< draft-ietf-sfc-nsh-tlv-13.txt   draft-ietf-sfc-nsh-tlv-14.txt >
SFC Yuehua. Wei, Ed. SFC Yuehua. Wei, Ed.
Internet-Draft ZTE Corporation Internet-Draft ZTE Corporation
Intended status: Standards Track U. Elzur Intended status: Standards Track U. Elzur
Expires: 30 July 2022 Intel Expires: 1 October 2022 Intel
S. Majee S. Majee
Individual contributor Individual contributor
C. Pignataro C. Pignataro
Cisco Cisco
D. Eastlake D. Eastlake
Futurewei Technologies Futurewei Technologies
26 January 2022 30 March 2022
Network Service Header Metadata Type 2 Variable-Length Context Headers Network Service Header Metadata Type 2 Variable-Length Context Headers
draft-ietf-sfc-nsh-tlv-13 draft-ietf-sfc-nsh-tlv-14
Abstract Abstract
Service Function Chaining (SFC) uses the Network Service Header (NSH) Service Function Chaining (SFC) uses the Network Service Header (NSH)
(RFC 8300) to steer and provide context Metadata (MD) with each (RFC 8300) to steer and provide context Metadata (MD) with each
packet. Such Metadata can be of various Types including MD Type 2 packet. Such Metadata can be of various Types including MD Type 2
variable length context headers. This document specifies several variable length context headers. This document specifies several
such context headers that can be used within a service function path. such context headers that can be used within a service function path.
Status of This Memo Status of This Memo
skipping to change at page 1, line 41 skipping to change at page 1, line 41
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on 30 July 2022. This Internet-Draft will expire on 1 October 2022.
Copyright Notice Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/ Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document. license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights Please review these documents carefully, as they describe your rights
skipping to change at page 2, line 27 skipping to change at page 2, line 27
2. Conventions used in this document . . . . . . . . . . . . . . 3 2. Conventions used in this document . . . . . . . . . . . . . . 3
2.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 2.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3
2.2. Requirements Language . . . . . . . . . . . . . . . . . . 3 2.2. Requirements Language . . . . . . . . . . . . . . . . . . 3
3. NSH MD Type 2 format . . . . . . . . . . . . . . . . . . . . 3 3. NSH MD Type 2 format . . . . . . . . . . . . . . . . . . . . 3
4. NSH MD Type 2 Context Headers . . . . . . . . . . . . . . . . 4 4. NSH MD Type 2 Context Headers . . . . . . . . . . . . . . . . 4
4.1. Forwarding Context . . . . . . . . . . . . . . . . . . . 4 4.1. Forwarding Context . . . . . . . . . . . . . . . . . . . 4
4.2. Tenant Identifier . . . . . . . . . . . . . . . . . . . . 6 4.2. Tenant Identifier . . . . . . . . . . . . . . . . . . . . 6
4.3. Ingress Network Node Information . . . . . . . . . . . . 6 4.3. Ingress Network Node Information . . . . . . . . . . . . 6
4.4. Ingress Network Source Interface . . . . . . . . . . . . 7 4.4. Ingress Network Source Interface . . . . . . . . . . . . 7
4.5. Flow ID . . . . . . . . . . . . . . . . . . . . . . . . . 8 4.5. Flow ID . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.6. Source and/or Destination Groups . . . . . . . . . . . . 8 4.6. Source and/or Destination Groups . . . . . . . . . . . . 9
4.7. Policy Identifier . . . . . . . . . . . . . . . . . . . . 9 4.7. Policy Identifier . . . . . . . . . . . . . . . . . . . . 9
5. Security Considerations . . . . . . . . . . . . . . . . . . . 10 5. Security Considerations . . . . . . . . . . . . . . . . . . . 10
6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
7.1. MD Type 2 Context Types . . . . . . . . . . . . . . . . . 10 7.1. MD Type 2 Context Types . . . . . . . . . . . . . . . . . 10
7.2. Forwarding Context Types . . . . . . . . . . . . . . . . 11 7.2. Forwarding Context Types . . . . . . . . . . . . . . . . 11
7.3. Flow ID Context Types . . . . . . . . . . . . . . . . . . 12
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 12 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 12
8.1. Normative References . . . . . . . . . . . . . . . . . . 12 8.1. Normative References . . . . . . . . . . . . . . . . . . 12
8.2. Informative References . . . . . . . . . . . . . . . . . 12 8.2. Informative References . . . . . . . . . . . . . . . . . 13
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14
1. Introduction 1. Introduction
The Network Service Header (NSH) [RFC8300] is the Service Function The Network Service Header (NSH) [RFC8300] is the Service Function
Chaining (SFC) encapsulation that supports the SFC architecture Chaining (SFC) encapsulation that supports the SFC architecture
[RFC7665]. As such, the NSH provides following key elements: [RFC7665]. As such, the NSH provides following key elements:
