Re: IETF Last Call conclusion for draft-ietf-6man-rfc2460bis-08

Mark Townsley <mark@townsley.net> Thu, 30 March 2017 09:30 UTC

Return-Path: <mark@townsley.net>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 585D912922E for <ietf@ietfa.amsl.com>; Thu, 30 Mar 2017 02:30:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=townsley-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LMCaxf85T4cO for <ietf@ietfa.amsl.com>; Thu, 30 Mar 2017 02:30:55 -0700 (PDT)
Received: from mail-io0-x229.google.com (mail-io0-x229.google.com [IPv6:2607:f8b0:4001:c06::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 706961286AB for <ietf@ietf.org>; Thu, 30 Mar 2017 02:30:53 -0700 (PDT)
Received: by mail-io0-x229.google.com with SMTP id l7so15295715ioe.3 for <ietf@ietf.org>; Thu, 30 Mar 2017 02:30:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=townsley-net.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=y6q0pnLA8HspTv5iDBhyIDQ6gMaxLzqIUvQvqlhjkY4=; b=eVsQpV8h/9CQSfb/rEhUv5OJNeq44kmU0n0K15MciNol7TPhjqGR3CNovWaQvs/cG+ YvO8YF1iv3VC8KMTznF9r3FAEJZU5q3M0ZKj5CfoS6p3QMTF7oxgC7qT5oxTUGJ310dL HVaiQVpsmN0Egs3e5IE+iSPaYGU5VfYEWqp/KTRCqgmgbKO44WqZPX2BOyq+1QjL6Fk7 zmq7he71i2JNgeJspk2w9z5RJVe/nQdp7WVYrw0vM8c3oJnd6MnJtZZ1R5zK68YO/Xre ZPbGEtOid61ppzlBaNEn9Ojn3Y80a5QlUo9iC0hk034OA+EfLMXByzLpsYQleC3T3DMG JZVg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=y6q0pnLA8HspTv5iDBhyIDQ6gMaxLzqIUvQvqlhjkY4=; b=DjkrVRRx2N4AyGIN1L3zf5tq3CFRtcigHI2slNDsgoJPK8DLShLoXf8COmNnHyByxm Ue084bbaQL2MOj9f7BlXLtX1gamZh/gs8RBIprL4bgngfAUYyTV507b4/Vv6VA4KWGBU pIeQekEOAmURjd1fhP4ls/SoL6nkZktC5hvNFfz481Qvoa+aROOwwqX//NOTI3BcgDMt iv0KUqYwXyHCF41e0hWPWB2VM7qaKZROrlz6aJqgpPVCm5uNJB/g3n0EqrZsnGnsHqBP bH4zN8R0vAIEXOBv3EdGjH1Ji6E/2hwySfkLJSLkkShKIfIa4jpuZJLDNigFUqpSqJGV dBFA==
X-Gm-Message-State: AFeK/H1KcbkbsfFadiujXrtBih4u6NJGlT4+giiKa62l4m2p7dlDqRwz1XUTaUa/+p+ZHg==
X-Received: by 10.107.35.129 with SMTP id j123mr5887389ioj.195.1490866252738; Thu, 30 Mar 2017 02:30:52 -0700 (PDT)
Received: from [10.71.6.171] (chsptrs33.c.subnet.rcn.com. [207.229.161.32]) by smtp.gmail.com with ESMTPSA id w133sm4768960itf.2.2017.03.30.02.30.51 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 30 Mar 2017 02:30:51 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (1.0)
Subject: Re: IETF Last Call conclusion for draft-ietf-6man-rfc2460bis-08
From: Mark Townsley <mark@townsley.net>
X-Mailer: iPad Mail (14D27)
In-Reply-To: <4917F161-2EC8-43E0-AF4C-BFAEE44A492C@cable.comcast.com>
Date: Thu, 30 Mar 2017 04:30:51 -0500
Cc: "draft-ietf-6man-rfc2460bis.all@ietf.org" <draft-ietf-6man-rfc2460bis.all@ietf.org>, "ipv6@ietf.org" <ipv6@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <E03B93AF-82B9-453E-8596-8978FA490D17@townsley.net>
References: <599257D7-532D-4512-929B-D124623EAF35@ericsson.com> <6B662F87-B0E6-4613-B406-8A22CA95DFA5@cisco.com> <4917F161-2EC8-43E0-AF4C-BFAEE44A492C@cable.comcast.com>
To: "Leddy, John" <John_Leddy@comcast.com>, "suresh.krishnan@ericsson.com" <suresh.krishnan@ericsson.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/KXnV1oPl8x0ulAcZgsFbQiB_YpA>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Mar 2017 09:30:57 -0000

I think this is hitting on a very important point about protocol transition here, something that I think all of us should step back and consider from a very humble vantage point.

