Skip to main content

In Situ Operations, Administration, and Maintenance (IOAM) Direct Exporting
draft-ietf-ippm-ioam-direct-export-11

Revision differences

Document history

Date Rev. By Action
2022-11-09
11 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2022-10-10
11 (System) RFC Editor state changed to AUTH48
2022-10-06
11 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2022-09-28
11 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2022-09-28
11 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2022-09-28
11 (System) IANA Action state changed to In Progress from Waiting on Authors
2022-09-27
11 (System) IANA Action state changed to Waiting on Authors from In Progress
2022-09-23
11 (System) RFC Editor state changed to EDIT
2022-09-23
11 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2022-09-23
11 (System) Announcement was received by RFC Editor
2022-09-23
11 (System) IANA Action state changed to In Progress
2022-09-23
11 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2022-09-23
11 Cindy Morgan IESG has approved the document
2022-09-23
11 Cindy Morgan Closed "Approve" ballot
2022-09-23
11 Cindy Morgan Ballot approval text was generated
2022-09-23
11 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-11.txt
2022-09-23
11 Tal Mizrahi New version accepted (logged-in submitter: Tal Mizrahi)
2022-09-23
11 Tal Mizrahi Uploaded new revision
2022-09-23
10 (System) Removed all action holders (IESG state changed)
2022-09-23
10 Martin Duke IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2022-09-23
10 Roman Danyliw
[Ballot comment]
Thank you to Stephen Farrell for the SECDIR review.

Thank for you for resolving my DISCUSS feedback with the new text in Section …
[Ballot comment]
Thank you to Stephen Farrell for the SECDIR review.

Thank for you for resolving my DISCUSS feedback with the new text in Section 6.
2022-09-23
10 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2022-09-19
10 Zaheduzzaman Sarker [Ballot comment]
Thanks for addressing my discuss points.
2022-09-19
10 Zaheduzzaman Sarker [Ballot Position Update] Position for Zaheduzzaman Sarker has been changed to No Objection from Discuss
2022-09-08
10 Robert Wilton
[Ballot comment]
Discuss cleared.

Previous, non-blocking comments:

1.
  This draft has evolved from combining some of the concepts of PBT-I
  from [I-D.song-ippm-postcard-based-telemetry …
[Ballot comment]
Discuss cleared.

Previous, non-blocking comments:

1.
  This draft has evolved from combining some of the concepts of PBT-I
  from [I-D.song-ippm-postcard-based-telemetry] with immediate
  exporting from [I-D.ietf-ippm-ioam-flags].

I'm not sure that this paragraph is really helpful now, and could probably be deleted - you could use the datatracker to indicate the document history and which previous drafts this document replaces.

2.
  N >> M

I'm assuming that by ">>", this means much greater than?  It would be better use words here, or at least define what this means (e.g., as opposed to a bit-shift).

3.
  An IOAM node
  MAY maintain a counter or a set of counters that count the events in
  which the IOAM node receives a packet with the DEX Option-Type and
  does not collect and/or export data due to the rate limits.

Given that this is a MAY, I wasn't sure that this really specifies anything, I guess that it is just offering a suggestion.

4.
  Exported packets SHOULD NOT be exported over a path or a tunnel that
  is subject to IOAM direct exporting.  Furthermore, IOAM encapsulating
  nodes that can identify a packet as an IOAM exported packet MUST NOT
  push a DEX Option-Type into such a packet.  This requirement is
  intended to prevent nested exporting and/or exporting loops.
 
It was unclear to me how that that SHOULD NOT can really be enforced, if the exported packets are allowed to leave the limited domain.  Perhaps the "SHOULD NOT" should be limited to the domain where IOAM is operating?


5.
  transit or decapsulating IOAM node that receives an unknown IOAM-
  Option-Type ignores it (as defined in [RFC9197]), and specifically
  nodes that do not support the DEX Option-Type ignore it.  Note that
  as per [RFC9197] a decapsulating node removes the IOAM encapsulation
  and all its IOAM-Option-Types, and specifically in the case where one
  of these options is a (possibly unknown) DEX Option-Type.  The
  ability to skip over a (possibly unknown) DEX Option-Type in the
  parsing or in the decapsulation procedure is dependent on the
  specific encapsulation, which is outside the scope of this document.
  For example, when IOAM is encapsulated in IPv6

I found the sentence from "Note that ..." to be somewhat unclear.

6. Option-Type Format

Would it be more helpful to explicitly specify what the length is.  I.e., X bytes + 4 * number of set bits in the Extension-Flags?

7. Extension-Flags

More a question for my own knowledge:  I presume that the length calculation (i.e., checking for the count of set bits) can be performed efficiently?  I.e., if calculating the length is important on any fast path.