1. Service Function Path (SFP) identification. 1. Service Function Path (SFP) identification.
skipping to change at page 5, line 41 skipping to change at page 5, line 41
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Session ID | | Session ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 7: Forwarding Context - 5(Session ID) Figure 7: Forwarding Context - 5(Session ID)
where: where:
Context Type (CT) is four bits-long field that defines the length Context Type (CT) is four bits-long field that defines the length
and the interpretation of the Forwarding Context field. Please and the interpretation of the Forwarding Context field. Please
see the IANA Considerations in Section 7. This document defines see the IANA Considerations in Section 7.2. This document defines
these CT values: these CT values:
- 0x0 - 12 bits VLAN identifier [IEEE.802.1Q_2018]. See - 0x0 - 12 bits VLAN identifier [IEEE.802.1Q_2018]. See
Figure 3. Figure 3.
- 0x1 - 24 bits double tagging identifiers. A service VLAN tag - 0x1 - 24 bits double tagging identifiers. A service VLAN tag
followed by a customer VLAN tag [IEEE.802.1Q_2018]. The two followed by a customer VLAN tag [IEEE.802.1Q_2018]. The two
VLAN IDs are concatenated and appear in the same order that VLAN IDs are concatenated and appear in the same order that
they appeared in the payload. See Figure 4. they appeared in the payload. See Figure 4.
skipping to change at page 6, line 43 skipping to change at page 6, line 43
Figure 8: Tenant Identifier List Figure 8: Tenant Identifier List
The fields are described as follows: The fields are described as follows:
Length: Indicates the length of the Tenant ID in octets (see Length: Indicates the length of the Tenant ID in octets (see
Section 2.5.1 of [RFC8300]). Section 2.5.1 of [RFC8300]).
Tenant ID: Represents an opaque value pointing to Orchestration Tenant ID: Represents an opaque value pointing to Orchestration
system-generated tenant identifier. The structure and semantics system-generated tenant identifier. The structure and semantics
of this field are deployment specific. of this field are specific to the operator's deployment across its
operational domain, and are specified and assigned by an
orchestration function. The specifics of that orchestration-based
assignment are outside the scope of this document.
4.3. Ingress Network Node Information 4.3. Ingress Network Node Information
This context header carries a Node ID of the ingress network node. This context header carries a Node ID of the ingress network node.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Metadata Class = 0x0000 | Type = TBA3 |U| Length = var| | Metadata Class = 0x0000 | Type = TBA3 |U| Length = var|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
skipping to change at page 8, line 19 skipping to change at page 8, line 19
Label as Flow ID, [RFC6790] defined an entropy label which is Label as Flow ID, [RFC6790] defined an entropy label which is
generated based on flow information in the MPLS network is another generated based on flow information in the MPLS network is another
example of Flow ID. Absence of this field, or a value of zero example of Flow ID. Absence of this field, or a value of zero
denotes that packets have not been labeled. denotes that packets have not been labeled.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Metadata Class = 0x0000 | Type = TBA5 |U| Length = 4 | | Metadata Class = 0x0000 | Type = TBA5 |U| Length = 4 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Flow ID | |CT=0x0 | Reserved | IPv6 Flow ID |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 11: Flow ID Figure 11: IPv6 Flow ID
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Metadata Class = 0x0000 | Type = TBA5 |U| Length = 4 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|CT=0x1 | Reserved | MPLS entropy label |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 12: MPLS entropy label
The fields are described as follows: The fields are described as follows:
Length: Indicates the length of the Flow ID in octets (see Length: Indicates the length of the Flow ID in octets (see
Section 2.5.1 of [RFC8300]). For example, IPv6 Flow Label in Section 2.5.1 of [RFC8300]). For example, IPv6 Flow Label in
[RFC8200] is 20-bit long. An entropy label in the MPLS network in [RFC8200] is 20-bit long. An entropy label in the MPLS network in
[RFC6790] is also 20-bit long. [RFC6790] is also 20-bit long.
Flow ID: Represents an opaque value of the Flow ID. The Flow ID Context Type (CT) is four bits-long field that defines the length
is right justified (appears in the least significant bits of the and the interpretation of the Flow ID field. Please see the IANA
Flow ID word) and is padded on the left with bits which MUST be Considerations in Section 7.3. This document defines these CT
sent as zero and ignored on receipt. values:
- 0x0 - 20 bits IPv6 Flow Label in [RFC8200]. See Figure 11.
- 0x1 - 20 bits entropy label in the MPLS network in [RFC6790].
See Figure 12.
