Network Working GroupIndependent Submission R. BrowneInternet DraftRequest for Comments: 8592 A. ChilikinIntended status:Category: Informational IntelExpires: August 2019ISSN: 2070-1721 T. Mizrahi Huawei Network.IO Innovation LabFebruary 25,May 2019AKey PerformanceIndicatorsIndicator (KPI) Stamping for the Network Service Header (NSH)draft-browne-sfc-nsh-kpi-stamp-07Abstract This document describesa methodmethods of carrying Key Performance Indicators (KPIs) using the Network Service Header (NSH).This methodThese methods may be used, for example, to monitor latency and QoS marking to identify problems on some links or service functions. Status ofthisThis Memo ThisInternet-Draftdocument is not an Internet Standards Track specification; it is published for informational purposes. This issubmitteda contribution toIETF in full conformance withtheprovisions of BCP 78 and BCP 79. Internet-Drafts are working documentsRFC Series, independently ofthe Internet Engineering Task Force (IETF),any other RFC stream. The RFC Editor has chosen to publish this document at itsareas,discretion and makes no statement about itsworking groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents validvalue fora maximum of six months and may be updated, replaced,implementation orobsoleteddeployment. Documents approved for publication byother documents atthe RFC Editor are not candidates for anytime. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The listlevel of Internet Standard; see Section 2 of RFC 7841. Information about the currentInternet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The liststatus ofInternet-Draft Shadow Directories canthis document, any errata, and how to provide feedback on it may beaccessedobtained athttp://www.ietf.org/shadow.html. This Internet-Draft will expire on August 25, 2019.https://www.rfc-editor.org/info/rfc8592. Copyright Notice Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents(http://trustee.ietf.org/license-info)(https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.Table of Contents 1. Introduction................................................ 2....................................................2 2. Terminology................................................. 3.....................................................3 2.1.RequirementRequirements Language................................... 3......................................3 2.2. Definition of Terms.................................... 3........................................3 2.2.1. Terms Defined inthisThis Document.................... 4......................4 2.3. Abbreviations.......................................... 4..............................................5 3. NSH KPI Stamping: An Overview............................... 6...................................6 3.1. Prerequisites.......................................... 7..............................................7 3.2. Operation............................................. 10..................................................9 3.2.1. Flow Selection................................... 10......................................9 3.2.2. SCP Interface.................................... 10......................................10 3.3. Performance Considerations............................ 11................................11 4. NSHKPI-stampingKPI-Stamping Encapsulation............................. 12.................................12 4.1.KPI-stampingKPI-Stamping Extended Encapsulation................... 13.......................13 4.1.1. NSH Timestamping Encapsulation (Extended Mode)... 15.....15 4.1.2. NSHQoS-stampingQoS-Stamping Encapsulation (Extended Mode)... 17.....17 4.2.KPI-stampingKPI-Stamping Encapsulation (Detection Mode)........... 20...............20 5. Hybrid Models.............................................. 22..................................................22 5.1. Targeted VNFStamp .................................... 23Stamping .....................................23 6. Fragmentation Considerations............................... 23...................................23 7. Security Considerations.................................... 24........................................24 8. IANA Considerations........................................ 25............................................24 9.Contributors ............................................... 25 10. Acknowledgments ........................................... 25 11.References................................................ 25 11.1......................................................25 9.1. Normative References................................. 25 11.2.......................................25 9.2. Informative References............................... 26....................................25 Acknowledgments ...................................................27 Contributors ......................................................27 Authors' Addresses ................................................27 1. Introduction The Network Service Header (NSH), as defined by [RFC8300], specifies a method for steeringthetraffic among an ordered set of Service Functions (SFs) using an extensible service header. This allows for flexibility and programmability in the forwarding plane to invoke the appropriate SFs for specific flows. The NSH promises a compelling vista of operational flexibility. However, many service providers are concerned about service and configuration visibility. This concern increases when considering that many service providers wish to run their networks seamlessly in'hybrid' mode,"hybrid mode", whereby they wish to mix physical and virtual SFs and run services seamlessly between the two domains. This document describes generic methods to monitor and debugservice function chainsService Function Chains (SFCs) in terms of latency and QoS marking of the flows withina service function chain. This is referedan SFC. These are referred todetection modeas "detection mode" andextended mode"extended mode" and are explained insectionSection 4. Themethodmethods described inthethis documentisare compliant with hybrid architectures in which Virtual Network Functions (VNFs) and Physical Network Functions (PNFs) are freely mixed in theservice function chain. This methodSFC. These methods alsoprovidesprovide flexibilityto monitorfor monitoring the performance and configuration of an entire chain orpartparts thereof as desired.This method isThese methods are extensible to monitoring otherKPIs.Key Performance Indicators (KPIs). Please refer to [RFC7665] for an architectural context for this document. Themethodmethods described in this documentisare notan OAM protocolOperations, Administration, and Maintenance (OAM) protocols such as[Y.1731] or [Y.1564].