Service Function Chaining J. Guichard Internet-Draft Huawei Intended status: Informational M. Smith Expires: February 19, 2018 S. Kumar Cisco Systems, Inc. S. Majee F5 Networks P. Agarwal Broadcom K. Glavin Riverbed Y. Laribi Citrix T. Mizrahi Marvell August 18, 2017 Network Service Header (NSH) MD Type 1: Context Header Allocation (Data Center) draft-guichard-sfc-nsh-dc-allocation-07 Abstract This document provides a recommended default allocation for the Network Service Header (NSH) MD Type 1 fixed length context header when NSH is used for Service Function Chaining within a data center. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on February 19, 2018. Guichard, et al. Expires February 19, 2018 [Page 1] Internet-Draft NSH Context Allocation (Data Center) August 2017 Copyright Notice Copyright (c) 2017 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3 2. Definition Of Terms . . . . . . . . . . . . . . . . . . . . . 3 3. Recommended Data Center MD Type 1 Fixed Length Context Allocation . . . . . . . . . . . . . . . . . . . . . . . . . 3 3.1. Data Center Allocation Specifics . . . . . . . . . . . . 3 4. Context Allocation and Control Plane Considerations . . . . . 5 5. Security Considerations . . . . . . . . . . . . . . . . . . . 6 6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 6 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6 8. References . . . . . . . . . . . . . . . . . . . . . . . . . 6 8.1. Normative References . . . . . . . . . . . . . . . . . . 6 8.2. Informative References . . . . . . . . . . . . . . . . . 7 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 8 1. Introduction Network Service Header (NSH) [I-D.ietf-sfc-nsh] provides a mechanism to carry shared metadata between network devices and service functions, and between service functions. When MD Type 1 is used, such metadata is carried within a fixed length (16-bytes) context header. This document provides a recommended default allocation of the MD Type 1 context header for Service Function Chaining [RFC7665] within a data center. The context header may be used to support use cases such as those described in [I-D.ietf-sfc-dc-use-cases]. The goal of this document is to provide a reference allocation that may be used with or without a control plane. It also serves as a guide to implementers and network operators. Guichard, et al. Expires February 19, 2018 [Page 2] Internet-Draft NSH Context Allocation (Data Center) August 2017 1.1. Requirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 [RFC2119]. 2. Definition Of Terms This document uses the terms as defined in [RFC7498], [RFC7665], and [I-D.ietf-sfc-nsh] . 3. Recommended Data Center MD Type 1 Fixed Length Context Allocation The following context header allocation provides information used to support SFC operation within a generic data center environment. [I-D.ietf-sfc-dc-use-cases] provides an overview of data center use cases to support the allocation. The 16 bytes of Fixed Length Context Header is delivered to service functions that may then use the metadata it carries for local policy enforcement and other functionality. 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |D| F |R| Source Node ID | Source Interface ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reserved | Tenant ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination Class / Reserved | Source Class | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Opaque Service Class | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 1: NSH DC Context Allocation 3.1. Data Center Allocation Specifics The specific 16 byte allocation of the Fixed Length Context Header is as follows: Flag bits: Bits 0-3 are flag bits. Bits 0-2 are defined in this document and the remaining bit is reserved. Guichard, et al. Expires February 19, 2018 [Page 3] Internet-Draft NSH Context Allocation (Data Center) August 2017 D bit: The D-bit is used to indicate whether the Destination Class field in the 3rd word is used. If D-bit is not set then the field is reserved. F bits: Two-bit value that indicates the format of the Opaque Service Class in the 4th word. Source Node ID: An identifier indicating the source device where the original traffic initially entered the Service Function Chain. This identifier is unique within an SFC-enabled domain. Source Interface ID: An identifier indicating the source interface where the original traffic initially entered the Service Function Chain. This identifier is scoped within the context of the Source Node ID. Tenant ID: The tenant identifier is used to represent the tenant that the Service Function Chain is being applied to. The Tenant ID is a unique value assigned by a control plane. The distribution of Tenant ID's is outside the scope of this document. As an example application of this field, hardware may insert a VRF ID, VLAN number or VXLAN VNI. Destination Class: The destination class represents the logical classification of the destination of the traffic. This field is optional and/or the Destination Class may not be known. The D-bit is used to indicate that this field contains a valid Destination Class. Source Class: represents the logical classification of the source of the traffic. For example, this might represent a source application, a group of like endpoints, or a set of users originating the traffic. This grouping is done for the purposes of applying policy. Policy is applied to groups rather than individual endpoints. Opaque Service Class: A unique identifier that can carry metadata specific to a Rendered Service Path, the format of which is specified by the value of the F-bits as follows: 00: If the F-bits are not set, then the Opaque Service Class field is not specified and can be used as determined by the control plane. 