Re: [Bier] draft-ietf-bier-ipv6-requirements-09

"Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net> Thu, 26 November 2020 23:37 UTC

Return-Path: <zzhang@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A18D3A074E for <bier@ietfa.amsl.com>; Thu, 26 Nov 2020 15:37:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.799
X-Spam-Level:
X-Spam-Status: No, score=-2.799 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=1hugF6TB; dkim=pass (1024-bit key) header.d=juniper.net header.b=jamA565P
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XFfhGiyATuhL for <bier@ietfa.amsl.com>; Thu, 26 Nov 2020 15:37:53 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0743B3A0658 for <bier@ietf.org>; Thu, 26 Nov 2020 15:37:51 -0800 (PST)
Received: from pps.filterd (m0108160.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 0AQNT3LB032636; Thu, 26 Nov 2020 15:37:50 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=Bf04mx/BB/MDfGRohBshc9m5C1E8ZT+ftl8zaxKmK5c=; b=1hugF6TBLwI0UKT7OSE/1Fs17+VLPOuH4C58xJN5tE54Uq+yjooIE7UOx6nY/Ro4Q2gc M9GDxwvKFqQSHx6dYR4pvfFAOZ1fwwN6Vss8biCLS99AVnsmuk4bx/xhHS4+XfkqhRG3 XN/Pj3+40EXfxP42NsC77/bT7Bp7kS9OibWpyHjtO+NEDn7Dx8R6YgNE7sKOStgLBajR jRjLKg9TZIJ2T+DYPT87QIM8EcEWB0vPPKmpiYtvXE1jVFJnlnEeBBI81xI4U3ECkrIR Yuzfytki9AHt4D0dpOyW56RU4S0iWyFBLtZBEna3vI0EMfJKmRyaftScvovLj6hGVXOT GA==
Received: from nam04-co1-obe.outbound.protection.outlook.com (mail-co1nam04lp2051.outbound.protection.outlook.com [104.47.45.51]) by mx0b-00273201.pphosted.com with ESMTP id 351uhu2chh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 26 Nov 2020 15:37:49 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CRBJ+AUWwpCY3K5jT0NON2QSx8S8Yg+rrisiDCZB+ZoS6cyYVjJau8fYrAiHXECJXjjfp+O25jz4lJjm1Rv3XZidHdRObP+/cGzaEGdJ13PbBt1PMHy3T2UzauQPcUvoIuwpI30ZEeubt09kxCP3QAzJhNOxu+CFd40x7UvUcYzwozRUNOYnqzFXBCCwG24trA8cO0/zvvX5qzPTIMi0hmTjP1jkp+XfWD717crkDUsRNQ8aQQW7HA9NfWHjbUpjPKkAUzxDs3uNdZxhofreHaH3v+cfboB9UE/u45OEbDgilJieB0mA9rpZ8MI0rot/b2NMXDozdaO/W6gVHB+Hrg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Bf04mx/BB/MDfGRohBshc9m5C1E8ZT+ftl8zaxKmK5c=; b=OCQBFgd2Gk9YM8s5beNoYg6tBFnsZfoIxof20LPrREhSienw5/zoSGIyHl/TIdyv6fYYnm/rZejkUuSuk724QwuncS6rDkY6gRm1c+U8UCQ3jsstvDGCfvVlBeMx/PAiMijFDr8WdlwV8JOQhARn2VDhhqAoDzCY3FSuovExH2dBKhgTvlDPnze2d9c88ysCqpuRYliIvd+tqq3PL6K61Z/tF0NLgrGMSyp+px4u1WmEPznR0vcJB8tDeEe0ZXN7SRGVx9aKll59CtxkpEufW/a6y9+EOeTlUH8K6/ZRWFl+wIyBI+Pl91hy42cZoVGkpqMkPPqEJ5kdLnRN/tQC2A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Bf04mx/BB/MDfGRohBshc9m5C1E8ZT+ftl8zaxKmK5c=; b=jamA565PGaVtBLWvpCiJSerHmx0kMz4xM+hh/LMzVAW8eqZk8d8HmXaUwzuWSxWWKka/hezETqONmHDGr34S+GokJQEQQMSRqBGij6ZXd30He4LEtdpwSg6GOrQ5X7vmj+TSbtKp753BlfgJGN8c+YovWX1CTzyf/0l/QRv/GKI=
Received: from MN2PR05MB5981.namprd05.prod.outlook.com (2603:10b6:208:c3::15) by MN2PR05MB6528.namprd05.prod.outlook.com (2603:10b6:208:df::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3632.6; Thu, 26 Nov 2020 23:37:44 +0000