[Y.1731]. Assuch it doessuch, they do not define new OAM packet types oroperation. Rather it monitorsoperations. Rather, they monitor theservice function chainSFC's performance and configuration for subscriber payloads andindicatesindicate subscriber QoE rather than out-of-band infrastructure metrics. This document differs fromto [I-D.ippm.ioam][In-Situ-OAM] in the sense that it is specifically tied to NSHoperationoperations and is not generic in nature. 2. Terminology 2.1.RequirementRequirements Language The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14[RFC2119][RFC8174][RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here. 2.2. Definition of Terms This section presents the main terms used in this document. This document also makes use of the terms defined in [RFC7665] and [RFC8300]. 2.2.1. Terms Defined inthisThis Document First Stamping Node (FSN): The first node alonga service function chainan SFC that stamps packets using KPI stamping. The FSN matches each packet with a Stamping Controller (SC) flow based on (but not limited to) a stamping classification criterion such as transport 5-tuplecoordinates, but not limited to.coordinates. Last Stamping Node (LSN): The last node alonga service function chainan SFC that stamps packets using KPI stamping. From a forwarding point ofviewview, the LSN removes the NSHheaderand forwards the raw IP packet to the next hop. From acontrol planecontrol-plane point ofviewview, the LSN reads all the metadata (MD) and exports it to a system performance statistics agent or repository. The LSN should use the NSH Service Index (SI) to indicate ifaan SF was at the end of the chain. The LSN may change the Service Path Identifier (SPI) to a preconfigured valuein orderso that the network underlay forwards themetadataMD back directly to the KPI database (KPIDB) based on this value. Key Performance Indicator Database (KPIDB):denotesDenotes the external storage ofmetadataMD for reporting, trend analysis, etc.KPI-stamping:KPI stamping: The insertion of latency-related and/or QoS-related information into a packet using NSHmetadata.MD. Flow ID:The Flow ID is aA unique16 bit16-bit identifier written into the header by the classifier. This allows 65536 flows to be concurrently stamped on any given NSH servicechain (SPI). QoS-stamping:chain. QoS stamping: The insertion of QoS-related information into a packet using NSHmetadata.MD. Stamping Controller (SC): TheSC is thecentral logic that decides what packets to stamp andhow.how to stamp them. The SC instructs the classifier on how to build theKPI stamp specificparts of theNSH. StampNSH that are specific to KPI stamping. Stamping Control Plane (SCP):theThe control plane between the FSN and the SC. 2.3. Abbreviations DEI Drop Eligible Indicator DSCP Differentiated Services Code Point FSN First Stamping Node KPI Key Performance Indicator KPIDB Key Performance Indicator Database LSN Last Stamping Node MD Metadata NFV Network Function VirtualizationNFVI-PoP NFV Infrastructure Point of Presence NIC Network Interface CardNSH Network Service Header OAM Operations, Administration, and Maintenance PCP Priority Code Point PNF Physical Network Function PNFN Physical Network Function Node QoE Quality of Experience QoS Quality of ServiceQS QoS StampRSP Rendered Service Path SC Stamping Controller SCL Service Classifier SCPStampStamping Control PlaneSI Service IndexSF Service Function SFC Service Function ChainSFPSI ServiceFunction PathIndex SSI Stamp Service IndexTC Traffic ClassTS Timestamp VLAN Virtual Local Area Network VNF Virtual Network FunctionvSwitch Virtual Switch3. NSH KPI Stamping: An Overview A typicalKPI stampingKPI-stamping architecture is presented in Figure 1. Stamping Controller | KPIDB | SCP Interface | ,---. ,---. ,---. ,---. / \ / \ / \ / \ ( SCL )-------->( SF1 )--------->( SF2 )--------->( SFn ) \ FSN / \ / \ / \ LSN / `---' `---' `---' `---' Figure 1: LogicalrolesRoles in NSH KPI Stamping TheStamping Controller (SC)SC will be part of the SFCcontrol planecontrol-plane architecture, but it is described separately in this document for clarity. The SC is responsible for initiating start/stop stamp requests to the SCL orFirst Stamp Node (FSN),FSN and also for distributingNSH stampingthe NSH-stamping policy into the service chain via theStamping Control Plane (SCP)SCP interface. The FSN will typically be part of theSCL,SCL butagainis called out as a separate logical entity for clarity. The FSN is responsible for marking NSH MDfields whichfields; this tells nodes in the service chain how to behave in terms of stamping at the SF ingress,egressthe SF egress, or both, or ignoring the stamp NSHmetadataMD completely. The FSN also writes the Reference Time value, a (possibly inaccurate) estimate of the currenttime-of-day,time of day, into the header, allowing the{SPI:Flow ID}"SPI:Flow ID" performance to be compared to previous samples for offline analysis. The FSN should return an error to the SC if not synchronized to the currenttime-of-daytime of day and forward the packet along theservice-chainservice chain unchanged. The code and format of the errorisare specific to the protocol used between the FSN and SC; these considerations are out of scope. SF1 and SF2 stamp the packets as dictated by the FSN and process the payload as per normal. Note 1: The exact location of the stamp creation may not be in the SFitself,itself and may be applied by a hardware device -- for example, as discussed in Section 3.3. Note 2: Special cases exist where some of the SFs areNSH-unaware.NSH unaware. This is covered in Section 5. TheLast Stamp Node (LSN)LSN should strip the entire NSHheaderand forward the raw packet to the IP next hop as per [RFC8300]. The LSN also exportsNSH stampNSH-stamping information to theKPI Database (KPIDB)KPIDB for offline analysis; the LSN mayeitherexport the stamping information of either (1) allpackets,packets or (2) a subset based on packet sampling. In fully virtualizedenvironmentsenvironments, the LSN is likely to be co-located with the SF that decrements the NSHService Index (SI)SI to zero. Corner cases existwherebywhere this is not thecase and is covered incase; see Section 5. 