8. subject to birthday problem conflicts, while centralized

Would it be helpful to spell out what is meant by "birthday problem conflicts", or perhaps include an informative reference to the wiki page?


Nits:
N>100 => N > 100
2022-09-08
10 Robert Wilton [Ballot Position Update] Position for Robert Wilton has been changed to No Objection from Discuss
2022-08-22
10 Murray Kucherawy
[Ballot comment]
Thanks for resolving my DISCUSS point.

Thank you to the Working Group for tackling the issue of the author count.  I know those …
[Ballot comment]
Thanks for resolving my DISCUSS point.

Thank you to the Working Group for tackling the issue of the author count.  I know those conversations can be quite un-fun.

I concur with John that the references to RFCs 7014 and 5475 should be informative.

Section 4.1 needs a bit of work.  It claims that Section 7.2 of RFC9197 created to the "IOAM Type Registry", but it's actually the "IOAM Trace-Type Registry", yet you appear to want to register stuff in the "IOAM Option-Type Registry" which would be Section 7.1 of RFC 9197.  Please clarify.  Also, both of those registries require that the "Reference" column be specified explicitly, even though it's fairly obvious what it's going to be.
2022-08-22
10 Murray Kucherawy [Ballot Position Update] Position for Murray Kucherawy has been changed to No Objection from Discuss
2022-08-18
10 (System) Changed action holders to Martin Duke (IESG state changed)
2022-08-18
10 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-08-18
10 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2022-08-18
10 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-10.txt
2022-08-18
10 Tal Mizrahi New version accepted (logged-in submitter: Tal Mizrahi)
2022-08-18
10 Tal Mizrahi Uploaded new revision
2022-06-30
09 (System) Changed action holders to Martin Duke, Frank Brockners, Tal Mizrahi, Shwetha Bhandari, Barak Gafni, Haoyu Song (IESG state changed)
2022-06-30
09 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2022-06-30
09 Robert Wilton
[Ballot discuss]
Hi,

I had a couple of minor discuss comments to clarify a couple of points that seemed unclear:

1) Definition of Sequence Number: …
[Ballot discuss]
Hi,

I had a couple of minor discuss comments to clarify a couple of points that seemed unclear:

1) Definition of Sequence Number:

  Sequence Number An optional 32-bit sequence number starting from 0
                  and increasing by 1 for each following monitored
                  packet from the same flow at the encapsulating node.
                  The Sequence Number, when combined with the Flow ID,
                  provides a convenient approach to correlate the
                  exported data from the same user packet.

Please can you clarify.  Is this every packet in the flow (presumably not)?  Does monitored packet means just those with the DEX option?  Could it include other packets

2. Optional field ordering.
  Optional fields The optional fields, if present, reside after the
                  Reserved field.  The order of the optional fields is
                  according to the respective bits that are enabled in
                  the Extension-Flags field.  Each optional field is 4
                  octets long.

Please can clarify that the order is from most significant bit to least significant bit of the option field.

3. Allocation is based on the "RFC
  Required" procedure, as defined in [RFC8126].

Given the number of extensions is so limited, is RFC required (e.g. allows ISE) really a strict enough allocation policy?

Regards,
Rob
2022-06-30
09 Robert Wilton
[Ballot comment]
Here are my non-blocking comments:

1.
  This draft has evolved from combining some of the concepts of PBT-I
  from [I-D.song-ippm-postcard-based-telemetry …
[Ballot comment]
Here are my non-blocking comments:

1.
  This draft has evolved from combining some of the concepts of PBT-I
  from [I-D.song-ippm-postcard-based-telemetry] with immediate
  exporting from [I-D.ietf-ippm-ioam-flags].

I'm not sure that this paragraph is really helpful now, and could probably be deleted - you could use the datatracker to indicate the document history and which previous drafts this document replaces.

2.
  N >> M

I'm assuming that by ">>", this means much greater than?  It would be better use words here, or at least define what this means (e.g., as opposed to a bit-shift).

3.
  An IOAM node
  MAY maintain a counter or a set of counters that count the events in
  which the IOAM node receives a packet with the DEX Option-Type and
  does not collect and/or export data due to the rate limits.

Given that this is a MAY, I wasn't sure that this really specifies anything, I guess that it is just offering a suggestion.

4.
  Exported packets SHOULD NOT be exported over a path or a tunnel that
  is subject to IOAM direct exporting.  Furthermore, IOAM encapsulating
  nodes that can identify a packet as an IOAM exported packet MUST NOT
  push a DEX Option-Type into such a packet.  This requirement is
  intended to prevent nested exporting and/or exporting loops.
 