Reserved bits in the context fields MUST be sent as zero and
ignored on receipt.
4.6. Source and/or Destination Groups 4.6. Source and/or Destination Groups
Intent-based systems can use this data to express the logical Intent-based systems can use this data to express the logical
grouping of source and/or destination objects. [OpenStack] and grouping of source and/or destination objects. [OpenStack] and
[OpenDaylight] provide examples of such a system. Each is expressed [OpenDaylight] provide examples of such a system. Each is expressed
as a 32-bit opaque object. as a 32-bit opaque object.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Metadata Class = 0x0000 | Type = TBA6 |U| Length=8 | | Metadata Class = 0x0000 | Type = TBA6 |U| Length=8 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Source Group | | Source Group |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Dest Group | | Dest Group |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 12: Source/Dest Groups Figure 13: Source/Dest Groups
If there is no group information specified for the source group or
dest group field, the field MUST be sent as zero and ignored on
receipt.
4.7. Policy Identifier 4.7. Policy Identifier
Traffic handling policies are often referred to by a system-generated Traffic handling policies are often referred to by a system-generated
identifier, which is then used by the devices to look up the policy's identifier, which is then used by the devices to look up the policy's
content locally. For example, this identifier could be an index to content locally. For example, this identifier could be an index to
an array, a lookup key, a database Id. The identifier allows an array, a lookup key, a database Id. The identifier allows
enforcement agents or services to look up the content of their part enforcement agents or services to look up the content of their part
of the policy. of the policy.
0 1 2 3 0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Metadata Class = 0x0000 | Type = TBA7 |U| Length=var | | Metadata Class = 0x0000 | Type = TBA7 |U| Length=var |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
~ Policy ID ~ ~ Policy ID ~
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 13: Policy ID Figure 14: Policy ID
The fields are described as follows: The fields are described as follows:
Length: Indicates the length of the Policy ID in octets (see Length: Indicates the length of the Policy ID in octets (see
Section 2.5.1 of [RFC8300]). Section 2.5.1 of [RFC8300]).
Policy ID: Represents an opaque value of the Policy ID. Policy ID: Represents an opaque value of the Policy ID.
This policy identifier is a general policy ID, essentially a key to This policy identifier is a general policy ID, essentially a key to
allow Service Functions to know which policies to apply to packets. allow Service Functions to know which policies to apply to packets.
skipping to change at page 12, line 5 skipping to change at page 12, line 5
+---------+-----------------------------------------+---------------+ +---------+-----------------------------------------+---------------+
| 0x4 | 32-bit Session ID | This document | | 0x4 | 32-bit Session ID | This document |
+---------+-----------------------------------------+---------------+ +---------+-----------------------------------------+---------------+
| 0x5-0xE | Unassigned | | | 0x5-0xE | Unassigned | |
+---------+-----------------------------------------+---------------+ +---------+-----------------------------------------+---------------+
| 0xF | Reserved | This document | | 0xF | Reserved | This document |
+---------+-----------------------------------------+---------------+ +---------+-----------------------------------------+---------------+
Table 2: Forwarding Context Types Table 2: Forwarding Context Types
7.3. Flow ID Context Types
IANA is requested to create a new sub-registry for "Flow ID Context"
context types at [IANA-NSH-MD2] as follows:
The Registration Policy is IETF Review
+=========+==============================+===============+
| Value | Flow ID Context Header Types | Reference |
+=========+==============================+===============+
| 0x0 | 20-bit IPv6 Flow Label | This document |
+---------+------------------------------+---------------+
| 0x1 | 20-bit entropy label in the | This document |
| | MPLS network | |
+---------+------------------------------+---------------+
| 0x2-0xE | Unassigned | |
+---------+------------------------------+---------------+
| 0xF | Reserved | This document |
+---------+------------------------------+---------------+
Table 3: Flow ID Context Types
8. References 8. References
8.1. Normative References 8.1. Normative References
[I-D.ietf-sfc-nsh-integrity] [I-D.ietf-sfc-nsh-integrity]
Boucadair, M., Reddy, T., and D. Wing, "Integrity Boucadair, M., Reddy, T., and D. Wing, "Integrity
Protection for the Network Service Header (NSH) and Protection for the Network Service Header (NSH) and
Encryption of Sensitive Context Headers", Work in Encryption of Sensitive Context Headers", Work in
Progress, Internet-Draft, draft-ietf-sfc-nsh-integrity-09, Progress, Internet-Draft, draft-ietf-sfc-nsh-integrity-09,
20 September 2021, <https://www.ietf.org/archive/id/draft- 20 September 2021, <https://www.ietf.org/archive/id/draft-
 End of changes. 15 change blocks. 
16 lines changed or deleted 64 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/