Re: [ippm] v6 option types for IOAM data fields

"Frank Brockners (fbrockne)" <fbrockne@cisco.com> Thu, 14 March 2019 18:49 UTC

Return-Path: <fbrockne@cisco.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB2F11310A2; Thu, 14 Mar 2019 11:49:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.502
X-Spam-Level:
X-Spam-Status: No, score=-14.502 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Uyc29vZ6; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=M+3DFDho
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hWA5VwFSMtv2; Thu, 14 Mar 2019 11:49:12 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8E48130F43; Thu, 14 Mar 2019 11:49:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=38156; q=dns/txt; s=iport; t=1552589351; x=1553798951; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=hE9p+zlFET0PupNoicYVOO+HKurQIHFCDvYyyaRkH2k=; b=Uyc29vZ6xtHLqHyZBJIDHAqKwzsYN62vap3BDYFMqgN6eCuUL2NnCGQ3 J3XDmvB4pGQY/SjpE8bcv1XRA0y2+bBqeuMzj7hogosdUgSNziz3H52T+ WF6g2M46S5pRybcm6i+o0D+foaSqnCfgQoLnCW4Pj3PMGx6JMAJvcY/s8 U=;
IronPort-PHdr: 9a23:0Zn86BVTkR4IB5m5pU02CCXHKRnV8LGuZFwc94YnhrRSc6+q45XlOgnF6O5wiEPSA9yJ8OpK3uzRta2oGXcN55qMqjgjSNRNTFdE7KdehAk8GIiAAEz/IuTtank0Ft5FX1xj8lmwMFNeH4D1YFiB6nA=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AGAABzoYpc/4cNJK1aChoBAQEBAQIBAQEBBwIBAQEBgVEFAQEBAQsBgTwpJwNoTCgECyeEC4NHA4RSiliCV3yINY1RgS4UgRADVAsBARgNB4RAAheEOSI0CQ0BAQMBAQkBAwJtHAyFSgEBAQMBAQEYCREMAQEFAh4HCwEEBwQCAQgRBAEBAQICJgICAh8GCxUICAIEDgUIDAeDCIFdAw0IAQ6iUQKKFHGBL4J4AQEFLYEEAQMCAg8YgysNC4IMCIELJAGJeIE0F4FAP4ERRoIXNYJXIiUBAQOBKgkEDxoKC4JzMYImihIICi4DggCGDpEBKjUJAodWiAiDWJNMkHKBMotDAgQCBAUCDgEBBYFHOIFWcBU7gmwJggEMF4EAAQKCSIRZO4U/coEojFKCTQEB
X-IronPort-AV: E=Sophos;i="5.58,479,1544486400"; d="scan'208";a="450635781"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Mar 2019 18:49:09 +0000
Received: from XCH-RCD-007.cisco.com (xch-rcd-007.cisco.com [173.37.102.17]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id x2EIn964007357 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 14 Mar 2019 18:49:09 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-RCD-007.cisco.com (173.37.102.17) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 14 Mar 2019 13:49:08 -0500
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 14 Mar 2019 13:49:07 -0500
Received: from NAM05-DM3-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 14 Mar 2019 14:49:07 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hE9p+zlFET0PupNoicYVOO+HKurQIHFCDvYyyaRkH2k=; b=M+3DFDhoTDUn/9pVLL7bawZlg8mNQUrOrCCyLaZUbvISDLUl90JE8ziH36CgVKJQL7CtxZX7gGGC8VuiycvQs06xsGoJUXb+mX4lPrB+eL+SjSkQKfmhc1T+1JFkXReEmjAsoko62Bfx5fLKfaX4xr/0A6+O5dTGwbJ+dTxJMF8=
Received: from CY4PR11MB1335.namprd11.prod.outlook.com (10.169.252.143) by CY4PR11MB0071.namprd11.prod.outlook.com (10.171.254.160) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1686.20; Thu, 14 Mar 2019 18:49:05 +0000
Received: from CY4PR11MB1335.namprd11.prod.outlook.com ([fe80::1b2:a8de:1872:456c]) by CY4PR11MB1335.namprd11.prod.outlook.com ([fe80::1b2:a8de:1872:456c%4]) with mapi id 15.20.1686.021; Thu, 14 Mar 2019 18:49:05 +0000
From: "Frank Brockners (fbrockne)" <fbrockne@cisco.com>
To: Tom Herbert <tom@herbertland.com>
CC: Mark Smith <markzzzsmith@gmail.com>, "C. M. Heard" <heard@pobox.com>, 6man WG <ipv6@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: v6 option types for IOAM data fields
Thread-Index: AQHUb5iXbX4MUs3YyEqKVf0LZIK86aU2jG5ggACUzgCADm05gIAApqGAgAWuMPCADhUDAICwmQMQgAAJCICAAQuUMIAAXyOAgABIg0A=