It was unclear to me how that that SHOULD NOT can really be enforced, if the exported packets are allowed to leave the limited domain.  Perhaps the "SHOULD NOT" should be limited to the domain where IOAM is operating?


5.
  transit or decapsulating IOAM node that receives an unknown IOAM-
  Option-Type ignores it (as defined in [RFC9197]), and specifically
  nodes that do not support the DEX Option-Type ignore it.  Note that
  as per [RFC9197] a decapsulating node removes the IOAM encapsulation
  and all its IOAM-Option-Types, and specifically in the case where one
  of these options is a (possibly unknown) DEX Option-Type.  The
  ability to skip over a (possibly unknown) DEX Option-Type in the
  parsing or in the decapsulation procedure is dependent on the
  specific encapsulation, which is outside the scope of this document.
  For example, when IOAM is encapsulated in IPv6

I found the sentence from "Note that ..." to be somewhat unclear.

6. Option-Type Format

Would it be more helpful to explicitly specify what the length is.  I.e., X bytes + 4 * number of set bits in the Extension-Flags?

7. Extension-Flags

More a question for my own knowledge:  I presume that the length calculation (i.e., checking for the count of set bits) can be performed efficiently?  I.e., if calculating the length is important on any fast path.

8. subject to birthday problem conflicts, while centralized

Would it be helpful to spell out what is meant by "birthday problem conflicts", or perhaps include an informative reference to the wiki page?


Nits:
N>100 => N > 100
2022-06-30
09 Robert Wilton [Ballot Position Update] New position, Discuss, has been recorded for Robert Wilton
2022-06-30
09 Murray Kucherawy
[Ballot discuss]
In Section 3.2, there's this field definition:

  Reserved        This field SHOULD be ignored by the receiver.

I'm worried about …
[Ballot discuss]
In Section 3.2, there's this field definition:

  Reserved        This field SHOULD be ignored by the receiver.

I'm worried about interoperability here.  "SHOULD" allows a choice.  As written, I would be within the protocol if I decided to interpret this field, even if the other participants put junk here.  Wouldn't it be better to say this is a "MUST", or require that it be all zero bits (at least in this version)?  If you really think this needs to be a "SHOULD", I suggest explaining the choice that's being made available to an implementer here.
2022-06-30
09 Murray Kucherawy
[Ballot comment]
Thank you to the Working Group for tackling the issue of the author count.  I know those conversations can be quite un-fun.

I …
[Ballot comment]
Thank you to the Working Group for tackling the issue of the author count.  I know those conversations can be quite un-fun.

I concur with John that the references to RFCs 7014 and 5475 should be informative.

Section 4.1 needs a bit of work.  It claims that Section 7.2 of RFC9197 created to the "IOAM Type Registry", but it's actually the "IOAM Trace-Type Registry", yet you appear to want to register stuff in the "IOAM Option-Type Registry" which would be Section 7.1 of RFC 9197.  Please clarify.  Also, both of those registries require that the "Reference" column be specified explicitly, even though it's fairly obvious what it's going to be.
2022-06-30
09 Murray Kucherawy [Ballot Position Update] New position, Discuss, has been recorded for Murray Kucherawy
2022-06-29
09 Andrew Alston
[Ballot comment]
Thanks for the work on this document.

I wish to fully support Roman's discuss, as I believe the document needs to be explicit …
[Ballot comment]
Thanks for the work on this document.

I wish to fully support Roman's discuss, as I believe the document needs to be explicit about not exporting outside of the IOAM domain
2022-06-29
09 Andrew Alston [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston
2022-06-29
09 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2022-06-29
09 Paul Wouters
[Ballot comment]
I support Roman's DISCUSS.


Personal pet peeve: I strongly prefer +------+----+  over +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  as I find the latter too blinky and distracting from …
[Ballot comment]
I support Roman's DISCUSS.


Personal pet peeve: I strongly prefer +------+----+  over +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  as I find the latter too blinky and distracting from the actual diagram.
2022-06-29
09 Paul Wouters [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters
2022-06-29
09 Zaheduzzaman Sarker
[Ballot discuss]
Thanks for working on this specification.

Thanks to Colin Perkins for his valuable TSVART review. I find the TSVART early reviewer's concern on …
[Ballot discuss]
Thanks for working on this specification.

Thanks to Colin Perkins for his valuable TSVART review. I find the TSVART early reviewer's concern on rate limiting the exported traffic triggered by DEX Option-type as only protection mechanism (https://mailarchive.ietf.org/arch/msg/tsv-art/1WNgYWGJmxLd4f3RAiDk-LJ-S8Y/) very valid but haven't seen it addressed. In this discuss, I would like to bring back attention to that concern and would like to discuss why there should not be a circuit breaker kind of functionality required here?