Received: from MN2PR05MB5981.namprd05.prod.outlook.com ([fe80::2cd5:f786:c003:42c6]) by MN2PR05MB5981.namprd05.prod.outlook.com ([fe80::2cd5:f786:c003:42c6%7]) with mapi id 15.20.3589.021; Thu, 26 Nov 2020 23:37:44 +0000
From: "Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net>
To: "adrian@olddog.co.uk" <adrian@olddog.co.uk>, 'Tony Przygienda' <tonysietf@gmail.com>, 'Greg Shepherd' <gjshep@gmail.com>
CC: 'BIER WG' <bier@ietf.org>
Thread-Topic: [Bier] draft-ietf-bier-ipv6-requirements-09
Thread-Index: AQHWvb2JExcoEqV7rUqj331ceyYvFKnOBeRggABwJQCAAL5B0IAAhhQAgADIHQCACe1ZAIAAInhwgAATXACAAHJRMA==
Date: Thu, 26 Nov 2020 23:37:44 +0000
Message-ID: <MN2PR05MB5981468EC6B680A0671EA982D4F90@MN2PR05MB5981.namprd05.prod.outlook.com>
References: <CABNhwV0aZRqXP2wAweEktsibTYpHqHhDB9OTPkO+1JmyOb7-gA@mail.gmail.com> <MN2PR05MB5981CEBAA6AB7329350293EED4E10@MN2PR05MB5981.namprd05.prod.outlook.com> <CABNhwV26CqDs8vwT=mcPQMVGVTFLVEOgVYtaYZyuyNiBFMYGcw@mail.gmail.com> <MN2PR05MB5981CB5AB50C0641A54DDCDAD4E00@MN2PR05MB5981.namprd05.prod.outlook.com> <CABFReBqJ5HVUBzbNv-LjYsCqjdvtNvXtdOjCscGftkBrVtbEmA@mail.gmail.com> <CA+wi2hMTxELaf6MQv2ocdp7nxeOusW_dv6hUZ6O2uRZa=ob6Qg@mail.gmail.com> <02fd01d6c3f5$a8f23de0$fad6b9a0$@olddog.co.uk> <MN2PR05MB59815B822B853C19A60251DED4F90@MN2PR05MB5981.namprd05.prod.outlook.com> <033a01d6c410$92e413f0$b8ac3bd0$@olddog.co.uk>
In-Reply-To: <033a01d6c410$92e413f0$b8ac3bd0$@olddog.co.uk>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.5.0.60
dlp-reaction: no-action
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=b4c3d6ff-0e8b-450b-a9d6-0ba38b58d103; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ContentBits=0; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=true; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Method=Standard; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=0633b888-ae0d-4341-a75f-06e04137d755; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2020-11-26T23:13:20Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4;
authentication-results: olddog.co.uk; dkim=none (message not signed) header.d=none;olddog.co.uk; dmarc=none action=none header.from=juniper.net;
x-originating-ip: [66.129.241.12]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 64b4fba0-920d-4af7-2be5-08d892644657
x-ms-traffictypediagnostic: MN2PR05MB6528:
x-microsoft-antispam-prvs: <MN2PR05MB65282ACFCE359357C84D573DD4F90@MN2PR05MB6528.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6790;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: BG4fp2RxtxQX+ifMlF6+Jocj4X33kYYvJJjMOPgyr6nc3rWWXLXBntDKAzVbm9Q3hu7PAGvQnwoGh0GyvlAFMVmE4BR/QRGR2+DghuSD6VqyVoIAmZD5woY47y/bmPqt6Fgo1JoETs2Ieso/ahZeV8aMAvyNk9D+qdRTxS3sPEtWn59H750mjXrPAYh4DGunJhTm/Bp+OF9pF876k9lk06jF2Tg0N9ASZPurI6lpc6zjd6D2YJ3a4k+A5jxinC7LTEIB/BK4i5m2UDVLLpXVM5nQaQViopC+SQCKy0dNAvMRKyH5587IbQ064w7iPksqU3f0TcjfrLCm4rki1Z9fNQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR05MB5981.