|
20 | 20 | <?rfc tocdepth="3"?>
|
21 | 21 | <?rfc symrefs="yes"?>
|
22 | 22 | <?rfc sortrefs="yes"?>
|
23 |
| -<rfc category="std" docName="draft-ietf-ippm-ioam-ipv6-options-08" |
| 23 | +<rfc category="std" docName="draft-ietf-ippm-ioam-ipv6-options-09" |
24 | 24 | ipr="trust200902">
|
25 | 25 | <front>
|
26 | 26 | <title abbrev="In-situ OAM IPv6 encapsulation">In-situ OAM IPv6
|
|
64 | 64 |
|
65 | 65 |
|
66 | 66 |
|
67 |
| - <date day="16" month="June" year="2022"/> |
| 67 | + <date day="07" month="October" year="2022"/> |
68 | 68 |
|
69 | 69 | <area>Transport Area</area>
|
70 | 70 |
|
|
129 | 129 | <t hangText="E2E:">Edge-to-Edge</t>
|
130 | 130 |
|
131 | 131 | <t hangText="IOAM:">In-situ Operations, Administration, and
|
132 |
| - Maintenance</t> |
133 |
| - |
134 |
| - <t hangText="ION:">IOAM Overlay Network</t> |
| 132 | + Maintenance as defined in <xref target="RFC9197"/></t> |
135 | 133 |
|
136 | 134 | <t hangText="OAM:">Operations, Administration, and Maintenance</t>
|
137 | 135 |
|
|
156 | 154 | enabled per interface on every node within the IOAM domain. Unless a
|
157 | 155 | particular interface is explicitly enabled (i.e., explicitly
|
158 | 156 | configured) for IOAM, a router MUST ignore IOAM Options. As
|
159 |
| - additional security, IOAM domains SHOULD provide a mechanism to |
160 |
| - prevent injections at ingress or leaks at egress.</t> |
| 157 | + additional security, IOAM domains MUST provide a mechanism to |
| 158 | + prevent unauthorized injections at ingress or leaks at egress.</t> |
161 | 159 |
|
162 | 160 | <t>An IPv6 packet carrying IOAM data in an Extension header can have
|
163 | 161 | other extension headers, compliant with <xref target="RFC8200"/>.</t>
|
|
271 | 269 | <t/>
|
272 | 270 |
|
273 | 271 | <section anchor="v6_requirement"
|
274 |
| - title="Considerations for IOAM deployment in IPv6 networks"> |
| 272 | + title="Considerations for IOAM deployment and implementation |
| 273 | + in IPv6 networks"> |
275 | 274 | <t>IOAM deployments in IPv6 networks should take the following
|
276 | 275 | considerations and requirements into account:<list style="hanging">
|
277 | 276 | <t hangText="C1">It is desirable that the addition of IOAM data
|
|
304 | 303 |
|
305 | 304 | <t hangText="C3">Packets with IOAM data or associated ICMP errors,
|
306 | 305 | should not arrive at destinations that have no knowledge of IOAM.
|
307 |
| - For exmample, if IOAM is used in in transit devices, misleading ICMP |
| 306 | + For example, if IOAM is used in in transit devices, misleading ICMP |
308 | 307 | errors due to addition and/or presence of OAM data in a packet could
|
309 | 308 | confuse the host that sent the packet if it did not insert the OAM
|
310 |
| - information.</t> |
| 309 | + information. The entities that communicate the errors to devices |
| 310 | + outside of the IOAM domain MUST remove any IOAM data from the packet |
| 311 | + included in the error message.</t> |
311 | 312 |
|
312 | 313 | <t hangText="C4">OAM data leaks can affect the forwarding behavior
|
313 | 314 | and state of network elements outside an IOAM domain. IOAM domains
|
314 |
| - SHOULD provide a mechanism to prevent data leaks or be able to |
| 315 | + MUST provide a mechanism to prevent data leaks or be able to |
315 | 316 | ensure that if a leak occurs, network elements outside the domain are
|
316 | 317 | not affected (i.e., they continue to process other valid packets).</t>
|
317 | 318 |
|
|
320 | 321 | due to the high complexity in identifying the source of the leak.