3.1. Prerequisites Timestampingpresents ahas its own set of prerequisites; however, these prerequisites are not requiredto QoS- Stamp.for QoS stamping. In order to guaranteemetadataMD accuracy, all servers hosting VNFs should be synchronized from a centralized stable clock. As it is assumed that PNFs do not timestamp (as this would involve a software change and a probable impact on throughputperformance impact)performance), there is no need for them to synchronize. There are two possible levels of synchronization: Level A:Low accuracyLow-accuracy time-of-day synchronization, based on NTP [RFC5905]. Level B:High accuracyHigh-accuracy synchronization (typically on the order of microseconds), based on [IEEE1588]. Each SF SHOULD havea levelLevel Asynchronization,synchronization and MAY havea levelLevel B synchronization. Level A requires each platform (including theStamp Controller)SC) to synchronize its systemreal-time-clockreal-time clock to an NTP server. This is used to mark themetadataMD in the chain, using the<Reference Time>Reference Time field in the NSHKPI-stampKPI stamp header (Section4.2).4.1). This timestamp is insertedtointo the NSH by the first SF in the chain. NTP accuracy can vary by several milliseconds between locations. This is not anissueissue, as the Reference Time is merely being used as a time-of-day reference inserted into the KPIDB for performance monitoring andmetadataMD retrieval. Level B synchronization requires each platform to be synchronized to a Primary ReferenceTimeClock(PRTC)(PRC) using the Precision Time Protocol (PTP) [IEEE1588]. A platform MAY also use Synchronous Ethernet([G.8261], [G.8262], [G.8264]),[G.8261] [G.8262] [G.8264], allowing more accurate frequency synchronization. If an SF is not synchronized at the moment of timestamping, it should indicate its synchronization status in the NSH. This is described in more detail in Section 4. By synchronizing the network in this way, the timestamping operation is independent of the currentRendered Service Path (RSP). IndeedRSP. Indeed, the timestampmetadataMD can indicate where a chain has been moved due to a resource starvation event as indicated in Figure 2, betweenVNF 3VNF3 andVNF 4VNF4 at time B. Delay | v | v | x | x x =reference timeReference Time A | xv v =reference timeReference Time B | xv | xv |______|______|______|______|______|_____ VNF1 VNF2 VNF3 VNF4 VNF5 Figure 2: FlowperformancePerformance in aservice chainService Chain ForQoS-stampingQoS stamping, it is desired that the SCL or FSN be synchronized in order to providereference timea Reference Time for offline analysis, but this is not a hard requirement (they may be in holdover or free-run state, for example). Other SFs in the service chain do not need to be synchronized for QoS-stampingoperationoperations, as described below.QoS-stampingQoS stamping can be used to check the consistency of configuration across the entire chain orpartparts thereof. By adding all potentiallayerLayer 2 andlayerLayer 3 QoS fields into a QoS sum at the SF ingress or egress, this allows quick identification of QoS mismatches across multipleL2/L3 fieldsLayer 2 / Layer 3 fields, which otherwise is a manual, expert-led consuming process. | | | xy | xy x = ingress QoS sum | xv v = egress QoS sum | xv y = egress QoS summissmismatch | xv |______|______|______|______|______|_____ SF1 SF2 SF3 SF4 SF5 Figure 3: Flow QoS Consistency in aservice chainService Chain Referring to Figure 3, x, v, and y are notional sum values of the QoS marking configuration of the flow within a given chain. As the encapsulation of the flow can change from hop to hop in terms of VLAN header(s), MPLS labels,DSCP(s)or DSCP(s), these values are used to compare the consistency of configurationfromfrom, forexampleexample, payload DSCP through overlay and underlay QoS settings in VLAN IEEE 802.1Q bits, MPLSbitsbits, and infrastructure DSCPs. Figure 3 indicatesthatthat, at SF4 in the chain, the egress QoS marking is inconsistent. That is, the ingress QoS settings do not match the egress. The method described here will indicate which QoS field(s) isinconsistent,inconsistent and whether this is ingress(whereby(where the underlay has incorrectly marked and queued the packet) or egress (where the SF has incorrectly marked and queued the packet. Note that the SC must be aware of cases whenaan SFremarksre-marks QoS fields deliberately and thus does not flag an issue for desired behavior. 3.2. Operation KPI-stamping detection mode uses MDtypeType 2 as defined in [RFC8300]. This involves the SFC classifier stamping the flow at the chainingress,ingress and no subsequent stamps beingapplied, ratherapplied; rather, eachSFupstream SF can compare its local condition with the ingress value and take appropriate action.ThereforeTherefore, detection mode is very efficient in terms of header size that does not grow after the classification. This is further explained in Section4.1.4.2. 