I also think this specification should be explicit about not exporting IOAM data to any receiver outside of IOAM limited domain. Hence supporting Roman's discuss.

for example - The introduction section can state-

OLD text-

  A
  "receiving entity" in this context can be, for example, an external
  collector, analyzer, controller, decapsulating node, or a software
  module in one of the IOAM nodes.

New text-

  A
  "receiving entity" in this context can be, for example, an external
  collector, analyzer, controller, decapsulating node, or a software
  module in one of the IOAM nodes with in IOAM limited domain.
2022-06-29
09 Zaheduzzaman Sarker [Ballot Position Update] New position, Discuss, has been recorded for Zaheduzzaman Sarker
2022-06-29
09 John Scudder
[Ballot comment]
Thanks for this document. My only comment is that I don’t see why the references to RFCs 7014 and 5475 are normative, they …
[Ballot comment]
Thanks for this document. My only comment is that I don’t see why the references to RFCs 7014 and 5475 are normative, they seem informative to me.
2022-06-29
09 John Scudder [Ballot Position Update] New position, No Objection, has been recorded for John Scudder
2022-06-29
09 Roman Danyliw
[Ballot discuss]
It isn’t clear whether DEX can be exported outside of the IOAM domain.  If it can, more is needed to describe the implications.  …
[Ballot discuss]
It isn’t clear whether DEX can be exported outside of the IOAM domain.  If it can, more is needed to describe the implications.  There are the following related statements:

(a) Section 3.1.2 says:
  Exported packets SHOULD NOT be exported over a path or a tunnel that
  is subject to IOAM direct exporting.

(b) Section 6 says:
  IOAM is assumed to be deployed in a restricted administrative domain,
  thus limiting the scope of the threats above and their affect.  This
  is a fundamental assumption with respect to the security aspects of
  IOAM, as further discussed in [RFC9197].
 
(c) Section 6 says:
  Although the exporting method is not within the scope of this
  document, any exporting method MUST secure the exported data from the
  IOAM node to the receiving entity.  Specifically, an IOAM node that
  performs DEX exporting MUST send the exported data to a pre-
  configured trusted receiving entity.  Furthermore, an IOAM node MUST
  gain explicit consent to export data to a receiving entity before
  starting to send exported data.

Statement (b) is the usual caveat that IOAM traffic stays inside the domain.  However, this new option type is something different – there are the packets themselves and the telemetry generated from them (i.e., the export packets).  Statement (c) is clear and helpful but doesn’t resolve if these entities are in the IOAM domain.  Statement (a) seems to mitigation for not creating loops but like (c) silent on clarifying whether in the IOAM domain.

If export can only happen in the IOAM domain, consider adding something as simple as the following in the Security Considerations:

NEW:
DEX exporting MUST NOT be to entities outside of the IOAM domain.
2022-06-29
09 Roman Danyliw [Ballot comment]
Thank you to Stephen Farrell for the SECDIR review.
2022-06-29
09 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2022-06-28
09 Linda Dunbar Request for Telechat review by OPSDIR Completed: Ready. Reviewer: Linda Dunbar. Sent review to list.
2022-06-28
09 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2022-06-27
09 Éric Vyncke
[Ballot comment]
# Éric Vyncke, INT AD, comments for draft-ietf-ippm-ioam-direct-export-09
CC @evyncke

Thank you for the work put into this document.

Please find below some …
[Ballot comment]
# Éric Vyncke, INT AD, comments for draft-ietf-ippm-ioam-direct-export-09
CC @evyncke

Thank you for the work put into this document.

Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education).

Thanks to Bernie Volz for his internet directorate review at:
https://datatracker.ietf.org/doc/review-ietf-ippm-ioam-direct-export-09-intdir-telechat-volz-2022-06-23/ (please consider Bernie's comments as mine).

Special thanks to Tommy Pauly for the shepherd's detailed write-up including the WG consensus even if it lacks the justification of the intended status and uses an unusual templte.

I hope that this helps to improve the document,

Regards,

-éric

## COMMENTS

### No export method specified

Just curious... why isn't IPFIX selected as the export method (or even a streaming telemetry)? The abstract says "The exporting method and format are outside the scope of this document."

### Repetition in section 3.1

The sentence "The DEX Option-Type is used as a trigger to collect and/or export IOAM data" appears multiple times in this document and looks quite repetitive.

### Section 3.1

s/MAY export and/or collect/MAY export and/or MAY collect/ ? (just to be clear)

### Section 3.1.1 mandatory sampling ?

The 1st paragraph contains a "MUST" rather than a "SHOULD" making sampling a mandatory feature. Isn't this too strong ? Especially when aggregation can be done locally ?

