Re: [Int-area] New Version Notification for draft-herbert-ipv4-eh-03.txt

Brian E Carpenter <brian.e.carpenter@gmail.com> Thu, 21 March 2024 21:43 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EEA7C14F69F for <int-area@ietfa.amsl.com>; Thu, 21 Mar 2024 14:43:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.105
X-Spam-Level:
X-Spam-Status: No, score=-7.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cQdXEAdUsHiT for <int-area@ietfa.amsl.com>; Thu, 21 Mar 2024 14:42:58 -0700 (PDT)
Received: from mail-oi1-x232.google.com (mail-oi1-x232.google.com [IPv6:2607:f8b0:4864:20::232]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BFA55C14F69B for <int-area@ietf.org>; Thu, 21 Mar 2024 14:42:58 -0700 (PDT)
Received: by mail-oi1-x232.google.com with SMTP id 5614622812f47-3bd4e6a7cb0so772521b6e.3 for <int-area@ietf.org>; Thu, 21 Mar 2024 14:42:58 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1711057378; x=1711662178; darn=ietf.org; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=T0g1bFbdmhQLW7cgRXTkYM7PZFKZstSzvfaLw6UnRLk=; b=N7PYjaY9CFfyYwrYrYc2w0kMw8CGyb4hUqdDSwI3oJ5yNh4t9ylM5DT5jyL7YvBhZU DQAtHZYfFrQUISn9E6xgm6wuy0DXSae0BEotsPN6365OEEYXBOIHT8OqIT1LyOAMxXZR qHJ248XAFC+R4mnS2uKOXpFXCyFhuOcUCcfnpgJNZwS78FXdEOfyAgiZF+VZKHOGBItv jk+dp6G9BIRr9u84sHdY9o6p2ouUvwBs+CoAca8yJIDB5sh4vxuU3GlyZvffx6zca6sL ph0VJmz5J+OPqFxCGygPGpIl9NYJFjxEb2x6jnqaEI7ZAC5m8wUSUVBnZ3n9m+ANUh9v FqMQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711057378; x=1711662178; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=T0g1bFbdmhQLW7cgRXTkYM7PZFKZstSzvfaLw6UnRLk=; b=rtZZb5agGA5SDeEIMjQFJ1PUWdveCZ+DyzkTfgnVRKqbrMf+O4MZpFIN7Jsk7YrB64 09nt8IaztgdmFpBjOLHXJxaGB2Fr5mWYJXhpHB5AKnKsBNOuW66zc8Hmm81Din7zsPya aNdHuJCZFFyzK+ABFO0p1Wi9oWiIcchyvM8GqX8QfOUdsuEhVbjloHYDfNk8qiPL10ya /PAAAWDiQLT/E/JoR5o0CiDFPkZfIUkfOmHoh14KRJ9G4BdDU8vxe53wllCQLDv6Jqzl E5j4cXaqvvB7vU8o6bjLXHSrPBjQnrfpRfOPdXIVFTZHm4gnNY1dWA4DywMnKuP9CuJ7 EzfA==
X-Gm-Message-State: AOJu0Ywvz/wzw3nvTnPY9y07hIxBd/F3jXpIY/8kAp0GA2q2nBr6/yVY FH8kayyQXRydfTgeH7VSJDaCYpmPnn9k0V/yeLFYo4shDEy7UsNM9eB4JzAKnGI=
X-Google-Smtp-Source: AGHT+IFXqcfyJcMBXo8bNY/ScoYR2U/eR2fYzqVgsJekpz1KwQsrEkgOsuLb8I225cSusDmM7GDFCA==
X-Received: by 2002:a05:6a21:3398:b0:1a3:63ca:632a with SMTP id yy24-20020a056a21339800b001a363ca632amr997317pzb.58.1711056977352; Thu, 21 Mar 2024 14:36:17 -0700 (PDT)
Received: from ?IPV6:2404:4400:541d:a600:44b7:2c2e:2bc6:8707? ([2404:4400:541d:a600:44b7:2c2e:2bc6:8707]) by smtp.gmail.com with ESMTPSA id 32-20020a631560000000b005dccf9e3b74sm322966pgv.92.2024.03.21.14.36.15 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 21 Mar 2024 14:36:17 -0700 (PDT)
Message-ID: <63c8f568-0f9a-457a-9591-2500ea3f8240@gmail.com>
Date: Fri, 22 Mar 2024 10:36:13 +1300
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: Tom Herbert <tom@herbertland.com>, "Templin (US), Fred L" <Fred.L.Templin@boeing.com>
Cc: "int-area@ietf.org" <int-area@ietf.org>
References: <170865175505.14082.3856617737779580933@ietfa.amsl.com> <CALx6S363oh+7rNMaMa0s+9A-xeyLBy+ct-Q_Bx0xQm_di1PPJA@mail.gmail.com> <ZeZjGyxmuapXz5tb@faui48e.informatik.uni-erlangen.de> <CALx6S34OFL7tzabL+RMvB3nkad5k9esCD_dFpMi6DUtUEG-Dmg@mail.gmail.com> <ZedO1u7aheBhZ26N@faui48e.informatik.uni-erlangen.de> <ZfurRK_oNVES2hVz@faui48e.informatik.uni-erlangen.de> <CALx6S36L57vPa5YkiV3khYbFpPPgPUVynWaRVno0BufvXcALeA@mail.gmail.com> <Zfu5GQ7101lMnHGs@faui48e.informatik.uni-erlangen.de> <DCE2D4E2-9C5D-40B7-952F-7424E7FCBAFE@strayalpha.com> <SN6PR08MB3920E4B4094B92CC54BA43F1E6322@SN6PR08MB3920.namprd08.prod.outlook.com> <b58c4ffe-9aeb-4da6-9b2e-ce8d472ded7f@gmail.com> <BN0P110MB14205F8D84E04E8D2C22A8F8A332A@BN0P110MB1420.NAMP110.PROD.OUTLOOK.COM> <CALx6S368_i5MLOBs_eNufy1YnZGfSFcekXteZcK7P1q1jyaOdA@mail.gmail.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
In-Reply-To: <CALx6S368_i5MLOBs_eNufy1YnZGfSFcekXteZcK7P1q1jyaOdA@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/0iomdxgnh6G1xWDl_ickYpMEML0>
Subject: Re: [Int-area] New Version Notification for draft-herbert-ipv4-eh-03.txt
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF Internet Area WG Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Mar 2024 21:43:02 -0000