3.2.1. Flow Selection The SC should maintain a list of flows within each service chain to be monitored. This flow table should be in the format'SPI:FlowID'."SPI:Flow ID". The SC should map these pairs to unique values presented as Flow IDs per service chain within the NSH TLV specified in thisdocument.document (see Section 4). The SC should instruct the FSN to initiate timestamping on flow table match. The SC may also tell the classifier the duration of the timestamping operation,eitherbyaeither the number of packets in the flow orbya certain time duration. In thiswayway, the system can monitor the performance oftheallen- routeen-route traffic,oran individual subscriber in a chain, or just a specific application oraQoS class that is used in the network. The SC should write the list of monitored flows into the KPIDB for correlation of performance and configuration data. Thus, when the KPIDB receives data from theLSNLSN, it understands to which flow the data pertains. The association of a source IPtoaddress with a subscriber identity is outside the scope of this document and will vary by network application. For example, the method of association of a source IPto IMSIaddress with an International Mobile Subscriber Identity (IMSI) will be differenttofrom how aCPECustomer Premises Equipment (CPE) entity withNATa Network Address Translation (NAT) function may be chained in an enterprise NFV application. 3.2.2. SCP InterfaceA Stamp Control Plane (SCP)An SCP interface is required between the SC and the FSN or classifier. This interface is used to: o Query the SFC classifier for a list of active chains and flows. o Communicate which chains and flows to stamp. This can be a specific{SPI:Flow ID}"SPI:Flow ID" combination or can include wildcards for monitoring subscribers across multiple chains or multiple flows within one chain. o Instruct how the stamp should be applied (ingress, egress, both ingress and egress, or specific). o Indicate when to stopstamping,stamping (after eitheraftera certain number of packets orduration. Typicallya certain time duration). Typically, SCP timestamps flows for a certain duration for trendanalysis,analysis but only stamps one packet of each QoS class in a chain periodically (perhaps once per day or after a network change). Therefore, timestamping is generally applied to a much larger set of packets thanQoS-stamping. ExactQoS stamping. The exact specification of SCP is left for further study. 3.3. Performance Considerations This document does not mandate a specific stamping implementationmethod, and thusmethod; thus, NSH KPI stamping caneitherbe performed by either hardwaremechanisms,mechanisms orbysoftware. If software-based stamping is used, applying and operating on the stamps themselves incur an additional small delay in the service chain. However, it can be assumed that these additional delays are all relative for the flow in question. This is only pertinent for timestamping mode, and not for QoS-stamping mode. Thus, whilst the absolute timestamps may not be fully accurate for normalnon- timestamped trafficnon-timestamped traffic, they can be assumed to be relative. It is assumed that themethodmethods described in this document would only operate on a small percentage of user flows. The service provider may choose a flexible policy in the SC to timestamp a selection ofuser-planea user plane every minute -- forexampleexample, to highlight any performance issues. Alternatively, the LSN may selectively export a subset of theKPI-stampsKPI stamps it receives, based on a predefined sampling method. Ofcoursecourse, the SC canstress teststress-test an individual flow or chain should a deeper analysis be required. We can expect that this type of deep analysishaswill have an impact on the performance of the chain itself whilst under investigation.TheThis impact will be dependent on vendorimplementationimplementations and is outside the scope of this document. ForQoS-stampingQoS stamping, themethodmethods described hereisare even less intrusive, as typicallymultiplepacketsin a floware only QoS stamped periodically (perhaps once per day) to checkone packet in aservice chain configuration per QoS class. 4. NSHKPI-stampingKPI-Stamping Encapsulation KPI stamping uses NSH MDtypeType 0x2 for detection of anomalies and extended mode forroot causeroot-cause analysis of KPI violations. These are further explained in this section. The generic NSH MDtypeType 2 TLV for KPIStampingstamping is shown below. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Ver|O|U| TTL | Length |U|U|U|U|Type=2 | Next Protocol | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Service Path Identifier | Service Index | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Metadata Class | Type |U| Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Variable-lengthVariable Length KPI Metadata header and TLV(s) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 4: Generic NSH KPI Encapsulation Relevant fields in the header that the FSN mustimplement:implement are as follows: o The O bit must not be set. o The MD type must be set to0x20x2. o The Metadata Class must be set to a value from the experimental range 0xfff6 to 0xfffe according to an agreement by all parties to the experiment. o Unassigned bits:all fields,All fields markedU,"U" are unassigned and available for future use[RFC8300][RFC8300]. o The Type field may have one of the following values; the content of"KPI metadata"the Variable Length KPI Metadata header and TLV(s) field depends on thetypeType value:o* Type = 0x01Det:(Det): Detectiono* Type = 0x02TS:(TS): Timestamp Extendedo* Type = 0x03QoS: QoS-stamp(QoS): QoS stamp Extended The Type field determines the type of KPI-stamping format. The supported formats are presented in the following subsections. 4.1.KPI-stampingKPI-Stamping Extended Encapsulation The generic NSH MDtypeType 2 KPI-stamping headerextended mode(extended mode) is shown in Figure 5. This is the format for performance monitoring of service chain issues with respect to QoS configuration and latency. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Ver|O|U| TTL | Length |U|U|U|U|Type=2 | Next Protocol | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Service Path Identifier | Service Index | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Metadata Class | Type |U| Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Variable Length KPI Configuration Header | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Variable Length KPI Value (LSN) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ \ \ +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Variable Length KPI Value (FSN) | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 5: Generic KPI Encapsulation (Extended Mode) As mentioned above, two types are defined under the experimental MD class to indicate the extended KPI MD: a timestamp type and a QoS-stamp type. The KPI Encapsulation Configuration Header format is shown below. +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |K|K|T|K|K|K|K|K| Stamping SI | Flow ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Reference Time | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 6: KPI Encapsulation Configuration Header The bits markedas 'K'"K" are reserved for specific KPI type use and are described in thecorrespondingsubsections below. The T bit should be set if Reference Time follows the KPI Encapsulation Configuration Header.Stamping Service IndexThe SSI (Stamping SI) contains theService IndexSI used for KPI stamping and is described in thecorrespondingsubsections below. The Flow ID is a unique16 bit16-bit identifier written into the header by the classifier. This allows 65536 flows to be concurrently stamped on any given NSH service chain (SPI). Flow IDs are not written by subsequent SFs in the chain. The FSN may export monitoredflowFlow IDs to the KPIDB for correlation. Reference Time is the wall clock of theFSN,FSN and may be used for historical comparison of SC performance. If the FSN is not Level A synchronized (see Section3.1)3.1), it should inform the SC over the SCP interface. The Reference Time is represented in 64-bit NTP format[RFC5905][RFC5905], as presented in Figure 7: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Seconds | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Fraction | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 7: NTP[RFC5905] 64-bit64-Bit Timestamp Format (RFC 5905) 4.1.1. NSH Timestamping Encapsulation (Extended Mode) The NSH timestamping extended encapsulation is shown below. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Ver|O|C|U|U|U|U|U|U| Length |U|U|U|U|Type=2 | NextProto | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Service Path ID | Service Index | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Metadata Class | Type=TS(2) |U| Len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |I|E|T|U|U|U|SSI| Stamping SI | Flow ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-| | Reference Time (T bit is set) | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |I|E|U|U|U| SYN | Stamping SI | Unassigned | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-| | Ingress Timestamp (I bit isset)(LSN)set) (LSN) | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Egress Timestamp (E bit isset)(LSN)set) (LSN) | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |I|E|U|U|U| SYN | Stamping SI | Unassigned | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-| | Ingress Timestamp (I bit is set) (FSN) | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Egress Timestamp (E bit is set) (FSN) | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 8: NSH Timestamp Encapsulation (Extended Mode) The FSNKPI-stamp metadataKPI stamp MD starts with the Stamping Configuration Header. This header contains the I, E, and Tbitsbits, andStamp Service Index (SSI).the SSI. The I bit should be set if the Ingress stamp is requested. The E bit should be set if the Egress stamp is requested. The SSI field must be set to one of the following values: o0x0 KPI-stamp mode, no Service index0x0: KPI stamp mode. No SI is specified in theStamp Service IndexStamping SI field. o0x1 KPI-stamp Hybrid0x1: KPI stamp hybrid mode isselected, Stamp Service Indexselected. The Stamping SI field contains the LSNService index.SI. This is used when PNFs or NSH-unaware SFs are used at the tail of the chain. If SSI=0x1, then the value in thetypeType field informs the chain regarding which SF should act as the LSN. o0x2 KPI-stamp0x2: KPI stamp Specific mode isselected, Stamp Service Indexselected. The Stamping SI field contains the targetedService Index.SI. In thiscasecase, theStamp Service IndexStamping SI field indicates which SF is to be stamped. BothingressIngress stamps andegressEgress stamps are performed when the SI=SSIonin the chain. For timestamping mode, the FSN will also apply the Reference Time and Ingress Timestamp. This will indicate the delay along the entire service chain to the targeted SF. This method may also be used as a light implementation to monitor end-to-end service chain performance whereby the targeted SF is the LSN. This is not applicable toQoSStampingQoS-stamping mode. Each stampingNodenode addsstamping metadata which consiststamp MD that consists of the Stamping Reporting Header and timestamps. The E bit should be set if the Egress stamp is reported. The I bit should be set if the Ingress stamp is reported. With respect to timestamping mode, the SYN bits are an indication of the synchronization status of the node performing the timestamp and must be set to one of the following values: o InSynch:synch: 0x00 o In holdover: 0x01 o In free run: 0x02 o Out ofSynch:synch: 0x03 If the platform hosting the SF is out of synch or in freerunrun, no timestamp is applied by thenodenode, and the packet is processed normally. If the FSN is out of synch or in freerunrun, the timestamp request is rejected and is not propagatedthoughthrough the chain.TheIn such an event, the FSN should inform the SCin such an eventover the SCP interface.SimilarlySimilarly, if the KPIDB receives timestamps that are out of order(i.e.