### Section 3.1.1

In `it is recommended to use N>100` should "RECOMMENDED" be used ?

### Section 6

Should network operators also drop packets containing the DEX at their peering points ?

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues.

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
2022-06-27
09 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2022-06-23
09 Bernie Volz Request for Telechat review by INTDIR Completed: Ready with Nits. Reviewer: Bernie Volz. Sent review to list.
2022-06-22
09 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2022-06-22
09 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Linda Dunbar
2022-06-22
09 Gunter Van de Velde Request for Telechat review by OPSDIR is assigned to Linda Dunbar
2022-06-21
09 Bernie Volz Request for Telechat review by INTDIR is assigned to Bernie Volz
2022-06-21
09 Bernie Volz Request for Telechat review by INTDIR is assigned to Bernie Volz
2022-06-21
09 Éric Vyncke Requested Telechat review by INTDIR
2022-06-16
09 Cindy Morgan Placed on agenda for telechat - 2022-06-30
2022-06-16
09 Martin Duke Ballot has been issued
2022-06-16
09 Martin Duke [Ballot Position Update] New position, Yes, has been recorded for Martin Duke
2022-06-16
09 Martin Duke Created "Approve" ballot
2022-06-16
09 Martin Duke IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2022-06-15
09 (System) Changed action holders to Martin Duke (IESG state changed)
2022-06-15
09 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-06-15
09 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2022-06-15
09 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-09.txt
2022-06-15
09 Tal Mizrahi New version accepted (logged-in submitter: Tal Mizrahi)
2022-06-15
09 Tal Mizrahi Uploaded new revision
2022-06-14
08 (System) Changed action holders to Martin Duke, Frank Brockners, Tal Mizrahi, Shwetha Bhandari, Barak Gafni, Haoyu Song (IESG state changed)
2022-06-14
08 Martin Duke IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for Writeup
2022-06-14
08 Martin Duke Ballot writeup was changed
2022-06-14
08 (System) IESG state changed to Waiting for Writeup from In Last Call
2022-06-13
08 Linda Dunbar Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Linda Dunbar. Sent review to list.
2022-06-10
08 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2022-06-10
08 Michelle Thangtamsatid
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-ippm-ioam-direct-export-08. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-ippm-ioam-direct-export-08. If any part of this review is inaccurate, please let us know.

The IANA Functions Operator understands that, upon approval of this document, there are three actions which we must complete.

First, in the IOAM Option-Type registry on the In Situ OAM (IOAM) registry page located at:

https://www.iana.org/assignments/ioam/

A new registration is to be made as follows:

Code Point: [ TBD-at-Registration ]
Name: IOAM Direct Export (DEX) Option Type
Description: See section 3
Reference: [ RFC-to-be; Section 3 ]

Second, a new registry is to be created called the IOAM DEX Flags registry. The new registry will be located on the In Situ OAM (IOAM) registry page located at:

https://www.iana.org/assignments/ioam/

The registry will be managed via RFC Required as defined in RFC8126. The registry contains 8 flag bits numbered 0 through 7. There are no initial registrations in the new registry.

Third, a new registry is to be created called the IOAM DEX Extension-Flags registry. The new registry will be located on the In Situ OAM (IOAM) registry page located at:

https://www.iana.org/assignments/ioam/

The registry will be managed via RFC Required as defined in RFC 8126. The registry contains 8 flag bits numbered 0 through 7. The registry has initial registrations as follows:

Bit Description Reference
----+----------------------------------------------+-------------------
0 Flow ID [ RFC-to-be ]
1 Sequence Number [ RFC-to-be ]
2-7 Unassigned

The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

Michelle Thangtamsatid
IANA Services Specialist
2022-06-10
08 Meral Shirazipour Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Meral Shirazipour. Sent review to list.
2022-06-02
08 Jean Mahoney Request for Last Call review by GENART is assigned to Meral Shirazipour
2022-06-02
08 Jean Mahoney Request for Last Call review by GENART is assigned to Meral Shirazipour
2022-05-31
08 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Linda Dunbar
2022-05-31
08 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Linda Dunbar
2022-05-31
08 Cindy Morgan IANA Review state changed to IANA - Review Needed
2022-05-31
08 Cindy Morgan
The following Last Call announcement was sent out (ends 2022-06-14):

From: The IESG
To: IETF-Announce
CC: draft-ietf-ippm-ioam-direct-export@ietf.org, ippm-chairs@ietf.org, ippm@ietf.org, martin.h.duke@gmail.com, tpauly@apple.com …
The following Last Call announcement was sent out (ends 2022-06-14):