01 (ServiceTag): a ServiceTag is used to identify a particular flow, transaction or an application message unit. The ServiceTag may be used to augment the source and/or destination class. A ServiceTag is a unique identifier that can be used to enable functionality such as classification bypass, slow path skipping and flow programming. As part of the ServiceTag word, bit 0 is Guichard, et al. Expires February 19, 2018 [Page 4] Internet-Draft NSH Context Allocation (Data Center) August 2017 the A bit and is used, when needed, to indicate acknowledgement of a ServiceTag by a Service Function. 02 (Application ID): contains an application identification as described in [RFC6759], and [I-D.penno-sfc-appid] 03 (Timestamp): indicates the time at which the packet was received by the Classifier. The Timestamp has two possible formats: * A 32-bit nanosecond field (Figure 2), which uses the 32 least significant bits of the IEEE 1588 [IEEE1588] timestamp format. * The NTP [RFC5905] 32-bit Timestamp format (Figure 3), which is one of the recommended timestamp formats in [I-D.mizrahi-intarea-packet-timestamps]. It is assumed that in a given administrative domain only one of the formats will be used, and that the control plane determines which timestamp format is used. The two timestamp formats are illustrated in the following figures. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Nanoseconds | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 2: 32-bit Timestamp Format based on PTP [IEEE1588] 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Seconds | Fraction | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 3: NTP [RFC5905] 32-bit Timestamp Format 4. Context Allocation and Control Plane Considerations The context header allocations specified in this document are one of many possible allocation schemes and should be used as a guideline only; that is to say these allocations may vary based upon deployment Guichard, et al. Expires February 19, 2018 [Page 5] Internet-Draft NSH Context Allocation (Data Center) August 2017 specifics and use cases. The suggested allocation is valid with or without a control plane but the semantics of context values MUST be shared amongst participating nodes via some mechanism. The actual method of defining and distributing the allocation scheme is outside of the scope of this document. 5. Security Considerations This document describes an allocation scheme for the metadata carried within the NSH Fixed Length Context Header. This allocation includes a number of identifiers that must be distributed to participating network elements. While the control plane protocols for distributing these identifiers is outside the scope of this document, any control plane protocol should ensure that these identifiers are securely distributed to the network elements participating in the SFC. Additionally, many of the fields such as Source and Destination Class described in the metadata directly impact the network policy applied to the traffic flowing through the SFC. There is a risk that these identifiers may be spoofed and proper precautions should be put in place to ensure that these fields can only be updated by trusted entities. Due to the importance of these fields, confidentiality may also be required to ensure that traffic cannot be targeted for attack based on the policy identifiers. This document does not directly address these threats but provides input to the NSH specification as requirements to be considered in securing the contents of the metadata. 6. Acknowledgments The authors would like to thank Mohamed Boucadair for his helpful review and comments. 7. IANA Considerations This document includes no request to IANA. 8. References 8.1. Normative References [I-D.ietf-sfc-nsh] Quinn, P., Elzur, U., and C. Pignataro, "Network Service Header (NSH)", draft-ietf-sfc-nsh-19 (work in progress), August 2017. Guichard, et al. Expires February 19, 2018 [Page 6] Internet-Draft NSH Context Allocation (Data Center) August 2017 [I-D.penno-sfc-appid] Penno, R., Claise, B., Pignataro, C., and C. Fontaine, "Using Application Identification in Services Function Chaining Metadata", draft-penno-sfc-appid-05 (work in progress), August 2016. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC6759] Claise, B., Aitken, P., and N. Ben-Dvora, "Cisco Systems Export of Application Information in IP Flow Information Export (IPFIX)", RFC 6759, DOI 10.17487/RFC6759, November 2012, . [RFC7665] Halpern, J., Ed. and C. Pignataro, Ed., "Service Function Chaining (SFC) Architecture", RFC 7665, DOI 10.17487/RFC7665, October 2015, . 8.2. Informative References [I-D.ietf-sfc-dc-use-cases] Kumar, S., Tufail, M., Majee, S., Captari, C., and S. Homma, "Service Function Chaining Use Cases In Data Centers", draft-ietf-sfc-dc-use-cases-06 (work in progress), February 2017. [I-D.mizrahi-intarea-packet-timestamps] Mizrahi, T., Fabini, J., and A. Morton, "Guidelines for Defining Packet Timestamps", draft-mizrahi-intarea-packet- timestamps-00 (work in progress), June 2017. [IEEE1588] IEEE, "IEEE 1588 Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems Version 2", 2008. [RFC5905] Mills, D., Martin, J., Ed., Burbank, J., and W. Kasch, "Network Time Protocol Version 4: Protocol and Algorithms Specification", RFC 5905, DOI 10.17487/RFC5905, June 2010, . [RFC7498] Quinn, P., Ed. and T. Nadeau, Ed., "Problem Statement for Service Function Chaining", RFC 7498, DOI 10.17487/RFC7498, April 2015, . Guichard, et al. Expires February 19, 2018 [Page 7] Internet-Draft NSH Context Allocation (Data Center) August 2017 Authors' Addresses Jim Guichard Huawei Email: james.n.guichard@huawei.com Michael Smith Cisco Systems, Inc. Email: michsmit@cisco.com Surendra Kumar Cisco Systems, Inc. Email: smkumar@cisco.com Sumandra Majee F5 Networks 90 Rio Robles San Jose, CA 95134 Email: S.Majee@f5.com Puneet Agarwal Broadcom Email: pagarwal@broadcom.com Kevin Glavin Riverbed Email: Kevin.Glavin@riverbed.com Youcef Laribi Citrix Email: Youcef.Laribi@citrix.com Guichard, et al. Expires February 19, 2018 [Page 8] Internet-Draft NSH Context Allocation (Data Center) August 2017 Tal Mizrahi Marvell Email: talmi@marvell.com Guichard, et al. Expires February 19, 2018 [Page 9]