Date: Thu, 14 Mar 2019 18:49:05 +0000
Message-ID: <CY4PR11MB1335CFF059A717632CBE36B1DA4B0@CY4PR11MB1335.namprd11.prod.outlook.com>
References: <CACL_3VGxyn-PYosFsKPVdd8C=P5AbE6HD1zrimHKuh2MPkhnuQ@mail.gmail.com> <505272eac2dd44fa891d4d36d14da9af@XCH-RCD-008.cisco.com> <CAO42Z2wGMzc_RT=eWTx9Ve-5reS0nCWiteGOuE16=MB4Fg8mkg@mail.gmail.com> <f50040ab52d04867b9a5cefa1c3131c3@XCH-RCD-008.cisco.com> <CAO42Z2zgguekybwVuCh8Az3mK8gHp292BYnWYhJq-8KEyfKzOA@mail.gmail.com> <7ea9049fe6f44a40aefe4801bd796322@XCH-RCD-008.cisco.com> <CAO42Z2y5TS1+8YxNsr=BKz5v8-ZPTiO-M7CU2k6FzNqVZoU4VA@mail.gmail.com> <CY4PR11MB1335960AD9BF9A4B990F7E10DA4A0@CY4PR11MB1335.namprd11.prod.outlook.com> <CALx6S36=Wm5hJpJQVAOy_gUz_4knf_e5YC9e34H=Q_r8hmb4Pg@mail.gmail.com> <CY4PR11MB1335095AB0E4EA822BE8C032DA4B0@CY4PR11MB1335.namprd11.prod.outlook.com> <CALx6S34DpGnvDqYg9NgJFh0ROUp54JuaRA-4GY2Y=LofZsBMiQ@mail.gmail.com>
In-Reply-To: <CALx6S34DpGnvDqYg9NgJFh0ROUp54JuaRA-4GY2Y=LofZsBMiQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=fbrockne@cisco.com;
x-originating-ip: [2001:420:c0c0:1005::86]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d35211e6-5a20-4338-3336-08d6a8adbc2b
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:CY4PR11MB0071;
x-ms-traffictypediagnostic: CY4PR11MB0071:
x-ms-exchange-purlcount: 5
x-microsoft-exchange-diagnostics: 1;CY4PR11MB0071;23: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
x-microsoft-antispam-prvs: <CY4PR11MB007152C2A68A979B481773C7DA4B0@CY4PR11MB0071.namprd11.prod.outlook.com>
x-forefront-prvs: 09760A0505
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(376002)(39860400002)(366004)(346002)(136003)(13464003)(189003)(199004)(51914003)(99286004)(966005)(229853002)(6246003)(46003)(66574012)(9686003)(68736007)(105586002)(93886005)(30864003)(106356001)(316002)(476003)(11346002)(6306002)(446003)(4326008)(6916009)(486006)(7736002)(54906003)(2906002)(71190400001)(71200400001)(55016002)(7696005)(6116002)(5660300002)(81166006)(6436002)(305945005)(102836004)(76176011)(186003)(14454004)(15974865002)(478600001)(53936002)(86362001)(33656002)(8936002)(256004)(53946003)(6506007)(97736004)(53546011)(14444005)(81156014)(74316002)(8676002)(25786009)(52536014)(290074003)(559001)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR11MB0071; H:CY4PR11MB1335.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 0OohaaAxPiFdzAhgwNHXZw8nvEQVROYk9nEEVXZW8iL+VEXb2dDrYjIARO6rQ+PbDW9J58b/Ztn5TVQGgDWIAvleuiq0GaYIuGIH/fGPAZIUKXKzTFGATON9aQvpAsw7r9xLqDbLjQXYoobSLwM/NVJOxWcT+lg1fg01Zgl9kGCaJRwE5zcR9dTLQEK4RMMTfi5pjngQGAsRZEfUqTPiJZ6aZdu1pmRp5nQ6Y8/TBiiHkKu1kUuM5E3ZPlXGPIt/Sl+bgxVj+SjCF9EtkZ30LzbRrxWiBgoPHeiHEXiY6OP3knq9tEhMntl+iq+XwrVKPSU5GIxW8kP6x+hz7PtI8m1ta4rFGupg3tBtN+NZEdbQJQtc9kqcbvg+e6HgAwxE1CScZKwgPk3Wt69mxPv+qfsR8cFM1kQyOCoc7cUyxWk=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: d35211e6-5a20-4338-3336-08d6a8adbc2b
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Mar 2019 18:49:05.7658 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR11MB0071
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.17, xch-rcd-007.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/-ZGYOo-con741N3qrV8S_f_3H00>
Subject: Re: [ippm] v6 option types for IOAM data fields
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Mar 2019 18:49:17 -0000

Hi Tom,

Thanks. Got it. We can add a paragraph with considerations in case IOAM is deployed with a routing header present. 