From: The IESG
To: IETF-Announce
CC: draft-ietf-ippm-ioam-direct-export@ietf.org, ippm-chairs@ietf.org, ippm@ietf.org, martin.h.duke@gmail.com, tpauly@apple.com
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (In-situ OAM Direct Exporting) to Proposed Standard


The IESG has received a request from the IP Performance Measurement WG (ippm)
to consider the following document: - 'In-situ OAM Direct Exporting'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2022-06-14. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  In-situ Operations, Administration, and Maintenance (IOAM) is used
  for recording and collecting operational and telemetry information.
  Specifically, IOAM allows telemetry data to be pushed into data
  packets while they traverse the network.  This document introduces a
  new IOAM option type called the Direct Export (DEX) option, which is
  used as a trigger for IOAM data to be directly exported or locally
  aggregated without being pushed into in-flight data packets.  The
  exporting method and format are outside the scope of this document.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-direct-export/


The following IPR Declarations may be related to this I-D:

  https://datatracker.ietf.org/ipr/5329/
  https://datatracker.ietf.org/ipr/5378/
  https://datatracker.ietf.org/ipr/4861/





2022-05-31
08 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2022-05-31
08 Martin Duke Last call was requested
2022-05-31
08 Martin Duke Last call announcement was generated
2022-05-31
08 Martin Duke Ballot approval text was generated
2022-05-31
08 Martin Duke Ballot writeup was generated
2022-05-31
08 (System) Changed action holders to Martin Duke (IESG state changed)
2022-05-31
08 Martin Duke IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2022-05-29
08 (System) Changed action holders to Martin Duke, Zhenbin Li, Tianran Zhou, Ramesh Sivakolundu (IESG state changed)
2022-05-29
08 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-05-29
08 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-08.txt
2022-05-29
08 Tal Mizrahi New version accepted (logged-in submitter: Tal Mizrahi)
2022-05-29
08 Tal Mizrahi Uploaded new revision
2022-05-19
07 Stephen Farrell Request for Early review by SECDIR Completed: Has Issues. Reviewer: Stephen Farrell. Sent review to list.
2022-04-08
07 (System) Changed action holders to Martin Duke, Frank Brockners, Tal Mizrahi, Zhenbin Li, Shwetha Bhandari, Tianran Zhou, Barak Gafni, Haoyu Song, Ramesh Sivakolundu (IESG state changed)
2022-04-08
07 Martin Duke IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2022-03-01
07 (System) Changed action holders to Martin Duke (IESG state changed)
2022-03-01
07 Martin Duke IESG state changed to AD Evaluation from Publication Requested
2022-03-01
07 Tommy Pauly
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated 1 November 2019.

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header?

Proposed Standard. This is appropriate given that this document defines an extension to the IOAM proposed standard. This is indicated on the header.

(2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections:

Technical Summary:

This document extends the IOAM protocol with a new option type for "direct exporting", which signals to measurement boxes that the related IOAM telemetry data should be collected and/or exported.

Working Group Summary:

This document was peeled out of the IOAM flags extension document, after discussion revealed that it needed more careful analysis to avoid various amplification attacks (or accidental amplification). The main work of the WG on this document over the past year has been to work on the security considerations to put bounds on the use of direct export. The WG did come to consensus after this review.

Document Quality:

The document does have input and implementation support from many vendors. One minor issue that the shepherd notes is that there are too many authors on the document, but the authors could not agree to remove anyone. This may be a concern for being able to get responses during AUTH48, etc.

Personnel:

Tommy Pauly is the document shepherd.
Martin Duke is the Responsible Area Director.

(3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG.

I've reviewed this document several times during its development, and I believe it is now ready to progress, based on WG consensus.

(4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed?

We received a TSVART review, which were valuable. A SECDIR review was requested, but not completed. The WG did also spend a good amount of time reviewing the document in detail.

(5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place.

The mechanism of exporting does need careful review to avoid amplification attacks.

(6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here.

The only concern the shepherd has is around the number of authors, as noted above.

(7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why?

Yes, the authors confirmed that any appropriate IPR disclosures where filed.

(8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures.

Three IPR statements were filed, representing two pieces of IPR, both from Huawei. The WG is aware of these and did not raise concerns.

(9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it?

The WG consensus is broad, with both the IOAM and other core participants reviewing and supporting the work.

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.)

No

(11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough.

One nit found was regarding "RFC XXXX", as a placeholder in the IANA section that should reference this document. This seems fine.

(12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

Not applicable

(13) Have all references within this document been identified as either normative or informative?

Yes

(14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion?

No

(15) Are there downward normative references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure.

No

(16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary.

No

(17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126).

