Skip to content

Commit d1fa8ad

Browse files
authored
#255 addressing ipv6 option last call (#256)
* 255 addressing ipv6 option last call * Addressed #255 addressing ipv6 option last call * Addressing #255 Co-authored-by: Shwetha Bhandari <[email protected]>
1 parent 8049d4c commit d1fa8ad

File tree

2 files changed

+769
-22
lines changed

2 files changed

+769
-22
lines changed

drafts/draft-ietf-ippm-ioam-ipv6-options.xml

+41-22
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
<?rfc tocdepth="3"?>
2121
<?rfc symrefs="yes"?>
2222
<?rfc sortrefs="yes"?>
23-
<rfc category="std" docName="draft-ietf-ippm-ioam-ipv6-options-08"
23+
<rfc category="std" docName="draft-ietf-ippm-ioam-ipv6-options-09"
2424
ipr="trust200902">
2525
<front>
2626
<title abbrev="In-situ OAM IPv6 encapsulation">In-situ OAM IPv6
@@ -64,7 +64,7 @@
6464

6565

6666

67-
<date day="16" month="June" year="2022"/>
67+
<date day="07" month="October" year="2022"/>
6868

6969
<area>Transport Area</area>
7070

@@ -129,9 +129,7 @@
129129
<t hangText="E2E:">Edge-to-Edge</t>
130130

131131
<t hangText="IOAM:">In-situ Operations, Administration, and
132-
Maintenance</t>
133-
134-
<t hangText="ION:">IOAM Overlay Network</t>
132+
Maintenance as defined in <xref target="RFC9197"/></t>
135133

136134
<t hangText="OAM:">Operations, Administration, and Maintenance</t>
137135

@@ -156,8 +154,8 @@
156154
enabled per interface on every node within the IOAM domain. Unless a
157155
particular interface is explicitly enabled (i.e., explicitly
158156
configured) for IOAM, a router MUST ignore IOAM Options. As
159-
additional security, IOAM domains SHOULD provide a mechanism to
160-
prevent injections at ingress or leaks at egress.</t>
157+
additional security, IOAM domains MUST provide a mechanism to
158+
prevent unauthorized injections at ingress or leaks at egress.</t>
161159

162160
<t>An IPv6 packet carrying IOAM data in an Extension header can have
163161
other extension headers, compliant with <xref target="RFC8200"/>.</t>
@@ -271,7 +269,8 @@
271269
<t/>
272270

273271
<section anchor="v6_requirement"
274-
title="Considerations for IOAM deployment in IPv6 networks">
272+
title="Considerations for IOAM deployment and implementation
273+
in IPv6 networks">
275274
<t>IOAM deployments in IPv6 networks should take the following
276275
considerations and requirements into account:<list style="hanging">
277276
<t hangText="C1">It is desirable that the addition of IOAM data
@@ -304,14 +303,16 @@
304303

305304
<t hangText="C3">Packets with IOAM data or associated ICMP errors,
306305
should not arrive at destinations that have no knowledge of IOAM.
307-
For exmample, if IOAM is used in in transit devices, misleading ICMP
306+
For example, if IOAM is used in in transit devices, misleading ICMP
308307
errors due to addition and/or presence of OAM data in a packet could
309308
confuse the host that sent the packet if it did not insert the OAM
310-
information.</t>
309+
information. The entities that communicate the errors to devices
310+
outside of the IOAM domain MUST remove any IOAM data from the packet
311+
included in the error message.</t>
311312

312313
<t hangText="C4">OAM data leaks can affect the forwarding behavior
313314
and state of network elements outside an IOAM domain. IOAM domains
314-
SHOULD provide a mechanism to prevent data leaks or be able to
315+
MUST provide a mechanism to prevent data leaks or be able to
315316
ensure that if a leak occurs, network elements outside the domain are
316317
not affected (i.e., they continue to process other valid packets).</t>
317318

