Re: [Bier] BIER v6 requirements draft comments:draft-ietf-bier-ipv6-requirements ...

"Xiejingrong (Jingrong)" <xiejingrong@huawei.com> Fri, 13 December 2019 03:31 UTC

Return-Path: <xiejingrong@huawei.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 577CA1200F6 for <bier@ietfa.amsl.com>; Thu, 12 Dec 2019 19:31:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GmvSMSDN3ArV for <bier@ietfa.amsl.com>; Thu, 12 Dec 2019 19:31:09 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [185.176.76.210]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2827C12018B for <bier@ietf.org>; Thu, 12 Dec 2019 19:31:09 -0800 (PST)
Received: from lhreml703-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 702211DEBD77A5AD04EA; Fri, 13 Dec 2019 03:31:07 +0000 (GMT)
Received: from lhreml714-chm.china.huawei.com (10.201.108.65) by lhreml703-cah.china.huawei.com (10.201.108.44) with Microsoft SMTP Server (TLS) id 14.3.408.0; Fri, 13 Dec 2019 03:31:07 +0000
Received: from lhreml714-chm.china.huawei.com (10.201.108.65) by lhreml714-chm.china.huawei.com (10.201.108.65) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Fri, 13 Dec 2019 03:31:06 +0000
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml714-chm.china.huawei.com (10.201.108.65) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.1.1713.5 via Frontend Transport; Fri, 13 Dec 2019 03:31:06 +0000
Received: from NKGEML514-MBX.china.huawei.com ([fe80::40a8:f0d:c0f3:2ca5]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0439.000; Fri, 13 Dec 2019 11:30:57 +0800
From: "Xiejingrong (Jingrong)" <xiejingrong@huawei.com>
To: "zhang.zheng@zte.com.cn" <zhang.zheng@zte.com.cn>, "mmcbride7@gmail.com" <mmcbride7@gmail.com>
CC: "bier@ietf.org" <bier@ietf.org>, "prz=40juniper.net@dmarc.ietf.org" <prz=40juniper.net@dmarc.ietf.org>
Thread-Topic: [Bier] BIER v6 requirements draft comments:draft-ietf-bier-ipv6-requirements ...
Thread-Index: AQHVsJ6sn2YY6R1X/kONPNkA5PVU2Ke3Z/nA
Date: Fri, 13 Dec 2019 03:30:56 +0000
Message-ID: <16253F7987E4F346823E305D08F9115AABAEE5D4@nkgeml514-mbx.china.huawei.com>
References: 24BB25FC-F19D-4CE2-B5AB-2BF1F844546E@juniper.net, CAL3FGfwFJDN6WK8UdLzOdDJDxeL9Bf5P_ncGAdNQw58HEd8UNw@mail.gmail.com <201912121137102109036@zte.com.cn>
In-Reply-To: <201912121137102109036@zte.com.cn>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.111.217.214]
Content-Type: multipart/alternative; boundary="_000_16253F7987E4F346823E305D08F9115AABAEE5D4nkgeml514mbxchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/yhAr0_7U9S-hutftTg4UkunNnfI>
Subject: Re: [Bier] BIER v6 requirements draft comments:draft-ietf-bier-ipv6-requirements ...
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Dec 2019 03:31:11 -0000

Hi Sandy, Tony and Mike,
Please see my comments in line with [XJR].

Thank you!
Jingrong

From: BIER [mailto:bier-bounces@ietf.org] On Behalf Of zhang.zheng@zte.com.cn
Sent: Thursday, December 12, 2019 11:37 AM
To: mmcbride7@gmail.com
Cc: bier@ietf.org; prz=40juniper.net@dmarc.ietf.org
Subject: Re: [Bier] BIER v6 requirements draft comments:draft-ietf-bier-ipv6-requirements ...


Hi Mike, Tony,



Please see my comments in line with [Sandy].

Thank you!



Sandy
原始邮件
发件人:MikeMcBride <mmcbride7@gmail.com<mailto:mmcbride7@gmail.com>>
收件人:Antoni Przygienda <prz=40juniper.net@dmarc.ietf.org<mailto:prz=40juniper.net@dmarc.ietf.org>>;
抄送人:bier@ietf.org<mailto:bier@ietf.org> <bier@ietf.org<mailto:bier@ietf.org>>;
日 期 :2019年11月19日 20:57
主 题 :Re: [Bier] BIER v6 requirements draft comments:draft-ietf-bier-ipv6-requirements ...
Hi Tony,

On Mon, Nov 18, 2019 at 9:51 PM Antoni Przygienda
<prz=40juniper.net@dmarc.ietf.org<mailto:prz=40juniper.net@dmarc.ietf.org>> wrote:
>
> Finally getting to fire off some comments on draft-ietf-bier-ipv6-requirements draft

MM: Yay! thank you, happy we are getting some feedback.