(i.e., atime stamptimestamp ofa 'N+1'an "N+1" SF isinprior to thepasttimestamp ofa 'N' SF)an "N" SF), it should notify the SC of this condition over the SCP interface. The outerservice indexSI value is copied into the stampmetadataMD as the Stamping SI to help caterforto hybrid chains that are a mix of VNFs and PNFs or through NSH-unaware SFs. Thus, if a flow transits through a PNF or an NSH-unawarenodenode, the delta in the innerservice indexSI between timestamps will indicate this. The Ingress Timestamp and Egress Timestamp are represented in 64-bit NTP format. The corresponding bits (I and E) are reported in the Stamping Reporting Header of the node'smetadata.MD. 4.1.2. NSHQoS-stampingQoS-Stamping Encapsulation (Extended Mode) Packets have a variable QoS stack.That is for exampleFor example, the same payload IP can have a very different stack in the access part of the networktothan the core. This is most apparent in mobile networkswherewhere, forexampleexample, in an access circuit we would have2 layers ofan infrastructure IP header (DSCP)-composed of two layers -- onetransport-basedbased on transport and the otherIPsec-based,based on IPsec -- in addition to multiple MPLS and VLAN tags. The samepacketpacket, as it leaves thePDNPacket Data Network (PDN) Gateway Gi egressinterfaceinterface, may be very much simplified in terms of overhead and related QoS fields. Because of thisvariabilityvariability, we need to build extra meaning into the QoSheaders - theyheaders. They arenotnot, forexampleexample, all PTP timestamps of a fixedlengthlength, as in the case oftimestamping, rathertimestamping; rather, they are of variable lengths and types.AlsoAlso, they can be changed on the underlay at any time without the knowledgebyof the SFC system.ThereforeTherefore, each SF must be able to ascertain and record its ingress and egress QoS configuration on the fly. The suggested QoStype,Type (QT) and lengths areaslisted below.The type is 4 bits long.QoSType(QT)ValueType Value Length Comment ---------------------------------------------------------- IVLAN 0x01 4 Bits Ingress VLAN (PCP + DEI) EVLAN 0x02 4 Bits Egress VLAN IQINQ 0x03 8 Bits Ingress QinQ (2xPCP+DEI)(PCP + DEI)) EQINQ 0x04 8 Bits Egress QinQ IMPLS 0x05 3 Bits Ingress Label EMPLS 0x06 3 Bits Egress Label IMPLS 0x07 6 Bits2Two Ingress Labels (2x EXP) EMPLS 0x08 6 Bits2Two Egress Labels IDSCP 0x09 8 Bits Ingress DSCP EDSCP 0x0A 8 Bits Egress DSCP For stacked headers such as MPLS and 802.1ad, we extract theQoSrelevant QoS data from the header and insert it into one QoS value in order to be more efficientonin terms of packet size.ThusThus, for MPLS, we represent bothEXPexperimental bits (EXP) fields in one QoS value, and both 802.1p priority and drop precedence in one QoSvaluevalue, as indicated above. For stack types not listedhere, forhere (for example,3three or more MPLStags,tags), the SF would insert IMPLS/EMPLS severaltimestimes, with each layer in the stack indicating EXPQosQoS for that layer. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Ver|O|C|U|U|U|U|U|U| Length |U|U|U|U|Type=2 | NextProto=0x0 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Service Path ID | Service Index | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Metadata Class | Type=QoS(3) |U| Len | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|U|T|U|U|U|SSI| Stamping SI | Flow ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-| | Reference Time (T bit is set) | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|U|U|U|U|U|U|U| Stamping SI | Unassigned | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-| | QT | QoS Value |U|U|U|E| QT | QoS Value |U|U|U|E| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ . . . . +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |U|U|U|U|U|U|U|U| Stamping SI | Unassigned | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-| | QT | QoS Value |U|U|U|E| QT | QoS Value |U|U|U|E| +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 9: NSH QoS Configuration Encapsulation (Extended Mode) The encapsulation in Figure109 is very similar tothatthe encapsulation detailed in Section4.14.1.1, with the following exceptions:-o I and E bits are notrequiredrequired, as we wish to examine the full QoS stack at the ingress and egress at every SF.- Syno SYN status bits are not required.-o The QT(QoS Type)and QoSvaluevalues are as outlined in thetablelist above.-o The E bit at the tail of each QoS context field indicates if this is the last egressQoS-stampQoS stamp for a given SF. This should coincide with SI=0 at the LSN, whereby the packet istruncated andtruncated, the NSH MD is sent to theKPIDBKPIDB, and thesubscribersubscriber's raw IP packet is forwarded to the underlay next hop. Note: It is possible to compress the frame structure to better utilize the header, but this would come at the expense of crossing byte boundaries. For ease of implementation, and so thatQoS-stampingQoS stamping is applied on an extremely small subset ofuser planeuser-plane traffic, we believe that the above structure is a pragmatic compromise between header efficiency and ease of implementation. 4.2.KPI-stampingKPI-Stamping Encapsulation (Detection Mode) The format of the NSH MDtypeType 2 KPI-stamping TLV (detection mode) is shown in Figure11.10. This TLV is used for KPI anomaly detection. Upon detecting a problem or ananomalyanomaly, it will be possible to enable the use of KPI-stamping extended encapsulations, which will provide more detailed analysis. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Ver|O|U| TTL | Length |U|U|U|U|Type=2 | Next Protocol | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Service Path Identifier | Service Index | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Metadata Class | Type=Det(1) |U| Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | KPI Type | Stamping SI | Flow ID | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Threshold KPI Value | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | IngressKPI-stampKPI stamp | | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 10: Generic NSH KPI Encapsulation (Detection Mode) The following fields are defined in theKPI TSD metadata:KPIDB MD: o KPI Type: This field determines the type ofKPI-stampKPI stamp that is included in thismetadata field.MD. If a receiver along the path does not understand the KPITypetype, it will pass the packet on transparently and will notdrop.drop