Re: [Int-area] draft-ietf-intarea-tunnels concerns

"Templin (US), Fred L" <Fred.L.Templin@boeing.com> Thu, 25 March 2021 16:33 UTC

Return-Path: <Fred.L.Templin@boeing.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 776D33A2708; Thu, 25 Mar 2021 09:33:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=boeing.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cnylafReN5sZ; Thu, 25 Mar 2021 09:33:49 -0700 (PDT)
Received: from clt-mbsout-01.mbs.boeing.net (clt-mbsout-01.mbs.boeing.net [130.76.144.162]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 265013A2707; Thu, 25 Mar 2021 09:33:48 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by clt-mbsout-01.mbs.boeing.net (8.15.2/8.15.2/DOWNSTREAM_MBSOUT) with SMTP id 12PGXjg7021516; Thu, 25 Mar 2021 12:33:47 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=boeing.com; s=boeing-s1912; t=1616690027; bh=/WAbyJZNkt+A6LPR+QbmgWZiO+Xe17Y50aNmZJRWf48=; h=From:To:CC:Subject:Date:References:In-Reply-To:From; b=i1izWkJ0jZF/va2ZxRXGOxavvcoVaDDaCG1yGKWft5NHrNzusbGBOwQYHEiyznizc soYurdnBezx9iIxQfn4rdp549Mhkr1gaKWGUWlfvamx6svrIR5tKJ6/h2C9LFeWmOC 3DYkbrqT+08+1qbyJxAd2aWTb+pI9jhTi3hgTjH9IWLlLGmHANRTCkTspLKeBAvAAn Kxp+fKIRJ5637NQvhd7BGsnyoyr17nzJu7Nm8P5lAlnxCwTG/5/5DugyUYJozL6m8K BxsDwcz65/qLbLwHJxZ880Y3coOnEy46ukVlsP1w9IuVBJvSYFZuY57GbrlHhouh9Y 5qOnc+oE0wYCA==
Received: from XCH16-07-12.nos.boeing.com (xch16-07-12.nos.boeing.com [144.115.66.114]) by clt-mbsout-01.mbs.boeing.net (8.15.2/8.15.2/8.15.2/UPSTREAM_MBSOUT) with ESMTPS id 12PGXZi7021429 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=OK); Thu, 25 Mar 2021 12:33:35 -0400
Received: from XCH16-07-10.nos.boeing.com (144.115.66.112) by XCH16-07-12.nos.boeing.com (144.115.66.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.1.2176.2; Thu, 25 Mar 2021 09:33:34 -0700
Received: from XCH16-07-10.nos.boeing.com ([fe80::1522:f068:5766:53b5]) by XCH16-07-10.nos.boeing.com ([fe80::1522:f068:5766:53b5%2]) with mapi id 15.01.2176.009; Thu, 25 Mar 2021 09:33:34 -0700
From: "Templin (US), Fred L" <Fred.L.Templin@boeing.com>
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>, int-area <int-area@ietf.org>
CC: "v6ops@ietf.org" <v6ops@ietf.org>, "6man@ietf.org" <6man@ietf.org>
Thread-Topic: draft-ietf-intarea-tunnels concerns
Thread-Index: AdchXcgc+BNv8UaCSiCbTZn958h4xAAJ6/RgAALUf0AAAJ0JYA==
Date: Thu, 25 Mar 2021 16:33:34 +0000
Message-ID: <186bf7ea6a4943cc8214dacc9bffc5f3@boeing.com>
References: <67a4aeb99dc6464c913516d744aa27bd@huawei.com> <71137841287d4e37a564fc06b15ac54c@boeing.com> <ae907b57fc2e4445a40bac6cd299f8e8@huawei.com>
In-Reply-To: <ae907b57fc2e4445a40bac6cd299f8e8@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [137.137.12.6]
x-tm-snts-smtp: B011EA94848F569BE06A8B4DB7D017698AF5A1F48D71FD213321857A2D02E4342000:8
Content-Type: multipart/alternative; boundary="_000_186bf7ea6a4943cc8214dacc9bffc5f3boeingcom_"
MIME-Version: 1.0
X-TM-AS-GCONF: 00
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/rGaUs-s-w1YL7pMiGYlxh18JfW0>
Subject: Re: [Int-area] draft-ietf-intarea-tunnels concerns
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Mar 2021 16:33:55 -0000

Eduard, I am meaning to represent this as a general purpose solution. Performance
critical routers in the middle of the network will never be asked to reassemble – only
end systems or leaf network routers near the end systems will fragment, and only
end systems or routers near the end systems will need to reassemble.

You are right that OMNI/OAL are not meaning to invalidate all other tunneling
solutions, however they will improve the integrity of other tunneling solutions.
Remember that tunnels over IPv4 that set DF=0 and do not include an integrity
check are open to corruption. OMNI/OAL when used in the presence of those
other tunnel types closes the integrity gap.

Fred

---

Hi Fred,
As I remember, you do not try to invalidate all other tunneling solutions.
draft-ietf-intarea-tunnels is doing exactly this.

IMHO: If some hardware achievement would not give us reassembly almost for free
Then the general solution should not assume reassembly because it is still very expensive for hardware at tunnel end points.
Overlay/Underlay is very popular our days – we would see more and more tunneling. SRv6 is the best example based on RFC 2473.

But it could be fine for your environment because overall performance would not go many Tbps per 1 gateway.
It is still possible to rely on something like Network Processor.
You would do some tradeoff between cost and flexibility. A little more cost for your environment should not be the problem.
Eduard
From: Templin (US), Fred L [mailto:Fred.L.Templin@boeing.com]
Sent: Thursday, March 25, 2021 6:12 PM
To: Vasilenko Eduard <vasilenko.eduard@huawei.com<mailto:vasilenko.eduard@huawei.com>>; int-area <int-area@ietf.org<mailto:int-area@ietf.org>>
Cc: v6ops@ietf.org<mailto:v6ops@ietf.org>; 6man@ietf.org<mailto:6man@ietf.org>
Subject: RE: draft-ietf-intarea-tunnels concerns

Eduard, I did a quick pass through the intarea discussions and I see points raised that
have been repeated many times since Y2K and even since much longer before that.
Thankfully, there is now a solution called the “OMNI Adaptation Layer (OAL)”:

https://datatracker.ietf.org/doc/draft-templin-6man-omni/

Some might say that it is the “second-coming of AAL5”, and it is true there are
many similarities. Like IP over ATM, the OMNI interface has an MTU/MRU visible
to the IP layer and set to 9180 bytes since that is the maximum size that can be
well protected by CRC32. Like AAL5, within the OMNI interface the OAL has a
“cell size” that determines the size of each fragment that will be produced by
the adaptation layer below IP.

Unlike AAL5 where the cell size is fixed at 48 octets, however, the OAL sets
both a minimum cell size (termed “minimum Maximum Payload Size (MPS)”)
and a possibly larger per-path MPS discovered using probes if necessary. The
minimum/path MPS is the maximum-sized RFC2473 fragment that the OAL
can sneak through the path and be assured it won’t be dropped (silently or
otherwise) due to a size restriction. Without any probing, the minimum MPS
that can be assumed is 576 minus encapsulation overhead (i.e., the IPv4
minimum EMTU_R). But unlike AAL5, the OAL can always strive to find a
larger per-path MPS.

There is more to be said about the OAL, but I will leave it at that for now.
We can talk about PTB “hard” and “soft” errors later if there is interest.

Fred