@@ -320,12 +321,23 @@
320321
due to the high complexity in identifying the source of the leak.
321322
Such a troubleshooting process might require coordination between
322323
multiple operators, complex configuration verification,
323-
packet capture analysis, etc.</t>
324+
packet capture analysis, etc. This requirement may require
325+
additional option or fields to be defined to identify the domain
326+
that inserted the IOAM data, this is out of the scope of
327+
this document.</t>
324328

325329
<t hangText="C6">Compliance with <xref target="RFC8200"/>
326330
requires OAM data to be encapsulated instead of header/option
327331
insertion directly into in-flight packets using the original IPv6
328332
header.</t>
333+
334+
<t hangText="C7">The IOAM Incremental Trace Option-Type expands the
335+
option length that may affect the processing of extension
336+
headers and options that follow IOAM options.
337+
Hence when the IOAM Incremental Trace Option-Type is
338+
used in the deployment the RemainingLen field of the option
339+
MUST follow the guidance in <xref target="RFC9197"/> and must
340+
be computed and set appropriately. </t>
329341
</list></t>
330342
</section>
331343

@@ -352,12 +364,13 @@
352364
<t>The "IP-in-IPv6 encapsulation with ULA" <xref target="RFC4193"/>
353365
approach can be used to apply IOAM to either an IPv6 or an IPv4
354366
network. In addition, it fulfills requirement C4 (avoid leaks) by
355-
using ULA for the IOAM Overlay Network (ION).
367+
using ULA for the IOAM Overlay Network.
356368
The original IP packet is preserved. An IPv6 header
357369
including IOAM data fields in an extension header is added in front
358370
of it, to forward traffic within and across the IOAM domain. IPv6
359-
addresses for the ION, i.e. the outer IPv6 addresses are assigned
360-
from the ULA space. Addressing and routing in the ION are to be
371+
addresses for the IOAM Overlay Network, i.e. the outer IPv6
372+
addresses are assigned from the ULA space.
373+
Addressing and routing in the IOAM Overlay Network are to be
361374
configured so that the IP-in-IPv6 encapsulated packets follow the
362375
same path as the original, non-encapsulated packet would have taken.
363376
This would create an internal IPv6 forwarding topology using the
@@ -370,9 +383,9 @@
370383
in MPLS to establish and maintain an LSP forwarding topology that is
371384
parallel to the network's IGP forwarding topology.</t>
372385

373-
<t>Transit across the ION could leverage the transit approach for
374-
traffic between BGP border routers, as described in <xref
375-
target="RFC1772"/>, "A.2.3 Encapsulation". Assuming that the
386+
<t>Transit across the IOAM Overlay Network could leverage the
387+
transit approach for traffic between BGP border routers, as described
388+
in <xref target="RFC1772"/>, "A.2.3 Encapsulation". Assuming that the
376389
operational guidelines specified in Section 4 of <xref
377390
target="RFC4193"/> are properly followed, the probability of leaks
378391
in this approach will be almost close to zero. If the packets do
@@ -418,11 +431,17 @@
418431

419432
<t><figure>
420433
<artwork><![CDATA[
421-
Hex Value Binary Value Description Reference
434+
Hex Value Binary Value Description Reference
422435
act chg rest
423-
----------------------------------------------------------------
424-
TBD_1_0 00 0 TBD_1 IOAM [This draft]
425-
TBD_1_1 00 1 TBD_1 IOAM [This draft]
436+
------------------------------------------------------------------
437+
TBD_1_0 00 0 TBD_1 IOAM [This draft]
438+
destination option
439+
and
440+
IOAM hop-by-hop option
441+
TBD_1_1 00 1 TBD_1 IOAM [This draft]
442+
destination option
443+
and
444+
IOAM hop-by-hop option
426445
]]></artwork>
427446
</figure></t>
428447
</section>

0 commit comments

Comments
 (0)