it. The supported values oftheKPI Type are:0x0* 0x0: Timestamp0x1 QoS-stamp* 0x1: QoS stamp o Threshold KPI Value: In the firstheaderheader, the SFC classifier may program a KPI threshold value. This is a valuethatthat, when exceeded, requires the SF to insert the current SI value into the SI field. The KPI type is the type of KPI stamp inserted into the header as persection 9.Figure 10. o Stamping SI: This is the Service Identifier of the SF when theThresholdabove threshold value is exceeded. o Flow ID: TheflowFlow ID is inserted into the header by the SFC classifier in order to correlate flow data in the KPIDB for offline analysis. o IngressKPI-stamp:KPI stamp: The last 8 octets are reserved for theKPI-KPI stamp. This is the KPI value at the chain ingress at the SFC classifier. Depending on the KPIType,type, theKPI-stamp eitherKPI stamp includes either a timestamp or aQoS-stamp.QoS stamp. If the KPITypetype is Timestamp, then the IngressKPI-stampKPI stamp field contains a timestamp in 64-bit NTP timestamp format. If the KPITypetype isQoS-stamp,QoS stamp, then the format of the 64-bit IngressKPI-stampKPI stamp is as follows. 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | QT | QoS Value | Unassigned | +-+-+-+-+-+-+-+-+-+-+-+-+ + | | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 11:QoS-stampQoS-Stamp Format (Detection Mode) As an example operation, let's say we are using KPI type 0x01(timestamp) when a service function (SFn)(Timestamp). When an SF (say SFn) receives thepacketpacket, it can compare the current local timestamp (it first checks that it is synchronized tonetworkthe network's PRC) with the chainingress timestampIngress Timestamp to calculate the latency in the chain. If this value exceeds the timestamp threshold, it then inserts its SI and returns the NSH to the KPIDB. This effectively tells the system that at SFn the packet violated the KPI threshold. Please refer tofigure 9Figure 8 for the timestamp format. When thisoccursoccurs, the SFCcontrol planecontrol-plane system would then invoke the KPI extended mode, which uses a more sophisticated (and intrusive) method to isolateKPI violationthe root cause of the KPI violation, as described below. Note: Whilst detection mode is a valuable tool for latency actions, the authors feel thatit is not justified to buildbuilding the logic into the KPI system for QoSconfiguration.configuration is not justified. AsQoS-stampingQoS stamping is done infrequently and on a tiny percentage of the user plane, it is more practical to use extended mode only for service chain QoS verification. 5. Hybrid Models A hybrid chain may be defined as a chain whereby there is a mix of NSH-aware and NSH-unaware SFs.Example 1.Figure 12 shows an example of a hybrid chain with a PNF in themiddle Stampmiddle. Stamping Controller | KPIDB | SCP Interface | ,---. ,---. ,---. ,---. / \ / \ / \ / \ ( SCL )-------->( SF1 )--------->( SF2 )--------->( SFn ) \ FSN / \ / \ PNF1/ \ LSN / `---' `---' `---' `---' Figure 12: HybridchainChain with PNF inmiddleMiddle In thisexampleexample, the FSN begins its operation and sets the SI to3,3. SF1 decrementsthisthe SI to 2 and passes the packet to an SFC proxy (not shown). The SFC proxy strips the NSH and passes the packet to the PNF. On receipt back from the PNF, the proxy decrements the SI and passes the packetontoto the LSN withaSI=1. After the LSN processes thetraffictraffic, it knows from the SI value that it is the last nodeon the chain fromin theSI valuechain, and it exports the entire NSH and allmetadataMD to the KPIDB. The payload is forwarded to the next hop on the underlay minus the NSH. The stamping information packet may be given a new SPI to act as a homing tag to transport the stamp data back to the KPIDB.Example 2.Figure 13 shows an example of a hybrid chain with a PNF at theend Stampend. Stamping Controller | KPIDB | SCP Interface | ,---. ,---. ,---. ,---. / \ / \ / \ / \ ( SCL )-------->( SF1 )--------->( SF2 )--------->( PNFN ) \ FSN / \ / \ LSN / \ / `---' `---' `---' `---' Figure 13: Hybrid Chain with PNF atendEnd In thisexampleexample, the FSN begins its operation and sets the SI to3, the3. The SSI field is set to 0x1, and the type is set to 1. Thus, when SF2 receives the packet with SI=1, it understands that it is expected to take on the role of theLSNLSN, as it is the last NSH-aware node in the chain. 5.1. Targeted VNFStampStamping For the majority of flows within the service chain, stamps(ingress, egress(Ingress stamps, Egress stamps, or both) will be carried out at each hop until the SI decrements to zero and the NSH andStampstamp MDisare exported to the KPIDB.There may exist howeverHowever, the need to just test a particular VNF may exist (perhaps after ascale outscale-out operation, softwareupgradeupgrade, or underlaychangechange, for example). In thiscasecase, the FSN should mark the NSH as follows: o The SSI field is set to 0x2. o Type is set to the expected SI at the SF in question. o When the outer SI is equal to the SSI, stamps are applied at the SF ingress and egress, and the NSH and MD are exported to the KPIDB. 6. Fragmentation Considerations Themethodmethods described in this documentdoesdo not support fragmentation. The SC should return an error should a stamping request from an external system exceed MTU limits and require fragmentation. Depending on the length of the payload and the type ofKPI-stampKPI stamp and chain length, this will vary for each packet. In most service providerarchitecturesarchitectures, we would expectaSI << 10,and thatwhich may include some PNFs in the chainwhichthat do not add overhead.ThusThus, for typicalIMIXInternet Mix (IMIX) packet sizes [RFC6985], we expect to be able to perform timestamping on the vast majority of flows withoutfragmenting. Thusfragmentation. Thus, the classifier canhaveapply a simple ruletothat onlyallow KPI-stampingallows KPI stamping on packet sizes less than 1200bytesbytes, for example. 