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(346002)(136003)(396003)(39860400002)(376002)(55016002)(186003)(8936002)(7696005)(53546011)(83380400001)(66574015)(6506007)(64756008)(30864003)(66946007)(66446008)(66556008)(76116006)(316002)(66476007)(478600001)(86362001)(33656002)(52536014)(8676002)(5660300002)(110136005)(9326002)(4326008)(71200400001)(9686003)(26005)(2906002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: =?utf-8?B?STFmUVVHdys5amg0UjBXUzRVNFE3aXg2RHVNWGx5QjJFeENQMFViTGllT3BG?= =?utf-8?B?ZG5wdWRkL2MybHBJZU04bEs1WklxbVR2alIzUkpveGFSYWorL3czNzNQM21w?= =?utf-8?B?azNINXltc2dsVlZRaGxFOEZhRUFSbmlrQUtScjVWaFFZT2hYeXpwQTA1MHda?= =?utf-8?B?VE9IUllDaWp5dzdlaVNKeVh2clRIOWFUVTQwWDQxR21hWS9LdG1relcwV05F?= =?utf-8?B?SkFUK250WDFYb3RlMlZGMHh6cUpJNUFSYWNteU94Y01lMmk2ZjVGL0s5WXZR?= =?utf-8?B?Vkl1L2MycEU1bmRmWkYzdzU4enRtclEwNkYvWDM3dy9NZ0VyMEN2MEc3bEM2?= =?utf-8?B?c1VYcy8rNitTbWF0Y0l5QnROZldDcWxFSXFYZFU0T3hmM29jU3M0UWFvSmEv?= =?utf-8?B?YWlaazUvNTRBQks1d3ZqRVJtL1ZKditqaFNCOHdST3dvTytBNndDZUdFVHAx?= =?utf-8?B?SVJkNzZSNlVKK1NBdVM2STBrUi9raGYrM1k5M0hEZmh5M3hFcWJaNEtLNGdy?= =?utf-8?B?OXpuZE1kNlhKZGNMTGJiTDArT21ZRm5adFZPUFdYbmk4UXlGT0hWWWZRYVRs?= =?utf-8?B?S2kzd3FtVEFQOW9GWDRTM0ZFQ0FoN2ppVktFaXJnUEJJbHlpSmlWcEgyZXl2?= =?utf-8?B?Vm8va1MybGZ2ZzA4Z0ZHVXh5NkFWWVZFUlhTSGFmOTRjMHk0VU9xNHB0Y0Ev?= =?utf-8?B?ZTVWSHdYM2RWRnpaMXd5VTFtUEY5d3ZOL1NEZk02MldtdTlINUdJMEcyQnZQ?= =?utf-8?B?SGpSRTZJeW9WaHU3MnBEc09GWU0xYmVwcUwyZ3Z2bFhsMGV2d0Nac05EWUNq?= =?utf-8?B?ZVdFSE1TSzZBTnNHdlpwQU9walV0cFJVOGJGVVQvd0dsY1lmcUpKL1BtcnNx?= =?utf-8?B?L1QwdFRSam9EL3FLMFAyd3lybjZGK3JXUi9ZaU10Y3FZN0dVSXBqREV2aU5I?= =?utf-8?B?NmVZRzdDWm1FOXZBcVh4eXNYMTBGV2NjRCtUWE45QWdkSktHS2NTK1V3dk9i?= =?utf-8?B?OEQvb3o2V3J4Z0UxQWp4ajVYa2FCUEdkY21PV1FqL0JlZTRrNWdQTzIwTFB3?= =?utf-8?B?bjd2Ly8rNjRhRUxiUVU2bGRKaXorbGlmQVR6TjkwOGZLSDFLMGEzVGZVOGpP?= =?utf-8?B?cjU4U01MZ2s5WDNIMHZkVGpwMnF3ZllFKzFkbExmQXJTbTN0OXM5OHFIc1lG?= =?utf-8?B?R2F6RlR0TklhNklJNDloMmkyMzlaRmI5NWFOQytGS2EvUHI3UmFlSitDTTh1?= =?utf-8?B?dXJVOFZxc2g0QndyUW9YL2x4NG91eTVXTlhQMS9Ec3ZUSHVkVDJQVmtJRkYz?= =?utf-8?Q?AN2CmbWNnuuFA=3D?=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR05MB5981468EC6B680A0671EA982D4F90MN2PR05MB5981namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MN2PR05MB5981.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 64b4fba0-920d-4af7-2be5-08d892644657
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Nov 2020 23:37:44.4989 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cxhCq6LAh6KSJst1293Cf8otM2gNqspSEdXr5N+OIGnRrsHiLi+QGbFUc9jz5/VSnmns2nNCUX7dNVetGjKLMw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR05MB6528
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.312, 18.0.737 definitions=2020-11-26_14:2020-11-26, 2020-11-26 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 impostorscore=0 clxscore=1015 lowpriorityscore=0 priorityscore=1501 adultscore=0 suspectscore=0 malwarescore=0 phishscore=0 spamscore=0 bulkscore=0 mlxlogscore=999 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2011260150
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/imb42ZWMmQNWlYzOiSeXbqs_q34>
Subject: Re: [Bier] draft-ietf-bier-ipv6-requirements-09
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Nov 2020 23:37:56 -0000