Will send out some proposed text once I'm back in the office.

Thanks, Frank

-----Original Message-----
From: Tom Herbert <tom@herbertland.com> 
Sent: Donnerstag, 14. März 2019 15:28
To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
Cc: Mark Smith <markzzzsmith@gmail.com>; C. M. Heard <heard@pobox.com>; 6man WG <ipv6@ietf.org>; ippm@ietf.org
Subject: Re: v6 option types for IOAM data fields

On Thu, Mar 14, 2019 at 1:55 AM Frank Brockners (fbrockne) <fbrockne@cisco.com> wrote:
>
>
>
> -----Original Message-----
> From: Tom Herbert <tom@herbertland.com>
> Sent: Mittwoch, 13. März 2019 17:50
> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> Cc: Mark Smith <markzzzsmith@gmail.com>; C. M. Heard 
> <heard@pobox.com>; 6man WG <ipv6@ietf.org>; ippm@ietf.org
> Subject: Re: v6 option types for IOAM data fields
>
> On Wed, Mar 13, 2019 at 9:24 AM Frank Brockners (fbrockne) <fbrockne@cisco.com> wrote:
> >
> > With the upcoming meeting in Prague, I wanted to come back to this discussion:
> >
> > We've just recently posted a new draft (draft-ioametal-ippm-6man-ioam-ipv6-deployment-00) - which summarizes a set of deployment considerations for IOAM with IPv6, i.e. complementing 6man draft-ioametal-ippm-6man-ioam-ipv6-options-01. draft-ioametal-ippm-6man-ioam-ipv6-deployment-00 also includes the deployment scenario that Mark detailed below.
> >
> > Appreciate your thoughts - especially from 6man to provide for proper guidance to IPPM.
>
> Hi Frank,
>
> You might want to consider the interaction of IOAM with segment routing. For instance, and IOAM destination option could appear before the routing header to be processed at each segment. In this case, the option can be modified by intermediate destinations.
>
> Tom
>
> Hi Tom,
>
> this is an interesting aspect - potentially - pending the decision whether SR will have TLVs in the SRH or whether destination options are going to be used. Would it make sense to wait for a conclusion from the WG on this topic first? From an IOAM perspective, a destination option header carrying IOAM E2E options should only be interpreted by the IOAM encapsulating and IOAM decapsulating nodes and be left untouched by intermediate devices.
>
Hi Frank,

I was more thinking someone might want to use the Pre-allocated Trace Option in conjunction with the routing header. This allows the user to get IOAM from precisely the intermediate destinations of interest.

I don't think there's any need to wait on Segement Routing. IOAM needs to be general to work with SR, other routing headers, or without routing header. Putting it in DO or HBH options is sufficient for all those cases.

Tom

> Thanks, Frank
>
> >
> > Thanks, Frank
> >
> >
> > -----Original Message-----
> > From: Mark Smith <markzzzsmith@gmail.com>
> > Sent: Mittwoch, 21. November 2018 02:28
> > To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> > Cc: C. M. Heard <heard@pobox.com>; 6man WG <ipv6@ietf.org>; 
> > ippm@ietf.org
> > Subject: Re: v6 option types for IOAM data fields
> >
> > Hi Frank,
> >
> > Sorry not to get back to you sooner.
> >
> >
> > On Mon, 12 Nov 2018 at 19:40, Frank Brockners (fbrockne) <fbrockne@cisco.com> wrote:
> > >
> > > Hi Mark,
> > >
> > > thanks for the details. On your suggested solution for v6-in-v6: Let's assume a setup with source and destination host addresses (SA, DA), as well as an IOAM domain which has domain Edge-routers E(i). If I understand your suggestion correctly, then the ingress edge router with source address E-SA would have /128 routes to all other domain Edge-routers E-DA(i).
