Re: [Int-area] [v6ops] draft-ietf-intarea-tunnels concerns

"Templin (US), Fred L" <Fred.L.Templin@boeing.com> Thu, 25 March 2021 18:15 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69EFE3A294A; Thu, 25 Mar 2021 11:15:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=boeing.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UbXGwXbYLAjy; Thu, 25 Mar 2021 11:14:57 -0700 (PDT)
Received: from clt-mbsout-02.mbs.boeing.net (clt-mbsout-02.mbs.boeing.net [130.76.144.163]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8D8363A294F; Thu, 25 Mar 2021 11:14:55 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by clt-mbsout-02.mbs.boeing.net (8.15.2/8.15.2/DOWNSTREAM_MBSOUT) with SMTP id 12PIEpXJ017163; Thu, 25 Mar 2021 14:14:54 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=boeing.com; s=boeing-s1912; t=1616696094; bh=9nqeGs4Uz8/S8ACeYUwFpjyW9nxD4+s5LrhaCtlmX3Y=; h=From:To:CC:Subject:Date:From; b=AxLFfRQWfRcUiYRI64/jaF1+TS1N5MiOtyEVusgZd2tE1iV9plGiz0wPYkLzgR3x9 aG9C752U5RMUfurSICnqKj2WJexYbqyvTri5WIZv9QaPkX+hL3rmEIXbjdsyhJPPSZ 3FbzInhno94ara1blPRiBO+n/5JJRdGkrW3fcNYunOF1P04WicvaGcFT3tZp1lATzC UilPPW1BG2Oz0Zbcsy8orOdeh+0UXcI/r4dLfxd7uyWHKD5217Yy2727pzKcztwThH qcJZydfvB+KaKxv11ja0ylIPndrYlx7V7X3VePq+Wrb4yADiLarWKqa5lqVeAEI3El aUmXOk1fL9jiA==
Received: from XCH16-07-12.nos.boeing.com (xch16-07-12.nos.boeing.com [144.115.66.114]) by clt-mbsout-02.mbs.boeing.net (8.15.2/8.15.2/8.15.2/UPSTREAM_MBSOUT) with ESMTPS id 12PIEiKV017097 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=OK); Thu, 25 Mar 2021 14:14:45 -0400
Received: from XCH16-07-10.nos.boeing.com (144.115.66.112) by XCH16-07-12.nos.boeing.com (144.115.66.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.1.2176.2; Thu, 25 Mar 2021 11:14:43 -0700
Received: from XCH16-07-10.nos.boeing.com ([fe80::1522:f068:5766:53b5]) by XCH16-07-10.nos.boeing.com ([fe80::1522:f068:5766:53b5%2]) with mapi id 15.01.2176.009; Thu, 25 Mar 2021 11:14:43 -0700
From: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>
To: Joseph Touch <touch@strayalpha.com>, Vasilenko Eduard <vasilenko.eduard@huawei.com>
CC: "v6ops@ietf.org" <v6ops@ietf.org>, "6man@ietf.org" <6man@ietf.org>, int-area <int-area@ietf.org>
Thread-Topic: [v6ops] draft-ietf-intarea-tunnels concerns
Thread-Index: Adchn3/VoNqMljYqR5Wnwg+9Kf7R7A==
Date: Thu, 25 Mar 2021 18:14:43 +0000
Message-ID: <b4cd214d080a4a3aab9962810bb9b9cf@boeing.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [137.137.12.6]
x-tm-snts-smtp: 1BD09041FBCB92210384157D5866CDA2CE1E61EFC6D5D1EB65A802E841770FB72000:8
Content-Type: multipart/alternative; boundary="_000_b4cd214d080a4a3aab9962810bb9b9cfboeingcom_"
MIME-Version: 1.0
X-TM-AS-GCONF: 00
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/3P18Krcd7BkGwnvYW1aJHyTOMXw>
Subject: Re: [Int-area] [v6ops] draft-ietf-intarea-tunnels concerns
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Mar 2021 18:15:03 -0000

Joe, the AERO/OMNI drafts I cited both state up front:

  “The OMNI interface observes the link nature of tunnels, including the Maximum Transmission Unit (MTU),
  Maximum Reassembly Unit (MRU) and the role of fragmentation and reassembly [I-D.ietf-intarea-tunnels].”

https://datatracker.ietf.org/doc/draft-templin-6man-aero/
https://datatracker.ietf.org/doc/draft-templin-6man-omni/

So, the spirit of the proposals intend to honor intarea-tunnels. AERO/OMNI go on to employ RFC2473,
and end up looking a lot like AAL5 only adapted to networks with heterogeneous cell sizes instead of the
fixed ATM cell which I guess is only 48 usable bytes. By giving the OAL source a fixed known *minimum*
cell size but allowing it to discover larger *per-path* cell size values, the service is both robust and efficient.