This document adds a value to the IOAM Type Registry, and establishes a IOAM DEX Flags and IOAM DEX Extension-Flags registry.

(18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries.

The document defines two registries, IOAM DEX Flags and IOAM DEX Extension-Flags. These require RFC publication, not expert review.

(19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc.

Not applicable.

(20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342?

No YANG module
2022-03-01
07 Tommy Pauly Responsible AD changed to Martin Duke
2022-03-01
07 Tommy Pauly IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2022-03-01
07 Tommy Pauly IESG state changed to Publication Requested from I-D Exists
2022-03-01
07 Tommy Pauly IESG process started in state Publication Requested
2022-03-01
07 Tommy Pauly
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up. Changes are expected over time.

This version is dated 1 November 2019.

(1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header?

Proposed Standard. This is appropriate given that this document defines an extension to the IOAM proposed standard. This is indicated on the header.

(2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections:

Technical Summary:

This document extends the IOAM protocol with a new option type for "direct exporting", which signals to measurement boxes that the related IOAM telemetry data should be collected and/or exported.

Working Group Summary:

This document was peeled out of the IOAM flags extension document, after discussion revealed that it needed more careful analysis to avoid various amplification attacks (or accidental amplification). The main work of the WG on this document over the past year has been to work on the security considerations to put bounds on the use of direct export. The WG did come to consensus after this review.

Document Quality:

The document does have input and implementation support from many vendors. One minor issue that the shepherd notes is that there are too many authors on the document, but the authors could not agree to remove anyone. This may be a concern for being able to get responses during AUTH48, etc.

Personnel:

Tommy Pauly is the document shepherd.
Martin Duke is the Responsible Area Director.

(3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG.

I've reviewed this document several times during its development, and I believe it is now ready to progress, based on WG consensus.

(4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed?

We received a TSVART review, which were valuable. A SECDIR review was requested, but not completed. The WG did also spend a good amount of time reviewing the document in detail.

(5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place.

The mechanism of exporting does need careful review to avoid amplification attacks.

(6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here.

The only concern the shepherd has is around the number of authors, as noted above.

(7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why?

Yes, the authors confirmed that any appropriate IPR disclosures where filed.

(8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures.

Three IPR statements were filed, representing two pieces of IPR, both from Huawei. The WG is aware of these and did not raise concerns.

(9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it?

The WG consensus is broad, with both the IOAM and other core participants reviewing and supporting the work.

(10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.)

No

(11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough.

One nit found was regarding "RFC XXXX", as a placeholder in the IANA section that should reference this document. This seems fine.

(12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

Not applicable

(13) Have all references within this document been identified as either normative or informative?

Yes

(14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion?

No

(15) Are there downward normative references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure.

No

(16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary.

No

(17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126).

This document adds a value to the IOAM Type Registry, and establishes a IOAM DEX Flags and IOAM DEX Extension-Flags registry.

(18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries.

The document defines two registries, IOAM DEX Flags and IOAM DEX Extension-Flags. These require RFC publication, not expert review.

(19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc.

Not applicable.

(20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342?