> >
> > Close, but not quite.
> >
> > Rather than having a /128 per Edge-router, you would have a domain internal /128 per non-IOAM prefix announced by each Edge-edge router, 1:1. You do this so that you can have the same IGP metric for the domain internal /128 for each of the corresponding non-IOAM prefixes.
> > That then means that the IOAM tunnelled packet should then follow the same path through the IOAM domain as the packet if it wasn't IOAM tunnelled.
> >
> > e.g. IOAM Router A has the following global prefixes configured on its interfaces, with the following IGP metrics:
> >
> > intf A: 2001:db8:0:1234::/64, metric 10
> >
> > intf B: 2001:db8:0:2345::/64, metric 40
> >
> > intf C: 2001:db8:0:4567::/64, metric 100 intf C: 
> > 2001:db8:0:abcd::/64, metric 150
> >
> > intf D: 2001:db8:0:4321::/64, metric 10
> >
> > Note that intf C has been configured with two different prefixes with different metrics.
> >
> >
> > When these prefixes are configured on the interfaces, IOAM Router A would also automatically generate and announce into the IGP (or BGP with No Export community) matching IOAM internal /128s for each of them, using a ULA or other internal scope prefix (perhaps a special IANA reserved one for this IOAM purpose so routers could be factory configured with it) - I'll use fd04:3f29:de90::/48 for this example.
> >
> > The corresponding example IOAM /128s  for IOAM Router A's interfaces would (could) be:
> >
> > intf A: fd04:3f29:de90::1234/128, metric 10
> >
> > intf B: fd04:3f29:de90::2345/128, metric 40
> >
> > intf C: fd04:3f29:de90::4567/128, metric 100 intf C:
> > fd04:3f29:de90::abcd/128, metric 150
> >
> > intf D: fd04:3f29:de90::4321/128, metric 10
> >
> > (There may be better schemes to generate the matching global 
> > /64:IOAM
> > /128 prefixes, its probably useful to encode some unique part of the 
> > global prefix in the corresponding /128.)
> >
> >
> > So when a packet enters the IOAM domain at IOAM Router Z, with a 
> > destination address that falls within 2001:db8:0:1234::/64 (IOAM 
> > Router A's intf A: prefix), the outer tunnel header's DA would be 
> > the corresponding fd04:3f29:de90::1234/128 (IOAM Router A's intf A: 
> > OAM
> > /128 prefix). This post-tunnel packet should follow the same path 
> > through the IOAM domain that a packet destined towards
> > 2001:db8:0:1234::/64 should, from IOAM Router Z to IOAM Router A, because 2001:db8:0:1234::/64 and fd04:3f29:de90::1234/128 prefixes have both the same origin router and the same path metrics.
> >
> > If another packet enters the IOAM domain at IOAM Router Z, with a 
> > destination address that falls within 2001:db8:0:4567::/64 (IOAM 
> > Router A intf C's second prefix), then the outer packet tunnel DA 
> > would be the corresponding fd04:3f29:de90::4567/128 ((IOAM Router A 
> > intf C's second and matching IOAM /128 prefix). As the metric for
> > 2001:db8:0:4567::/64 / fd04:3f29:de90::4567/128 on IOAM Router A is 100, the path through the IOAM domain between IOAM Router Z and IOAM Router A for this packet (IOAM tunnel/tagged or not) could be different to the one taken in the previous example.
> >
> > For completeness, for different IOAM Router Y, with a destination address that falls within 2001:db8:0:abcd::/64 (IOAM Router A intf C's second prefix), then the outer packet tunnel DA would be the corresponding fd04:3f29:de90::abcd/128 ((IOAM Router A intf C's second and matching IOAM /128 prefix).
> >
> >
> > > For v6-in-v6, the ingress edge router would use its own source address as the source address of the encapsulated packet, and it would use E-DA(j) as the destination address, where E-DA(j) is the address that points to the same outgoing link as the original (now inner) DA.
> > > Now the question: Why would this choice of E-DA(j) ensure that the encapsulated packet leaves the IOAM domain at the same egress router, as would a packet without the extra v6 header? Or in other terms, why would the encapsulated packet be forwarded the same way as a non-encapsulated packet in the IOAM domain?
> > >
> >
> > Hopefully the above example answers that. There are automatically generated IOAM tunnel end-point /128s per individual non-IOAM prefix, rather than per IOAM router, and as the IOAM /128s are per non-IOAM prefix, they can have and carry per prefix specific metric information that matches the corresponding non-IOAM prefix.