The transition from IPv4 to IPv6 has been hard, certainly much harder than I think the contributors to RFC2460 originally expected. We've had to go back after the fact to define and perfect things like NAT64 to sit at the boundary of IPv6-only networks, allowing communication between IPv6-only and IPv4-only endpoints by inserting and deleting IPv6 and IPv4 headers. 

The whole idea of an extension header is to extend the capabilities of IPv6. Extended functions naturally come with transition, and transition happens progressively. Inserting and deleting an extension header is analogous to a NAT64 function - not something we necessarily want, but something we have realized we need, to handle transition within the reality that wide spread flag days are impossible.

If I take IPv6 SR as an example of an extended IPv6 function, some endpoints will support IPv6 SR sooner than others. Some network domains will operate with IPv6 SR everywhere sooner than others. The ability to classify traffic and insert an SR header upon entry into an SR domain is important to transition, and is completely analogous to what, say, T-Mobile does with NAT64 and 464xlat.  

Suresh, I think this may be a tussle point (to refer to Dave Clark's presentation earlier this evening). 2460bis should not try to over-specify here. Instead, allow for a bit of flex while we truly get our heads around how to deploy and operate systems which use IPv6 extension headers.

- Mark




On Mar 29, 2017, at 9:59 PM, Leddy, John <John_Leddy@comcast.com> wrote:

>> On Mar 14, 2017, at 9:47 PM, Suresh Krishnan <suresh.krishnan@ericsson.com> wrote:
>> 
>> NEW:
>> 
>> With one exception, extension headers are not examined, processed,
>> inserted, or deleted by any node along a packet's delivery path,
>> until the packet reaches the node (or each of the set of nodes, in
>> the case of multicast) identified in the Destination Address field of
>> the IPv6 header...
>> 
>> Please feel free to comment either privately or on list if you have any concerns with this resolution going forward.
> 
> 
> Suresh,
> 
> I still have concerns that we are eliminating a tool that may prove very helpful in migrations without understanding its value.
> 
> The Internet transition of IPV4 -> Dual Stack V4/V6 -> IPV6 Only; has been long, operationally complex and full of unexpected challenges.
> We are only now starting to make the transition from Dual Stack to IPV6 Only, there are still many unknowns on how to complete this migration.
> 
> As we contemplate finishing this major Network shift – We find ourselves in the early stages of another.
> 
> The transition from Physical to Virtual Infrastructure.  Again, the migration will be long, operationally complex and full of unexpected challenges.
> 
> In the old world with Servers running Applications in Physical locations designed for very predictable loads; using an encap/decap tunnel to emulate a physical circuit between locations has many attractive properties – but that is compared to actually ordering and provisioning real circuits between locations.
> 
> In the new world of dynamic resources spun up on demand in distributed environments across multiple providers, Applications having the Intelligence and State to bring up their own required connectivity is very natural.  This is where we are putting the majority of our efforts.  SRv6 enables very attractive solutions by Applications building their own headers.
> 
> The challenges come as we try to migrate and require these two infrastructures to Interoperate for a long time.
> Burdening the new Virtual world with Old, Static circuit paradigms is not optimal.
> Supplementing the legacy infrastructure with an assist function seems a reasonable solution.  (Ext Hdr insertion/deletion or encap/decap tunnels)
> 
> The preferred assist mechanism seems to be the one that allows the New World to operate in its final preferred state, sending and receiving packets with their own headers. (SRv6)
> But what does an Application in the new world due when it is attempting to communicate with an Application in the Old World?
> Shouldn’t it build an SRv6 header?  That would mean that the assist function would need to be the last SID in the Segment List and be capable of removing the SRH.
> Wouldn’t it make sense for the assist function to do the same thing in the reverse direction; an Old World Server talking to a New Virtual World Application?  Insert an SRH.
> 
> If this insert/delete of an SRH is prematurely prohibited;  What is a recommended solution to the Real World problem above.  Not use case, we are implementing.
> 
> Again; I’m worried we are eliminating a tool that may prove very helpful, preclude its use in future IETF work and shutdown a path for Innovation in Networking,
> 
> Thank you for asking and listening to my concerns,
> 
> John Leddy
> Comcast
> 
> 
> 
> 
> 
>