No YANG module
2022-03-01
07 Tommy Pauly Changed consensus to Yes from Unknown
2022-03-01
07 Tommy Pauly Intended Status changed to Proposed Standard from None
2022-03-01
07 Tommy Pauly Tag Doc Shepherd Follow-up Underway cleared.
2022-01-03
Tina Dang Posted related IPR disclosure Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-ippm-ioam-direct-export
2021-12-15
07 Tommy Pauly Tag Doc Shepherd Follow-up Underway set. Tag Revised I-D Needed - Issue raised by WGLC cleared.
2021-12-15
Jenny Bui Posted related IPR disclosure Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-ippm-ioam-direct-export
2021-10-13
07 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-07.txt
2021-10-13
07 (System) New version approved
2021-10-13
07 (System)
Request for posting confirmation emailed to previous authors: Barak Gafni , Frank Brockners , Haoyu Song , Ramesh Sivakolundu , Shwetha Bhandari , Tal Mizrahi …
Request for posting confirmation emailed to previous authors: Barak Gafni , Frank Brockners , Haoyu Song , Ramesh Sivakolundu , Shwetha Bhandari , Tal Mizrahi , Tianran Zhou , Zhenbin Li
2021-10-13
07 Tal Mizrahi Uploaded new revision
2021-10-12
06 Tommy Pauly Notification list changed to tpauly@apple.com because the document shepherd was set
2021-10-12
06 Tommy Pauly Document shepherd changed to Tommy Pauly
2021-10-08
06 Tommy Pauly Tag Revised I-D Needed - Issue raised by WGLC set.
2021-10-08
06 Tommy Pauly IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2021-09-03
06 Colin Perkins Request for Early review by TSVART Completed: Ready with Issues. Reviewer: Colin Perkins. Sent review to list.
2021-09-02
06 Tero Kivinen Request for Early review by SECDIR is assigned to Stephen Farrell
2021-09-02
06 Tero Kivinen Request for Early review by SECDIR is assigned to Stephen Farrell
2021-08-31
06 Magnus Westerlund Request for Early review by TSVART is assigned to Colin Perkins
2021-08-31
06 Magnus Westerlund Request for Early review by TSVART is assigned to Colin Perkins
2021-08-30
06 Tommy Pauly IETF WG state changed to In WG Last Call from WG Document
2021-08-30
06 Tommy Pauly Requested Early review by TSVART
2021-08-30
06 Tommy Pauly Requested Early review by SECDIR
2021-08-08
06 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-06.txt
2021-08-08
06 (System) New version accepted (logged-in submitter: Tal Mizrahi)
2021-08-08
06 Tal Mizrahi Uploaded new revision
2021-07-12
05 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-05.txt
2021-07-12
05 (System) New version accepted (logged-in submitter: Tal Mizrahi)
2021-07-12
05 Tal Mizrahi Uploaded new revision
2021-07-01
04 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-04.txt
2021-07-01
04 (System) New version approved
2021-07-01
04 (System)
Request for posting confirmation emailed to previous authors: Barak Gafni , Frank Brockners , Haoyu Song , Ramesh Sivakolundu , Shwetha Bhandari , Tal Mizrahi …
Request for posting confirmation emailed to previous authors: Barak Gafni , Frank Brockners , Haoyu Song , Ramesh Sivakolundu , Shwetha Bhandari , Tal Mizrahi , Tianran Zhou , Zhenbin Li
2021-07-01
04 Tal Mizrahi Uploaded new revision
2021-05-11
Jenny Bui Posted related IPR disclosure Huawei Technologies Co.,Ltd's Statement about IPR related to draft-ietf-ippm-ioam-direct-export
2021-02-17
03 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-03.txt
2021-02-17
03 (System) New version approved
2021-02-17
03 (System)
Request for posting confirmation emailed to previous authors: Barak Gafni , Frank Brockners , Haoyu Song , Ramesh Sivakolundu , Shwetha Bhandari , Tal Mizrahi …
Request for posting confirmation emailed to previous authors: Barak Gafni , Frank Brockners , Haoyu Song , Ramesh Sivakolundu , Shwetha Bhandari , Tal Mizrahi , Tianran Zhou , Zhenbin Li , ippm-chairs@ietf.org
2021-02-17
03 Tal Mizrahi Uploaded new revision
2020-11-01
02 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-02.txt
2020-11-01
02 (System) New version approved
2020-11-01
02 (System)
Request for posting confirmation emailed to previous authors: Frank Brockners , Ramesh Sivakolundu , Zhenbin Li , Tal Mizrahi , Barak Gafni , Haoyu Song …
Request for posting confirmation emailed to previous authors: Frank Brockners , Ramesh Sivakolundu , Zhenbin Li , Tal Mizrahi , Barak Gafni , Haoyu Song , Shwetha Bhandari , Tianran Zhou
2020-11-01
02 Tal Mizrahi Uploaded new revision
2020-08-05
01 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-01.txt
2020-08-05
01 (System) New version approved
2020-08-05
01 (System)
Request for posting confirmation emailed to previous authors: Zhenbin Li , Tal Mizrahi , Barak Gafni , Ramesh Sivakolundu , Frank Brockners , Tianran Zhou …
Request for posting confirmation emailed to previous authors: Zhenbin Li , Tal Mizrahi , Barak Gafni , Ramesh Sivakolundu , Frank Brockners , Tianran Zhou , Shwetha Bhandari , Haoyu Song
2020-08-05
01 Tal Mizrahi Uploaded new revision
2020-02-06
00 (System) This document now replaces draft-ioamteam-ippm-ioam-direct-export instead of None
2020-02-06
00 Tal Mizrahi New version available: draft-ietf-ippm-ioam-direct-export-00.txt
2020-02-06
00 (System) New version approved
2020-02-06
00 Tal Mizrahi
Request for posting confirmation emailed  to submitter and authors: Frank Brockners , Zhenbin Li , Barak Gafni , Haoyu Song , Shwetha Bhandari , Tal …
Request for posting confirmation emailed  to submitter and authors: Frank Brockners , Zhenbin Li , Barak Gafni , Haoyu Song , Shwetha Bhandari , Tal Mizrahi , Tianran Zhou , Ramesh Sivakolundu
2020-02-06
00 Tal Mizrahi Uploaded new revision