> >
> > This would the size of the IGP's route table, as there is now a matching IOAM /128 for each non-IOAM prefix. However, there is an optimisation opportunity. If two different non-IOAM prefixes have the same metric at the origin IOAM router (as intf A:
> > 2001:db8:0:1234::/64, metric 10, and intf D: fd04:3f29:de90::4321/128, metric 10 do above on IOAM Router A), then a per-router IOAM /128 could be used instead, suppressing the generation of 1:1 per-prefix IOAM /128s when origin prefix metrics are the same.
> >
> >
> >
> > Regards,
> > Mark.
> >
> >
> > > Many thanks, Frank
> > >
> > > -----Original Message-----
> > > From: Mark Smith <markzzzsmith@gmail.com>
> > > Sent: Donnerstag, 8. November 2018 12:40
> > > To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> > > Cc: C. M. Heard <heard@pobox.com>; 6man WG <ipv6@ietf.org>; 
> > > ippm@ietf.org
> > > Subject: Re: v6 option types for IOAM data fields
> > >
> > > Hi Frank,
> > >
> > > On Thu, 8 Nov 2018 at 19:36, Frank Brockners (fbrockne) <fbrockne@cisco.com> wrote:
> > > >
> > > > Hi Mark, Mike,
> > > >
> > > >
> > > >
> > > > thanks for summarizing the concerns around leaked packets – and outlining an approach to mitigate those. There are a couple of other challenges we face. Unfortunately we did not get to a discussion in the 6man WG meeting this time due to the limited time we had. The meeting slides https://datatracker.ietf.org/meeting/103/materials/slides-103-6man-in-situ-oam-ipv6-options-00 provide a summary of concerns.
> > > >
> > > >
> > > >
> > > > In a nutshell:
> > > >
> > > > 1.       Potential HbH ext header and IOAM option insertion and removal by transit nodes (i.e. “en route”) in a restricted administrative domain.
> > > >
> > > > a)       How do you deal with PMTU? – Packet size changes might exceed PMTU.
> > > >
> > > > b)      Misleading ICMP errors confusing the source
> > > >
> > > > c)       Possible leaks that affect the forwarding behavior and state of network elements outside the domain.
> > > >
> > >
> > > Yes, all of the above, good summary.
> > >
> > > An additional one is that if you were are receiver of this outside of the domain because it as leaked, at the destination, after the packet as traversed a number of ASes over the Internet, there is nothing to identify the device/AS that inserted the EH. Very time consuming to troubleshoot who inserted the EH but didn't remove it (you have to walk the AS path, contacting each operator, asking them to verify their config, get packet captures etc.), and all the while you may have a number of angry customers/end-users.
> > >
> > > > 2.       Incremental Trace IOAM HbH Option – which is to support a hardware-friendly implementation: Changes Option Data Len en-route.
> > > >
> > > > a)       Dealing with PMTU– Packet size changes can exceed PMTU; see above
> > > >
> > > > 3.       Clarify applicability statement and scope
> > > >
> > > >
> > > >
> > > > While 3. is something that is in the works, there are no easy answers to 1. and 2. Considerations:
> > > >
> > > >
> > > >
> > > > On 1. Supporting HbH ext header and option insertion/removal in 
> > > > transit. A couple of solution approaches…
> > > >
> > > > 1.       Fix PMTU and offset for packet size change in PMTU discovery - https://tools.ietf.org/html/draft-troan-6man-pmtu-solution-space-00
> > > > Hope that we can make progress towards a solution tomorrow…
> > > >
> > > > 2.       IP-in-IP with IOAM extension header in the *inner* packet.
> > > > New IPv6 packet is created with encapsulating node as source and 
> > > > the original destination as the destination (this is slightly different than what you, Mark, suggest – because we’d like to keep the forwarding path the same. Tunneling with ULA would not get us there; the slides above have a diagram that depicts the potential encap):
> > > >
> > > > a)       Payload of this packet is the original IPv6 packet along with an extension header inserted inside.
> > > >
> > > > b)      The original packet is restored by removing the outer IPv6 header and the inner extension header by a node at the domain boundary.
> > > >
> > > > c)       Caveats:
> > > >
> > > >                                                                i.      Modified packet may still leak – but will only confuse the destination node. The dest node will likely send an ICMP back to the encap node, which gets the encap node an understanding that something is going wrong.
> > > >
> > >
> > > This is certainly better, because the source address identifies the device that inserted the EH of the packet that leaked to where ever it leaked to.
> > >
> > > What the source address should be is an interesting question.