Hi Adrian,

Please see zzh> below.

From: Adrian Farrel <adrian@olddog.co.uk>
Sent: Thursday, November 26, 2020 11:24 AM
To: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net>et>; 'Tony Przygienda' <tonysietf@gmail.com>om>; 'Greg Shepherd' <gjshep@gmail.com>
Cc: 'BIER WG' <bier@ietf.org>
Subject: RE: [Bier] draft-ietf-bier-ipv6-requirements-09

[External Email. Be cautious of content]

Hi Jeffery,

Happy Thanksgiving!

Zzh> Thanks!

Are you saying that all IPv6 routers use flow label and other primary header for entropy and none of them looks into the payload? (I’m asking cos I don’t know what v6 routers do.)

Zzh> No. I just believe/assume the preferred/modern way going forward for ECMP is flow label based. The BIERv6 proponents are emphasizing on “modern” aspect of that solution, too 😊

RFC 6437 implies that routers should use the “traditional” 5-tuple in addition to the flow label. But maybe routers don’t follow 6437?

Zzh> I assume that is only applicable for the typical TCP/UDP payload, and not enough for today’s multi-service networks?

BTW, I not trying to debate the solutions. I’m trying to find out what behavior is required in the IPv6 tunnel between BFRs. It appears that ECMP is required (good). Are we asking for any “special” ECMP behavior, or do we assume that the tunnel transit nodes are blind legacy nodes that cannot tell a BIER packet from any other packet?

Zzh> Understand. Technical discussions are always appreciated, even if it is for debating the solutions. The chairs once requested that the requirements draft does not evaluate solutions, but we can certainly evaluate outside the draft.