So, the AERO/OMNI specs are parked unless and until I receive direction from the IETF. If some details
were missed I apologize and those can be cleaned up based on review input. If the whole thing is somehow
flawed, I would be very surprised.

So, I am in the same boat as you in terms of wondering what the next step is in terms of progressing
the documents?

Fred

Hi, Eduard,

I’ve repeatedly addressed these, so in the same spirit of “putting it all in one place”, here are the answers.

Joe


On Mar 25, 2021, at 3:52 AM, Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>> wrote:

Hi Experts,
I have not received answers (after a long message thread) for me to understand:

1.       It is assumed by the draft that Data Plane in the transit router operates right now exactly like a host. Then Generalization is attempted for IP stack operation like on a host.
It is not the case. Moreover, it is not possible in principle because the hardware is ASIC managing traffic flow, but the host is CPU “running to completion” for control flow. The architecture of hardware is completely different.

Tunnel endpoints act like hosts. ASIC hardware can and does support fragmentation and reassembly at high speeds, and has *for decades* (all ATM hardware did this).


2.       It is additional complexity: 2 MTUs for one virtual interface instead of the current 1 in all real data planes. 1st MTU is the buffer size - called “Tunnel MTU”. 2nd MTU is the old tunnel MTU- called “MAP”.

They exist, whether you consider them complex or not. Sometimes they’re the same value (i.e., when no fragmentation is supported over the tunnel) and sometimes they’re fixed and known a-priori, but none of that changes that.


It looks extremely bad after the decision that 1st MTU (buffer size) is static till some miracle would explain to us how it would become dynamic in the future.

Nobody has claimed that the tunnel pathMTU (MAP in draft-tunnels) or EMTU_R (true tunnel MTU) cannot change.


3.       The draft has deprecated PMTUD and introduced fragmentation instead of it.

Draft-tunnels is intended as BCP. It has no power to deprecate.

Draft-tunnels does not imply that PMTUD should be used less frequently; it merely repeats the observation known for over 20 yrs that ICMPs are largely blocked and reliance on PMTUD is only asking to experience black-holes.


To be precise: for all bulk traffic that would happen between MTUs.
Moreover, It is not explained what to do for tunneling that does not want fragmentation now (currently prefer PMTUD). Should all tunnels support fragmentation from now on? (L2TPv3, VxLAN, MPLS, RFC 2473)

Any tunnel that is used directly recursively (X over X, i.e., L2TPv2 over L2TPv3, etc.) must have an EMTU_R larger than its pathMTU. If it does not, it cannot support that use.

Those are factual observations, not requirements to specifications claims.


4.       If PMTUD is deprecated, then why it is still used for the 2nd interface MTU? If it is dead, then it is dead, right? Anyone could have the conclusion that the 2nd MTU is static too.

PLPMTUD does not use ICMPs but still relies on these two MTUs.


5.       The draft does break all tunneling specifications. Is everything should be changed in production? It is the cost. For what reason?

Draft-tunnels breaks nothing; it observes that some tunneling specifications *are already inherently broken*.

Seeing a broken window and reporting it does not mean that you broke that window.


It does affect IPv6 too – I had stumbled upon this problem from that direction. RFC 2473 is the best tunneling spec that would be damaged severely.

RFC2473 has errors - as noted in Sec 5.2 of v10 of draft-tunnels.

I welcome discussion on those errors as well as how draft-tunnels should proceed. It is intended for BCP, which cannot update other docs - but it does not itself specify anything. But it could (should?) update all the standards noted in Sec 5.2.

Can anyone suggest how best to do that?


Hence, 6man and v6ops on the copy.

I decided to leave it here for the people that may search for it in the future.

Same here.


Eduard
_______________________________________________
v6ops mailing list
v6ops@ietf.org<mailto:v6ops@ietf.org>
https://www.ietf.org/mailman/listinfo/v6ops