> > >
> > > If it is a global/public source address, then anybody who receives the packet leaked with the EH can identify who inserted it and therefore who didn't remove it.
> > >
> > > OTOH, if it is a private/local ULA Source Address, then BCP38 source address filters would cause the invalid leaked packet to be dropped sooner, rather than being forwarded onto the final destination. Total packet loss of OAM encapsulated packets would make the failure obvious to the OAM domain operator. Slight drawback is BCP38 filters haven't been universally implemented across the Internet.
> > >
> > > I think I like the latter better because commonly it would localise the symptoms of the failure to remove the EH to the domain that inserted it, rather than having to have an external party get involved in troubleshooting.
> > >
> > >
> > >
> > > >                                                              ii.      ECMP computation needs to be reworked.
> > > >
> > > >                                                            iii.      Complex/costly implementation in HW & SW – IOAM-capable nodes need to hunt for the IOAM data fields in the inner packet.
> > > >
> > >
> > > Yes, the implementation complexity of insertion is another concern - encapsulation is the most common and simplest cross layer forwarding function performed and there's decades of history in optimising it.
> > >
> > > The root cause of both the possible leak and the risk that the inserted EH will reach the final packet destination is that the Dest.
> > > Addr. of the packet with the inserted EH is both valid outside of the domain, and valid all the way across the Internet to the final and actual original packet destination. That creates a "default permit" if a packet leaks with the inserted EH rather than a far better "default deny" in this failure situation.
> > >
> > > In this OAM case, it seems to me the ideal and the requirements would be:
> > >
> > > - have the packet with the added OAM information follow the same 
> > > path within the domain that the same packet without the OAM 
> > > information would follow within the domain
> > >
> > > - have the Dest. Addr. of the packet with the added OAM information only be valid within the OAM domain i.e. an "interior DA", so that if through failure the packet leaks, it isn't a valid DA on the Internet and will be dropped by, if nothing else earlier, an Internet router with a default free route table.
> > >
> > > - encapsulate rather than insert, because encapsulation would be simpler, and is the traditional way of adding information to PDUs across many decades and many protocols (I can only think of VLAN ID insertion as the only existing counter example, and according to Radia Perlman in her book, that is only because at the time they weren't sure if all NICs commonly available could successfully encapsulate a full sized ethernet frame inside another one).
> > >
> > > In other words, preserve the original IPv6 packet, add an OAM header in front of it, then encapsulate it in another header to forward within and across the OAM domain.
> > >
> > > Bog standard IGP/LDP MPLS could achieve those requirements, with the OAM header inserted after the final MPLS tag and before the IPv6 header. The MPLS/OAM/IPv6 packet follows an LSP across the domain that matches the path that the IPv6 packet without MPLS would follow across the domain. In that scenario, the MPLS LSP across the domain is the "interior DA" that isn't valid outside of the OAM domain, because MPLS wouldn't (normally) be valid outside of the OAM domain (i.e. OAM domain is MPLS domain 1:1). If MPLS fails to be removed at the OAM domain egress edge, the packet is dropped immediately, so a fail safe, localised to the OAM domain.
> > >
> > > For an IPv6-in-IPv6 scenario:
> > >
> > > - for each OAM domain interior IPv6 routes/prefixes used by hosts (i.e. hosts have addresses from these prefixes), automatically create a matching interior OAM route/prefix (maybe just a /128), 1:1, with the interior OAM route/prefix originated by the same router(s) where the interior IPv6 routes/prefixes are created/originated. The interior OAM routes come from ULA space or perhaps a new designated and reserved private/local OAM address space for this purpose.
> > >
> > > When a end host originated packet ingresses the OAM domain edge, the DA address of the packet is looked up to find the 1:1 matching internal OAM route/prefix/address. This internal OAM route/prefix/address is used as the DA for the outer IPv6 header, outer header SA is the OAM address of the OAM ingress device, an OAM header follows, and then the original, inner IPv6 packet follows without modification.
> > >
> > > As the OAM route/prefix/address is originated at the same place as the OAM domain interior IPv6 route/prefix, the path the now IPv6-in-IPv6 packet follows through the OAM domain should be the same as that which the original, now inner packet would have followed with its DA. In a sense this OAM route/prefix/address is an internal routeable index or proxy for the inner packet destination prefix.