> 3.4: I see NO requirements to do anything with SR or SRv6 in BIER WG charter so I am not sure how it ended up so prominently in the draft. And BIER is a hop-by-hop technology, it already includes provisions to transition non-BIER nodes via correct algorithms so not sure how SRv6 is of any use or relevance here. Of course BIER could be tunneled with SRv6 but then a BIER frame should be carried natively inside a SRv6 frame.  Comingling two level layer 2.5 transport technologies into a single layer format as the draft seems to imply is unnecessary and a bad idea since there will be resulting cross-talk.

MM: Unless my co-authors, or anyone else, disagrees, I say we simply
remove this section and any and all references to SRv6 if it's not
helpful. Focus should be on IPv6 related requirements.



[Sandy]: Agree with Tony. If we mention SRv6 here, should we mention any all other potential tunnels (SR P2MP policy, IP in IP. and so on) here? The answer is obvious not.

So I don't think it's necessary to mention SRv6 here.


> 4.2: completely disagreed. BIER is a hop-by-hop layer 2.5 technology. Modifying IP options is arguably far more expensive than next-protocol frame.

MM: You completely disagree with requirement 4.2? You believe that the
solution _should_ require hop-by-hop modification of the IP source
address field? Or just disagree with our explanation of it? This
requirement came from Eric Rosen long ago. Please suggest new
requirement wording that makes you happy.



[Sandy]: IMO the whole section 4.2 is unnecessary. I don't see any benefits of the SA/DA modification restriction.

For SA, we know that there are already OAM function in BIER header, we can use the information from the header directly.

The BIER PING for instance, if any intermediate router need to send error message to BFIR, it can get the BFIR-id directly from the packet.

For DA, I agree with Tony, BIER is a hop-by-hop lay 2.5 technology, it needn't, and can't make any unnecessary requirement for the outer header.


> 4.3:
>
> fragmentation will only play in IPv6 case if the frame is longer than IPv6 max frame size - BML roughly. No matter _where_ we stick the mask we face the same problem until we start to do BIER fragmentation and reassembly

MM: So the requirement "should not require the BFRs to inspect layer 4
or require any changes to layer 4." is fine but you don't like the
fragmentation wording? Or do you not like the requirement period? We
can certainly re-word it or remove it if it causes heartache. Again
this was another Rosen requirement I believe. Fragmentation is
optional for BIER, but, from an IPv6 point of view, it is a basic
capability and we figured we should support it. Maybe we don't but
let's get the requirement down.



[Sandy]: At first, I don't think the fragment problem is real existed. We know that we prefer E2E IPv6 forwarding without fragment, there are many ways can provide the prediction of MTU of whole the road.

[XJR] That said “fragment problem is not real existed”. I wish I could agree with you, but I can’t.

Supposed that we still need to do fragment in BFIR, how to do the fragment function is depend on implementation. I don't think the situration described here will occur.

[XJR] Please tell us how to do the fragment function in the implementation.

The authentication function is the same with fragment.

[XJR] Please tell us how to provide the authentication function in the implementation.

About the SRv6, same comments with section 3.4.


> Again, SRv6 is neither in the charter nor an issue since BIER is a L2.5 hop-by-hop technology and not, as the authors want it, all of a sudden an implicit tunneling or multi-hop technology

MM: Consider SRv6 gone from this draft since having it in there is
causing pain.

> 4.11: and again BIER is hop-by-hop and it will rely on higher layers to re-assemble just like MPLS does.

MM: and again IPv6 does provide the fragmentation/assembly capability,
so we figured BIER should inherit such capability but we could
certainly be wrong. Are you in favor then of removing the 4.11
requirement involving fragmentation? Or re-wording it?



[Sandy]: IMO section 4.11 and 4.12 need to be removed. It's not specific to BIER IPv6.

[XJR] Seems the same as above. Do you think the fragmentation or authentication is not existed ? or they are not useful at all ?


> I-D.xie-bier-ipv6-encapsulatio: yes, IPv6 architecture has the loophole for in flight modification of hop-by-hop header options but it does not mean it’s a good idea

MM: This isn't a solutions document so whether it's a good idea or not
can be saved for that document to justify. We will move the solutions
overviews to an appendix.



[Sandy]: I don't think it's good to mention specific solution in the requirement document. IMO the requirement document should be neutral and impartial. Thanks!


> Last, major objection is that by opening any IPv6 destination address to receive BIER frames from multiple hops away we are opening a completely security nightmare and argumenting that whole BIER layer has to be IPSEC’ed to close that hole is simply going into a seriously wrong direction IMO.

MM: Which requirement are you referring to? Perhaps you are referring
to requirement 4.3 involving L4 Inspection where we mention IPsec? We
figured the IPSEC architecture should be inherited from IPv6 if we are
considering BIER in IPv6 but it looks like you don't agree. We are
happy to modify/add/remove any requirement just needs specifics.




thanks,
mike

>
>
> --- tony
>
>
>
> _______________________________________________
> BIER mailing list
> BIER@ietf.org<mailto:BIER@ietf.org>
> https://www.ietf.org/mailman/listinfo/bier

_______________________________________________
BIER mailing list
BIER@ietf.org<mailto:BIER@ietf.org>
https://www.ietf.org/mailman/listinfo/bier