7. Security Considerations The security considerationsoffor the NSH in general are discussed in [RFC8300].The use of in-bandIn-band timestamping, as defined in this document, can be used as a means for network reconnaissance. By passively eavesdroppingtoon timestamped traffic, an attacker can gather information about network delays and performance bottlenecks. The NSH timestamp is intended to be used by various applications to monitorthenetwork performance and to detect anomalies. Thus, aman- in-the-middleman-in-the-middle attacker can maliciously modify timestamps in order to attack applications that use the timestamp values. For example, an attacker could manipulate the SFC classifier operation, such that it forwards traffic through'better' behaving"better-behaved" chains. Furthermore, if timestamping is performed on a fraction of the traffic, an attacker can selectively induce synthetic delay only to timestampedpackets, causing systematic error in the measurements.packets and can systematically trigger measurement errors. Similarly, if an attacker can modify QoS stamps, erroneous values may be imported into the KPIDB, resultingisin further misconfiguration and subscriber QoE impairment. An attacker that gains access to the SCP can enabletimetimestamping andQoS-QoS stamping for all subscriber flows, thereby causing performance bottlenecks, fragmentation, or outages. As discussed in previous sections, NSH timestamping relies on an underlying time synchronization protocol. Thus, by attacking the timeprotocolprotocol, anattackattacker can potentially compromise the integrity of the NSH timestamp. A detailed discussion about the threats against time protocols and how to mitigate them is presented in [RFC7384]. 8. IANA Considerations This documentmakeshas norequests forIANAaction,actions. 9.Contributors This document originated as draft-browne-sfc-nsh-timestamp-00 and had the following co-authors and contributors. We would like to thank and recognize them and their contributions. Yoram Moses Technion moses@ee.technion.ac.il Brendan Ryan Intel Corporation brendan.ryan@intel.com 10. Acknowledgments This document was prepared using 2-Word-v2.0.template.dot. The authors gratefully acknowledge Mohamed Boucadair, Martin Vigoureux and Adrian Farrel for their thorough reviews and helpful comments. 11.References11.1.9.1. Normative References [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March1997.1997, <https://www.rfc-editor.org/info/rfc2119>. [RFC7665] Halpern, J.,Ed.,Ed. and C. Pignataro, Ed., "Service Function Chaining (SFC) Architecture", RFC 7665, DOI 10.17487/RFC7665, October 2015,<https://www.rfc- editor.org/info/rfc7665>.<https://www.rfc-editor.org/info/rfc7665>. [RFC8174]B.Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words",RFC8174,BCP 14, RFC 8174, DOI 10.17487/RFC8174, May2017.2017, <https://www.rfc-editor.org/info/rfc8174>. [RFC8300] Quinn, P., Ed., Elzur, U., Ed., and C. Pignataro,C.,Ed., "Network Service Header (NSH)", RFC 8300,2018. 11.2.DOI 10.17487/RFC8300, January 2018, <https://www.rfc-editor.org/info/rfc8300>. 9.2. Informative References [IEEE1588]IEEE TC 9 Instrumentation and Measurement Society, "1588 IEEEIEEE, "IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and ControlSystems Version 2",Systems", IEEEStandard, 2008. [RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA Considerations Section in RFCs", BCP 26, RFC 5226, May 2008.Standard 1588, <https://standards.ieee.org/standard/1588-2008.html>. [RFC5905] Mills, D., Martin, J., Ed., Burbank, J., and W. Kasch,W.,"Network Time Protocol Version 4: Protocol and Algorithms Specification", RFC 5905, DOI 10.17487/RFC5905, June2010.2010, <https://www.rfc-editor.org/info/rfc5905>. [RFC7384] Mizrahi, T., "Security Requirements of Time Protocols in Packet Switched Networks", RFC 7384, DOI 10.17487/RFC7384, October2014. [TS] Mizrahi, T., Fabini, J., and A.2014, <https://www.rfc-editor.org/info/rfc7384>. [RFC6985] Morton,"Guidelines for DefiningA., "IMIX Genome: Specification of Variable PacketTimestamps", draft-ietf-ntp- packet-timestamps (work in progress), 2018.Sizes for Additional Testing", RFC 6985, DOI 10.17487/RFC6985, July 2013, <https://www.rfc-editor.org/info/rfc6985>. [Y.1731] ITU-T Recommendation G.8013/Y.1731,"OAM Functions"Operations, administration andMechanismsmaintenance (OAM) functions and mechanisms for Ethernet-basedNetworks",networks", August2015. [Y.1564] ITU-T Recommendation Y.1564, "Ethernet service activation test methodology", March 2011.2015, <https://www.itu.int/rec/T-REC-G.8013/en>. [G.8261] ITU-T Recommendation G.8261/Y.1361, "Timing and synchronization aspects in packet networks", August2013.2013, <https://www.itu.int/rec/T-REC-G.8261>. [G.8262] ITU-T Recommendation G.8262/Y.1362, "Timing characteristics of a synchronous Ethernet equipment slave clock",January 2015.November 2018, <https://www.itu.int/rec/T-REC-G.8262>. [G.8264] ITU-T Recommendation G.8264/Y.1364, "Distribution of timing information through packet networks",May 2014. [I-D.ippm.ioam]August 2017, <https://www.itu.int/rec/T-REC-G.8264>. [In-Situ-OAM] Brockners,Bhandari et al.F., Bhandari, S., Pignataro, C., Gredler, H., Leddy, J., Youell, S., Mizrahi, T., Mozes, D., Lapukhov, P., Chang, R., Bernier, D., and J. Lemon, "Data Fields for In-situOAM" draft-ietf-ippm-ioam-data-03 (workOAM", Work inprogress), June 2018Progress, draft-ietf-ippm-ioam-data-05, March 2019. Acknowledgments The authors gratefully acknowledge Mohamed Boucadair, Martin Vigoureux, and Adrian Farrel for their thorough reviews and helpful comments. Contributors This document originated as draft-browne-sfc-nsh-timestamp-00; the following people were coauthors of that draft. We would like to thank them and recognize them for their contributions. Yoram Moses Technion Email: moses@ee.technion.ac.il Brendan Ryan Intel Corporation Email: brendan.ryan@intel.com Authors' Addresses Rory Browne Intel Dromore House ShannonCo.ClareCo. Clare Ireland Email:rory.browne@intel.comrorybrowne@yahoo.com Andrey Chilikin Intel Dromore House ShannonCo.ClareCo. Clare Ireland Email: andrey.chilikin@intel.com Tal Mizrahi Huawei Network.IO Innovation Lab Israel Email: tal.mizrahi.phd@gmail.com