> > >
> > > - for exterior routes, IPv6-in-IPv6 tunnelling too between BGP 
> > > border routers per RFC1772, "A.2.3 Encapsulation", with the 
> > > addition of the OAM header between the new outer IPv6 header and 
> > > the inner original
> > > IPv6 packet, and OAM local addresses for the tunnel end points. This avoids having to create 1:1 matching internal OAM route/prefix/address for each exterior route.
> > >
> > > (And perhaps a somewhat radical idea for reducing tunnelling overhead.
> > > All of this tunnelling stuff already exists for IPv4; and it is 
> > > sunk cost. Would there be much harm in using IPv4 as the interior 
> > > outer tunnelling protocol for this IPv6 traffic with the added OAM 
> > > information? I'd much rather keep running an IPv4 OAM island to 
> > > carry
> > > IPv6 than any splitting apart of IPv6 packets to insert EHs in 
> > > them
> > > ...)
> > >
> > > > 3.       No support of IOAM in transit network. Support only source initiated IOAM tracing, proof of transit..
> > > > Caveat: Limits usage of IOAM significantly.
> > > >
> > > >
> > > > On 2. Incremental Trace IOAM HbH Option
> > > >
> > > > 1.       Use PMTU to determine max possible Incremental Trace IOAM Option length
> > > >
> > > > 2.       Do not support Incremental Trace IOAM Option in IPv6.
> > > >
> > > >
> > >
> > > Could what I've suggested above solve those? I think the use of tunnelling/encapsulation supports a transit OAM scenario.
> > >
> > > Regards,
> > > Mark.
> > >
> > >
> > > >
> > > > While there isn’t an easy answer, IMHO we should still try to find a workable and implementable solution. I sometimes compare the situation with the road network: What we have today is a network of gravel roads (Internet with often poor ext header processing) and cars are built to cope with gravel roads. Now faster and comfy cars become available, though they only work on tared/concrete roads (specific administrative domains). If you try to drive these new cars on gravel roads they break and the wrecks jam the roads…, still we probably want to allow folks to buy and use the fast & comfy cars, because they will also push for better roads  as well (do proper ext header processing).
> > > >
> > > >
> > > >
> > > > Thoughts?
> > > >
> > > >
> > > >
> > > > Thanks, Frank
> > > >
> > > >
> > > >
> > > >
> > > >
> > > > From: Mark Smith <markzzzsmith@gmail.com>
> > > > Sent: Dienstag, 30. Oktober 2018 05:26
> > > > To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> > > > Cc: C. M. Heard <heard@pobox.com>; 6man WG <ipv6@ietf.org>; 
> > > > ippm@ietf.org
> > > > Subject: Re: v6 option types for IOAM data fields
> > > >
> > > >
> > > >
> > > >
> > > > Hi Frank,
> > > >
> > > >
> > > >
> > > > On Tue., 30 Oct. 2018, 05:36 Frank Brockners (fbrockne), <fbrockne@cisco.com> wrote:
> > > >
> > > > Thanks Mike. On the scope of an IOAM deployment:
> > > > draft-ietf-ippm-ioam-data-04 clarifies in section 3 that IOAM is a domain focused feature, i.e. not expected to be deployed on the open Internet.
> > > >
> > > >
> > > >
> > > > That still violates RFC 8200, there are no exceptions for "closed" domains.
> > > >
> > > >
> > > >
> > > > From section 3:
> > > >
> > > >
> > > >
> > > > "Designers of
> > > >
> > > >    carrier protocols for IOAM must specify mechanisms to ensure 
> > > > that
> > > >
> > > >    IOAM data stays within an IOAM domain.  In addition, the 
> > > > operator of
> > > >
> > > >    such a domain is expected to put provisions in place to 
> > > > ensure that
> > > >
> > > >    IOAM data does not leak beyond the edge of an IOAM domain, e.g.
> > > > using
> > > >
> > > >    for example packet filtering methods."
> > > >
> > > >
> > > >
> > > > Neither the designers or the operators can ensure this IOAM information won't leak.
> > > >
> > > >
> > > >
> > > > Possible reasons it can leak:
> > > >
> > > >
> > > >
> > > > - operator configuration error - e.g. forgetting to configure the domain boundary (e.g. router with multiple domain exit interfaces, forgetting to add that option on one of them), or misconfiguring it.
> > > >
> > > >
> > > >
> > > > - partial device failure - the device still forwards packets, 
> > > > but ceases to remove this information due to a hardware fault 
> > > > that has appeared
> > > >
> > > >
> > > >
> > > > - vendor implementation bugs that fails to remove the information.