Zzh> Tunnel transit nodes may not understand BIER at all, but with BIERin6 they should not mistake a BIER packet as an IP packet, as the first nibble of the BIER header is set to 0101 (would be “IPv5” if one treat it as IP version). This would then be similar to PW ECMP (where a CW with first nibble of 0000 is used).
Zzh> With BIERv6, even though the BIER payload follows the IPv6 header directly, the “traditional” 5-tuple based ECMP may not be used after all for two reasons: 1. The payload may not be IP 2. It seems that to locate the start of real payload (after the extension headers) for ECMP hashing, a router will need to follow the chain of extension headers one by one (since the standard IPv6 header does not have a field for the total length of all headers) and a legacy transit router may not actually do that for implementation/performance reasons.
Zzh> Even if a legacy transit router actually follows the extension headers to do 5-tuple based ECMP, since the BIERv6 proponents emphasizes on the “modern” technology/direction, it would be reasonable to consider the ECMP issue in the context of flow label based solution.
Zzh> Thanks.
Zzh> Jeffrey

Cheers,
Adrian

From: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net<mailto:zzhang@juniper.net>>
Sent: 26 November 2020 15:25
To: adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>; 'Tony Przygienda' <tonysietf@gmail.com<mailto:tonysietf@gmail.com>>; 'Greg Shepherd' <gjshep@gmail.com<mailto:gjshep@gmail.com>>
Cc: 'BIER WG' <bier@ietf.org<mailto:bier@ietf.org>>
Subject: RE: [Bier] draft-ietf-bier-ipv6-requirements-09

Hi Adrian,

Looks like I don’t have a life – making arguments for this life and death situation on Thanksgiving day 😊

Anyway, about the ECMP topic, not sure if the following addresses your questions/comments.

At BIER layer itself, BIER packet has an entry field used for hashing to decide which ECMP path to the next BFR it will take. This is used by any BFR.

If BFR1 determines that for to reach BFR2 it is going to use tunnel1 (vs. tunnel2 or another L2 link), and tunnel1 is an IPv6 tunnel, then with BIERin6 an IPv6 header is put on by BFR1, with the BIER header following the IPv6 header, and the BIER header’s entropy field copied into IPv6 header’s flow label field. That flow label field is then used by the routers along the tunnel to do ECMP.

Jeffrey

From: BIER <bier-bounces@ietf.org<mailto:bier-bounces@ietf.org>> On Behalf Of Adrian Farrel
Sent: Thursday, November 26, 2020 8:12 AM
To: 'Tony Przygienda' <tonysietf@gmail.com<mailto:tonysietf@gmail.com>>; 'Greg Shepherd' <gjshep@gmail.com<mailto:gjshep@gmail.com>>
Cc: 'BIER WG' <bier@ietf.org<mailto:bier@ietf.org>>
Subject: Re: [Bier] draft-ietf-bier-ipv6-requirements-09

[External Email. Be cautious of content]

I’ve been reading up on this thread and the three related drafts.

I don’t dip into BIER often (I’m not a multicast person, and I have a life), but this seemed to be a fairly weighty topic which has been bubbling away for a while, and the volume of the discussion suggested that this is a really important question (it sounded like a life and death decision judging by some of the emails!).

I think Tony captured some really key points in his email below. I particularly like his observation that BIER is working at the neck of the hourglass: that demands caution and good judgement; it also requires everyone to step back and do the right thing regardless of their investment (emotional or financial) in their preferred solution.

It seems to me (again, from the outside, and apologies if this is re-opening age-old discussions) that most of this is just protocol engineering. We have long experience at making any protocol do anything we want. If a particular solution lacks some capability, it can always be added with an extra TLV. That makes comparisons of solutions (also known as beauty contests) somewhat pointless: if you judge A better than B because B lacks some feature, then we just add the feature to B, and the cycle starts again.

That means that, while the requirements work is highly valuable for working out what the solution should deliver, it is not so helpful in determining which solution the WG should pursue. We are left, IMHO, with some of the edge requirements about transiting non-BIER nodes. These are nodes that can happily process “normal” IPv6 packets, but don’t know what to do with a BIER encapsulation. That looks like Section 3.1.3 of the requirements draft.

Embedded in that requirement is discussion of what an IPv6 router that is a transit might do with a packet. On the whole, routers just route on the fields in the v6 header itself, but they may look deeper in order to perform ECMP functions etc. For example, they may look for the transport payload to hash on ports etc. To achieve this, a router must be able to step over any additional headers (RH, DOH, etc.) to find the payload or must know not to even try. In general, a router that doesn’t understand a header will step over it if it can, but will probably give up the hunt for hashable fields.