|
321 | 322 | Such a troubleshooting process might require coordination between
|
322 | 323 | multiple operators, complex configuration verification,
|
323 |
| - packet capture analysis, etc.</t> |
| 324 | + packet capture analysis, etc. This requirement may require |
| 325 | + additional option or fields to be defined to identify the domain |
| 326 | + that inserted the IOAM data, this is out of the scope of |
| 327 | + this document.</t> |
324 | 328 |
|
325 | 329 | <t hangText="C6">Compliance with <xref target="RFC8200"/>
|
326 | 330 | requires OAM data to be encapsulated instead of header/option
|
327 | 331 | insertion directly into in-flight packets using the original IPv6
|
328 | 332 | header.</t>
|
| 333 | + |
| 334 | + <t hangText="C7">The IOAM Incremental Trace Option-Type expands the |
| 335 | + option length that may affect the processing of extension |
| 336 | + headers and options that follow IOAM options. |
| 337 | + Hence when the IOAM Incremental Trace Option-Type is |
| 338 | + used in the deployment the RemainingLen field of the option |
| 339 | + MUST follow the guidance in <xref target="RFC9197"/> and must |
| 340 | + be computed and set appropriately. </t> |
329 | 341 | </list></t>
|
330 | 342 | </section>
|
331 | 343 |
|
|
352 | 364 | <t>The "IP-in-IPv6 encapsulation with ULA" <xref target="RFC4193"/>
|
353 | 365 | approach can be used to apply IOAM to either an IPv6 or an IPv4
|
354 | 366 | network. In addition, it fulfills requirement C4 (avoid leaks) by
|
355 |
| - using ULA for the IOAM Overlay Network (ION). |
| 367 | + using ULA for the IOAM Overlay Network. |
356 | 368 | The original IP packet is preserved. An IPv6 header
|
357 | 369 | including IOAM data fields in an extension header is added in front
|
358 | 370 | of it, to forward traffic within and across the IOAM domain. IPv6
|
359 |
| - addresses for the ION, i.e. the outer IPv6 addresses are assigned |
360 |
| - from the ULA space. Addressing and routing in the ION are to be |
| 371 | + addresses for the IOAM Overlay Network, i.e. the outer IPv6 |
| 372 | + addresses are assigned from the ULA space. |
| 373 | + Addressing and routing in the IOAM Overlay Network are to be |
361 | 374 | configured so that the IP-in-IPv6 encapsulated packets follow the
|
362 | 375 | same path as the original, non-encapsulated packet would have taken.
|
363 | 376 | This would create an internal IPv6 forwarding topology using the
|
|
370 | 383 | in MPLS to establish and maintain an LSP forwarding topology that is
|
371 | 384 | parallel to the network's IGP forwarding topology.</t>
|
372 | 385 |
|
373 |
| - <t>Transit across the ION could leverage the transit approach for |
374 |
| - traffic between BGP border routers, as described in <xref |
375 |
| - target="RFC1772"/>, "A.2.3 Encapsulation". Assuming that the |
| 386 | + <t>Transit across the IOAM Overlay Network could leverage the |
| 387 | + transit approach for traffic between BGP border routers, as described |
| 388 | + in <xref target="RFC1772"/>, "A.2.3 Encapsulation". Assuming that the |
376 | 389 | operational guidelines specified in Section 4 of <xref
|
377 | 390 | target="RFC4193"/> are properly followed, the probability of leaks
|
378 | 391 | in this approach will be almost close to zero. If the packets do
|
|
418 | 431 |
|
419 | 432 | <t><figure>
|
420 | 433 | <artwork><![CDATA[
|
421 |
| - Hex Value Binary Value Description Reference |
| 434 | + Hex Value Binary Value Description Reference |
422 | 435 | act chg rest
|
423 |
| - ---------------------------------------------------------------- |
424 |
| - TBD_1_0 00 0 TBD_1 IOAM [This draft] |
425 |
| - TBD_1_1 00 1 TBD_1 IOAM [This draft] |
| 436 | + ------------------------------------------------------------------ |
| 437 | + TBD_1_0 00 0 TBD_1 IOAM [This draft] |
| 438 | + destination option |
| 439 | + and |
| 440 | + IOAM hop-by-hop option |
| 441 | + TBD_1_1 00 1 TBD_1 IOAM [This draft] |
| 442 | + destination option |
| 443 | + and |
| 444 | + IOAM hop-by-hop option |
426 | 445 | ]]></artwork>
|
427 | 446 | </figure></t>
|
428 | 447 | </section>
|
|
0 commit comments