from xch-rtp-020.cisco.com ([64.101.220.160]) by XCH-RTP-020.cisco.com ([64.101.220.160]) with mapi id 15.00.1263.000; Fri, 1 Sep 2017 00:25:44 -0400
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Wesley Eddy <wes@mti-systems.com>
CC: "tsv-art@ietf.org" <tsv-art@ietf.org>, IETF Discuss <ietf@ietf.org>, Service Function Chaining IETF list <sfc@ietf.org>, "draft-ietf-sfc-nsh.all@ietf.org" <draft-ietf-sfc-nsh.all@ietf.org>
Thread-Topic: Tsvart last call review of draft-ietf-sfc-nsh-19
Thread-Index: AQHTG3ZXOtnqynvgGkaCoRatoAbe6qKfwOGA
Date: Fri, 01 Sep 2017 04:25:44 +0000
Message-ID: <55F080C0-5639-4CE7-B5E2-8F86665CB617@cisco.com>
References: <150342731718.6066.9872092086965343963@ietfa.amsl.com>
In-Reply-To: <150342731718.6066.9872092086965343963@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.118.116.133]
Content-Type: text/plain; charset="utf-8"
Content-ID: <37C63ACB55306B459192FCE044B30F02@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsv-art/Sm3LD_h46R4SD60Ga4VH9q1Df0U>
Subject: Re: [Tsv-art] Tsvart last call review of draft-ietf-sfc-nsh-19
X-BeenThere: tsv-art@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Transport Area Review Team <tsv-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsv-art/>
List-Post: <mailto:tsv-art@ietf.org>
List-Help: <mailto:tsv-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsv-art>, <mailto:tsv-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Sep 2017 04:25:58 -0000

Hello, Wesley,

Thanks for the review! Please find some follow-ups inline.

—
Carlos Pignataro, carlos@cisco.com

“Sometimes I use big words that I do not fully understand, to make myself sound more photosynthesis."

> On Aug 22, 2017, at 2:41 PM, Wesley Eddy <wes@mti-systems.com> wrote:
> 
> Reviewer: Wesley Eddy
> Review result: Not Ready
> 
> In general, the document describes the NSH structure and some loose examples of
> how it might be used, but this isn't a very clear protocol specification.  It's
> mostly just about NSH format and less on the expected behaviors of NSH
> speakers, how to maintain state of the NSH peers or other data structures, etc.
> It seems like there could easily be problems in interoperations between
> vendors coding solely based on the document.
> 
> Section 5 on fragmentation considerations is nebulous and has technical issues.
> Specifically, it says that PMTUD should be used when NSH is encapsulated in
> IP.  PMTUD requires ICMP to work, and has known issues when ICMP is blocked in
> the path.

Please note that this specification is scoped to within a management domain, and not the open Internet.

As such, the expectation is that the 2nd paragraph of Section 5 suffices. And within said administrative domain, it is also expected that ICMPs will not be blocked (even when they are unreliable by nature).

>  Is there a requirement is SFC networks running NSH that ICMP needs
> to be carried by the network?  Further, there is no discussion here on PLPMTUD
> versus PMTUD, nor reference to the specific RFCs, algorithms, and options or
> configuration parameters suggested to do this properly in SFC systems.

There is no requirement than ICMP is carried by the network, since NSH can run directly over Ethernet for example.

Further, note that the relevant sentence begins:
“   For example, when the NSH is encapsulated in IP, IP-level"
Making it an example and not a normative broad requirement.

PLPMTUD is not mentioned since there is no TCP and no other packetization layer for which, to my knowledge, PLPMTUD is specified.

> 
> In Section 6, the assumptions, expectations, or hard requirements for mapping
> NSH onto an underlying "transport" are not very clear.  Only examples are
> given, and some of these (e.g. Ethernet) are not capable of doing things like
> detecting fragmentation issues.  Other examples (e.g. GRE) are tunnels where
> there may be more state.  There is no discussion about whether there are
> assumptions about packet ordering/reordering, duplication, losses, corruption,
> etc.

I think you have a good point here in enclosing “transport” within quotes. What is meant here is an encapsulation, and not a transport in the TSV sense of the term.

We can use more precision on this. Would that help a bit?

> 
> It isn't clear why the particular encapsulations discussed have been chosen
> rather than UDP or TCP-based options.
> 

The market chose those. Note that there are UDP-based options, such as Vxlan-gpe.

> There should probably be more discussion about what types of network paths NSH
> is suitable for and that the choice of an encapsulation for NSH needs to be
> appropriate to the underlying path between service entities.  Some
> encapsulations will need to be tuned for the combination of path and offered
> load of traffic.  Some can provide much more feedback to the NSH "layer" than
> others that are mainly open-loop.

Since there are no requirement of the underlying layer, no particular feedback needed.

> 
> Propagation of errors through a service function chain or signaling of errors
> backwards on a chain seems like it bears further discussion.
> 
> 

OAM, which includes propagation of errors, is explicitly outside the scope of this spec (see O bit definition).

I would like to hear your feedback (and, ideally, specific recommendations and suggestions) regarding the use of “transport” in Section 6.

Thanks!

— Carlos.