At this point I ran aground ☹ 8926 doesn’t have anything to say about ECMP in a BIER network (with or without BIER-capable routers). But 8279 has a nice fat section on ECMP, but this seems to describe how ECMP works when processing the BIER encapsulation for equal cost paths between BIER routers, not for how the “underlay” (the IPv6 network in this case) might handle equal cost paths in its own routing.

Any clues as to how ECMP is expected to work in the context of the v6 requirements? Anything that should be added to 3.1.3 or a new section?

Thanks,
Adrian


From: BIER <bier-bounces@ietf.org<mailto:bier-bounces@ietf.org>> On Behalf Of Tony Przygienda
Sent: 20 November 2020 05:36
To: Greg Shepherd <gjshep@gmail.com<mailto:gjshep@gmail.com>>
Cc: BIER WG <bier@ietf.org<mailto:bier@ietf.org>>; Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>>; draft-ietf-bier-ipv6-requirements <draft-ietf-bier-ipv6-requirements@ietf.org<mailto:draft-ietf-bier-ipv6-requirements@ietf.org>>; EXT-zhang.zheng@zte.com.cn<mailto:EXT-zhang.zheng@zte.com.cn> <zhang.zheng@zte.com.cn<mailto:zhang.zheng@zte.com.cn>>; Alvaro Retana <aretana.ietf@gmail.com<mailto:aretana.ietf@gmail.com>>; Jeffrey (Zhaohui) Zhang <zzhang@juniper.net<mailto:zzhang@juniper.net>>
Subject: Re: [Bier] draft-ietf-bier-ipv6-requirements-09

Well, I’m glad that the work on requirements draft, albeit as product found wanting in AD’s assessment, has led to clarification of the crucial questions that e'one seems to agree need to be asked.

It surprised me then mildly that my co-chair had to explicitly lay out the semantics of what was a clear direction spelled out during the meeting but that’s all well to get e’one better in sync I guess. Needless to say I am sharing his assessment and questions put to the room entirely.
Some things that I think need explicit spelling out IMO after the last few meetings (since I’m not sure e’one in the process internalized that) is that WG is not here to tell people they cannot work on something whatever the perception seems to be, IETF doesn’t work that way. People go sideways and build stuff based on what we publish/develop in open source and for their customers in all kind of ways which may be neither fitting into an architecture, consensus or interest of a WG all the time. And that’s wonderful and more power to them, RFCs are free to download and they are just RFCs, they are not stone tablets brought from the mountain. However, and that's a big however, _if_ a work is looking for WG adoption and ultimately RFC status, the IETF process kicks in and the process has been here and well debugged over 30 years and that’s why Internet was built IME. The process is unusual in the way that it resists pretty well pressure based on non-technical claims, exceedingly poor architectural choices, chair shopping, padding of communication channels with “I participated only once to send a +1 to a list”, ad-hominem attacks and similar shenanigans that have been all tried over and over again. In the same vein the process tends to weigh based on reputation of “who said what in which context”'; such reputation being built on community service and sound work over many years. And sometimes hard calls are made based on rough consensus called by people that are here to steer stuff and nudge it along the way. Sure, it’s easy to standardize and build “something”, it’s very hard to keep it going operationally @ Internet scale for 20 years and lots of those lessons are unfortunately scar tissue not easily transferred except at level of RFC1925. Last point to emphasize is that BIER is not the average set of RFCs, we have been handed the permission to go into the hourglass of the Internet, something that happens every 15 years or so. The stuff we deliver is as fundamental as MPLS or IP forwarding plane and as PS has to meet toughest architectural standards to prevent a melt-down of non-orthogonal, under’spec’ed solutions leading to poor operational properties @ scale and non-interoperable solutions which long-term serves no'one well that relies on IP technology to support high quality infrastructure @ scale.



Juniper Business Use Only


Juniper Business Use Only