> > > >
> > > >
> > > >
> > > > Any or all of these can occur, and as it is on egress, the consequences may not be visible to the domain network operator, because network operators rarely inspect packets after they've left their network. Once a packet is sent onto somebody else, it is assumed to have been sent without faults.
> > > >
> > > >
> > > >
> > > > There are many instances of leaks at the boundary of what are 
> > > > supposed to be closed domains, such as packets containing 
> > > > RFC1918 private addresses (in packet headers themselves, or in 
> > > > DNS packets
> > > > - such a big problem that www.as112.net was created), and route leaks e.g.
> > > > https://bgpmon.net/how-the-internet-in-australia-went-down-under
> > > > /
> > > >
> > > >
> > > >
> > > > As operators usually have only one device at the edge of the domain, that would be performing the domain boundary function, that device becomes a single point of failure. Enforcement is therefore quite fragile. A domain boundary enforced by two domain edge devices in-line would increase robustness, however I'd think that would be rarely deployed, because we haven't seen that commonly with IPv4 NAT.
> > > >
> > > >
> > > >
> > > > The only way for an operator to ensure these leaks don't and never occur is for the domain to literally not be physically connected to the Internet i.e. the domain is air gapped from the Internet. If there is a link between the domain and the Internet that can carry IP packets, then there is always a possibility that information can leak from the domain.
> > > >
> > > >
> > > >
> > > > So accepting that leaks can always occur, a far more robust option is to leave the original packet alone entirely, and encapsulate it in a domain local IPv6 header (i.e RFC2473, section 3.1) with domain local limited addresses (i.e. ULA addresses) and the additional EH.
> > > >
> > > >
> > > >
> > > > That still doesn't ensure that packet won't leak outside the domain, because those packets will follow a default route, however as the packet's addressing is invalid outside of the domain, that packet will be dropped once it reaches either an invalid Internet address filter, or a default free Internet router. The packet with the failed-to-be-removed outer ULA IPv6 header will never reach the destination address of the inner packet, because the DA of the inner packet is in the ULA IPv6 packet's payload.
> > > >
> > > >
> > > >
> > > > Failure of the mechanism would be much more obvious, localised to the domain implementing the mechanism (rather than being externalised to somebody else's domain/network), and absolute, because the failure mode is packets being entirely discarded.
> > > >
> > > >
> > > >
> > > > Regards,
> > > >
> > > > Mark.
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >
> > > > Frank
> > > >
> > > > -----Original Message-----
> > > > From: C. M. Heard <heard@pobox.com>
> > > > Sent: Montag, 29. Oktober 2018 16:03
> > > > To: 6man <ipv6@ietf.org>; IPPM <ippm@ietf.org>
> > > > Cc: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> > > > Subject: Re: v6 option types for IOAM data fields
> > > >
> > > > On Thu, 25 Oct 2018 15:06:57 +0000 Frank Brockners (fbrockne) wrote:
> > > > > Quick heads up: In the 6MAN meeting in BKK, we’ll review
> > > > > draft-ioametal-ippm-6man-ioam-ipv6-options-01 – which requests 
> > > > > 2 option types from the DO/HbyH options sub-registry.
> > > > >
> > > > > While the bulk of the IOAM work is progressed in the IPPM WG, 
> > > > > we’d greatly appreciate your feedback on 
> > > > > draft-ioametal-ippm-6man-ioam-ipv6-options-01,
> > > > > which defines how IOAM data fields are carried using v6 extension headers.
> > > > > Cc’ing the IPPM WG as well, to keep everyone on the same page.
> > > >
> > > > I have two brief comments on this work.
> > > >
> > > > First, I see that the Incremental Tracing Option changes length in transit.
> > > > It is not appropriate for it to be carried in an IPv6 option intended for use on the open Internet, for exactly the same reason that insertion of extension headers by intermediate nodes is not allowed on the open Internet.
> > > >
> > > > Second, I see that two IPv6 option code points are requested, one with the "chg" flag set, the other with the "chg" flag clear. While there is no harm in this, it is not strictly necessary; the only real purpose of this flag is to determine whether the option data is or is not included in the Authentication Header Integrity Check Value computation.
> > > >
> > > > Mike Heard
> > > > ----------------------------------------------------------------
> > > > --
> > > > -- IETF IPv6 working group mailing list ipv6@ietf.org 
> > > > Administrative
> > > > Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > > > ----------------------------------------------------------------
> > > > --
> > > > --
> > --------------------------------------------------------------------
> > IETF IPv6 working group mailing list ipv6@ietf.org Administrative 
> > Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > --------------------------------------------------------------------