On 22-Mar-24 09:04, Tom Herbert wrote:
> On Thu, Mar 21, 2024 at 12:46 PM Templin (US), Fred L
> <Fred.L.Templin=40boeing.com@dmarc.ietf.org> wrote:
>>
>> Brian,
>>
>>> Why should the IETF spend effort on upgrading IPv4 capabilities at this point?
>>
>> For air/land/sea/space mobile Internetworking, we expect to engage steady-state IP
>> fragmentation over some paths, but IPv4 will still be in the picture for a long time to
>> come and IPv4 fragmentation has known limitations (e.g., RFC4963). IPv4 fragmentation
>> using the IPv6 Fragment Header (adapted for IPv4) would address many of the issues.
>>
>> This is just to name one example. Another example is adapting IPv6 HBH options to
>> carry IP parcels and Advanced Jumbos in IPv4 packets for operation over networks
>> where IPv4 will still be used for the long term.
>>
>> IPv4 is going to be around for a long time in many networks, so making it work
>> more like IPv6 seems like a useful improvement.
> 
> Yes, we still have IPv4 users that need the capabilities. If everyone
> were on IPv6 we wouldn't need this.

So this proposal hinders IPv6 adoption. I think it would lead to an
"interesting" IETF Last Call discussion.

> 
> To be a little more direct, one purpose of the draft is to nullify a
> persistent argument against using extension headers: "They don't work
> with IPv4".

I was told in Seattle in March 1994 that the Internet was opaque to
new IPv4 options - that's the main reason I stopped work on
https://datatracker.ietf.org/doc/draft-carpenter-aeiou/, in fact.
I understand that you've bypassed that problem in the ipv4-eh
design, but surely the deployment problem here will be worse than
it is for IPv6 extension headers - IPv4 middleboxes and firewalls
are much more widely deployed than they were in 1994.

> We've seen the same story play out in a number of proposals. It goes
> like this: "We want to annotate packets with ancillary network layer
> information like extension headers are designed for, but we still have
> a large number of users still on IPv4 and so using extension headers
> is a showstopper." Unfortunately, all the alternatives for getting
> similar functionality in IPv4 have proven to be essentially hacks
> (like having intermediate devices parse UDP payloads, or somehow use
> VLAN as metadata and turn Ethernet into an E2E protocol). And of
> course, IP options are "not an option"...

