Hi Jeff,

Thanks for your review. You make a good point.

Like for any IPFIX-related drafts or RFCs, we have to distinguish the IPFIX Exporting Process & the IPFIX Metering Process.
See RFC 7011 for the definitions.

The recently published IPFIX RFCs focus on the Exporting Process:
9870 <http://www.rfc-editor.org/info/rfc9870> *Export of UDP Options Information in IP Flow Information Export (IPFIX)* 9740 <http://www.rfc-editor.org/info/rfc9740> *New IPFIX Information Elements for TCP Options and IPv6 Extension Headers* 9565 <http://www.rfc-editor.org/info/rfc9565> *An Update to the tcpControlBits IP Flow Information Export (IPFIX) Information Element *9487 <http://www.rfc-editor.org/info/rfc9487> *Export of Segment Routing over IPv6 Information in IP Flow Information Export (IPFIX)**
*
So basically, they specify the IPFIX Information Elements, assuming that the IPFIX Metering Process is able to meter them.
To take an example closed to your heart: BGP
The Exporter must run BGP and the IPFIX Metering Process must be able to do a lookup in the BGP table at the point of observation. In the SAV example here, we must run the SAV enforcement on the Observation Domain, like for BGP.
So far, I have not told you anything that you don't know, I know :-)

As you noted below, there is an extra condition in the SAV case, "as a discrete layer in the forwarding pipeline" as you describe it.
Somehow, this SAV case is more like the ForwardingStatus (IE 89)
In essence, the Metering Process can not report what it can not observe/loop up/deduce. If we don't know why it's dropped, we can't report it. This is an implicit statement in most of the IPFIX RFCs.  As a kind of proof, I looked up the 4 RFCs above, and there is only one occurrence of "Metering Process".

However, we should document your statements
I believe they would be a perfect fit for the "Operational Considerations", RFC5706bis. Does it make sense? Or do you have something else in mind, such as having the SAV drops in draft-ietf-opsawg-discardmodel and/or its companion draft draft-evans-opsawg-ipfix-discard-class-ie-01 <https://datatracker.ietf.org/doc/draft-evans-opsawg-ipfix-discard-class-ie/>?

Regards, Benoit

Cao Qian,

Thanks for the draft.  IPFIX is a good protocol to expose SAV enforcement in a scalable fashion.

Unfortunately, it'll also be a difficult place to report properly.  I don't have explicit recommendations for your draft at this time to address the points I'm about to raise, but I'd recommend much like all of the existing SAV work to document challenges for better discussion.

The SAV architecture mechanisms covered in this draft can be reported well only if the implementation is explicitly implementing SAV enforcement as a discrete layer in the forwarding pipeline.  When that is the case, the proposed IEs are mostly appropriate for that proposed architecture.  As a note for OPSAWG, enforcement is likely to be implemented via a mixture of mechanisms for scalability purposes - and that can impact reporting.

To give two explicit examples of where such reporting can be problematic:

- When traffic is allowed, this may be done without having passed through an explicit filter.  In such a case, knowing that an interface implements SAV filtering is possibly useful metadata associated with the flow.  However, it may simply be considered noise by the telemetry infrastructure.  I suggest documenting that explicit permit can only be guaranteed in flow if the forwarding pipeline permits such layer-wise tagging.

- When traffic is discarded, the forwarding pipeline may not discretely know whether it is because of SAV enforcement vs. other discard reasons.  The caveat appropriate for your draft is that SAV telemetry should consider not only explicitly tagged drops, but also consider other sources of drops that may be applied in the pipeline as part of the implementation.  The discardmodel[1]  is an example of discussing such drops.

-- Jeff

[1] https://datatracker.ietf.org/doc/draft-ietf-opsawg-discardmodel/

On Oct 27, 2025, at 10:59 AM, 曹倩 <[email protected]> wrote:

Hello OPSAWG,

Apologies for the previous email with an incorrect link. Our draft has now been officially posted.
The correct and active link is now available:
*
*
*Title: *Export of Source Address Validation (SAV) Information in IPFIX

*Datatracker Link:*https://datatracker.ietf.org/doc/draft-cao-opsawg-ipfix-sav/

We welcome any feedback and thoughts on this draft.

Best Regards,
Cao Qian (on behalf of the co-authors)

    -----原始邮件-----
    *发件人:*曹倩 <[email protected]>
    *发送时间:*2025-10-20 23:49:54 (星期一)
    *收件人:*[email protected],[email protected]
    *主题:*Individual draft submission: draft-cao-opsawg-ipfix-sav-00

    Dear OPSAWG and SAVNET Working Groups,

    <https://datatracker.ietf.org/doc/draft-opsawg-ipfix-sav/>
    I'm pleased to share with you our new individual draft on IPFIX
    for SAV.

    *Title: *
    Export of Source Address Validation (SAV) Information in IPFIX
    *Abstract: *This document specifies the IP Flow Information
    Export Information Elements to export the context and outcome of
    Source Address Validation enforcement data, providing insight
    into why packets are identified as spoofed by capturing the
    specific SAV rules that triggered validation decisions.

    The document is available at:
    <https://datatracker.ietf.org/doc/draft-opsawg-ipfix-sav/>
    https://datatracker.ietf.org/doc/draft-opsawg-ipfix-sav/

    Please review the document and share your thoughts on the mailing
    list. Comments and suggestions are welcome.
    Thank you for your consideration.

    Best regards,

    Cao Qian
    ZGC LAB

_______________________________________________
OPSAWG mailing list [email protected]
To unsubscribe send an email [email protected]


_______________________________________________
OPSAWG mailing list [email protected]
To unsubscribe send an email [email protected]
_______________________________________________
OPSAWG mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to