Right. But there you've implicitly accepted the limited domain
model, which many in the IETF consider heresy.

    Brian

> 
> Tom
> 
>>
>> Fred
>>
>>> -----Original Message-----
>>> From: Int-area <int-area-bounces@ietf.org> On Behalf Of Brian E Carpenter
>>> Sent: Thursday, March 21, 2024 11:59 AM
>>> To: int-area@ietf.org
>>> Subject: Re: [Int-area] [EXTERNAL] Re: New Version Notification for draft-herbert-ipv4-eh-03.txt
>>>
>>> EXT email: be mindful of links/attachments.
>>>
>>>
>>>
>>> On 22-Mar-24 03:53, Robinson, Herbie wrote:
>>>> I would say that, in theory, that’s not a show stopper, but in practice it is a lot of work to implement – enough to suggest that you
>>> wouldn’t get enough implementations to make it useable.
>>>
>>> I'll say it because nobody else has (recently).
>>>
>>> Why should the IETF spend effort on upgrading IPv4 capabilities at this point?
>>>
>>>      Brian
>>>
>>>>
>>>> *From:* Int-area <int-area-bounces@ietf.org> *On Behalf Of *touch@strayalpha.com
>>>> *Sent:* Thursday, March 21, 2024 10:46 AM
>>>> *To:* Toerless Eckert <tte@cs.fau.de>
>>>> *Cc:* int-area <int-area@ietf.org>
>>>> *Subject:* [EXTERNAL] Re: [Int-area] New Version Notification for draft-herbert-ipv4-eh-03.txt
>>>>
>>>> *[**EXTERNAL SENDER**: This email originated from outside of Stratus Technologies. Do not click links or open attachments unless you
>>> recognize the sender and know the content is safe.]***
>>>>
>>>> -----------------------------------------------------------------------------------------------------------------------------------------------------------------------
>>> --------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>>> --------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>>> --------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>>> --------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>>> -----------------------------------------------------------------------------------------------------------------------------------------------
>>>>
>>>> On Mar 20, 2024, at 9:35 PM, Toerless Eckert <tte@cs.fau.de <mailto:tte@cs.fau.de>> wrote:
>>>>
>>>>      On Wed, Mar 20, 2024 at 09:20:24PM -0700, Tom Herbert wrote:
>>>>
>>>>              In other words, Destination Option Headers do not have fundamentally distinct
>>>>              processing requirements on the destination host examining it than any other
>>>>              possible protocol header (e.g.: UDP, TCP), or at least we could not find such a description
>>>>              for any such guiding rules or treatment differences in RFC8200.
>>>>
>>>>
>>>>          Yes, that's mostly how all the IP protocols are implemented.
>>>>          Processing of an encapsulated  protocol isn't completely independent,
>>>>          for instance the pseudo header for the TCP and UDP checksum is
>>>>          different for IPv4 and IPv6.
>>>>
>>>>
>>>>      Right. But it seems unrelated to whether or not a header is an extension header,
>>>>      TCP and UDP not being extension headers for example.
>>>>
>>>> I haven’t seen it mentioned yet (apologies if so), but there is a big difference between extension headers and encapsulated protocols.
>>>>
>>>> Extension headers - no matter how many - can each refer back to the base header. Same for the first encapsulated protocol.
>>>>
>>>> E.g.:
>>>>
>>>> IP1 IP2 IP3 TCP….TCP uses a pseudo header based on IP3
>>>>
>>>> But:
>>>>
>>>> IPv6a EHb EHc TCP…TCP uses a pseudo header based on IPv6a; each of the EH’s can also refer back to IPv6a
>>>>
>>>> I see NO way to do this with any mechanism for IPv4 except options (whose space is limited). There’s no way to redefine protocol
>>> processing to ensure that information can be “Carried” forward across EHs.
>>>>
>>>> This seems like a show-stopper; has it been addressed?
>>>>
>>>> Joe
>>>>
>>>>
>>>> _______________________________________________
>>>> Int-area mailing list
>>>> Int-area@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/int-area
>>> _______________________________________________
>>> Int-area mailing list
>>> Int-area@ietf.org
>>> https://www.ietf.org/mailman/listinfo/int-area
>> _______________________________________________
>> Int-area mailing list
>> Int-area@ietf.org
>> https://www.ietf.org/mailman/listinfo/int-area