Re: [ippm] Suresh Krishnan's Discuss on draft-ietf-ippm-2330-ipv6-05: (with DISCUSS and COMMENT)

Suresh Krishnan <Suresh@kaloom.com> Tue, 26 June 2018 04:35 UTC

Return-Path: <Suresh@kaloom.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D7020130F62; Mon, 25 Jun 2018 21:35:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.08
X-Spam-Level:
X-Spam-Status: No, score=0.08 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=kaloom.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rRfAMB_p3nDk; Mon, 25 Jun 2018 21:34:57 -0700 (PDT)
Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670106.outbound.protection.outlook.com [40.107.67.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F2FFB130F5F; Mon, 25 Jun 2018 21:34:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kaloom.onmicrosoft.com; s=selector1-kaloom-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yQBfUhYmmgliC1AjyNPKM9sNQ5niRvmTkT9ERBUdbjw=; b=LMpYqmDsuKHDb0nCoZxi9umhs5ql3m9cyxy/LwC/2MajFyQkUoyNFKIPnR0EYMDoR9vuD/DObM5UtP1cxPPHMtkBRzfnfO/yAnzTg6LuhFBrjKVyUqm56qkVb86uU5oj+QpdxCLPtvNkuxv9JbU+MOqWyI1Hf6PGl3ex9dJ+N9o=
Received: from YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM (52.132.77.143) by YQXPR0101MB0982.CANPRD01.PROD.OUTLOOK.COM (52.132.76.159) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.884.20; Tue, 26 Jun 2018 04:34:54 +0000
Received: from YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM ([fe80::4114:6a44:1dad:a17a]) by YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM ([fe80::4114:6a44:1dad:a17a%3]) with mapi id 15.20.0884.024; Tue, 26 Jun 2018 04:34:54 +0000
From: Suresh Krishnan <Suresh@kaloom.com>
To: "MORTON, ALFRED C (AL)" <acm@research.att.com>
CC: "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "n.brownlee@auckland.ac.nz" <n.brownlee@auckland.ac.nz>, The IESG <iesg@ietf.org>, "draft-ietf-ippm-2330-ipv6@ietf.org" <draft-ietf-ippm-2330-ipv6@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: [ippm] Suresh Krishnan's Discuss on draft-ietf-ippm-2330-ipv6-05: (with DISCUSS and COMMENT)
Thread-Index: AQHUCV1z1tfcpxRmFUWHbmnOolALRKRqubhggAAfrwCAAAJrAIAHH4CA
Date: Tue, 26 Jun 2018 04:34:54 +0000
Message-ID: <CF1C78F6-9971-46D4-9FAA-B0BCB448A672@kaloom.com>
References: <152958494006.31485.7887719162606975251.idtracker@ietfa.amsl.com> <4D7F4AD313D3FC43A053B309F97543CF4A92EE6D@njmtexg4.research.att.com> <43CCA228-6735-49AF-B453-5654AC0E7B79@kaloom.com> <4D7F4AD313D3FC43A053B309F97543CF4A92EFEE@njmtexg4.research.att.com>
In-Reply-To: <4D7F4AD313D3FC43A053B309F97543CF4A92EFEE@njmtexg4.research.att.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Suresh@kaloom.com;
x-originating-ip: [45.19.110.76]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; YQXPR0101MB0982; 7:M5Fwy2/yjT/vz+CNKliEWLtIRYe6L2SK3ZnhTClm9SOvSrpFNL2qEYrvg8kuF5+IyGogSlR7MA9kcpre30XT4q1I7LDWxjjky5yvhpiF1BOMIEUBLSVQqnK8wwJOs0iN/vtG1somb06Ra2cm+Lv6uLbt2Col5+xvzR8va7Q4OYPwZ8yHzsfqFUoa9YanymC5AIpe+e+KpnLpDC0G6KK+XEULQ6hngLzDEc/pnRKc0Pia85G0m3lTSsOnYeL7UvHM
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 3447ded2-eafd-492f-2a92-08d5db1e2a0e
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(7021125)(8989117)(4534165)(7022125)(4603075)(4627221)(201702281549075)(8990107)(7048125)(7024125)(7027125)(7028125)(7023125)(5600026)(711020)(2017052603328)(7153060)(7193020); SRVR:YQXPR0101MB0982;
x-ms-traffictypediagnostic: YQXPR0101MB0982:
x-microsoft-antispam-prvs: <YQXPR0101MB098241C413944B6939BC6095B4490@YQXPR0101MB0982.CANPRD01.PROD.OUTLOOK.COM>
x-exchange-antispam-report-test: UriScan:(10436049006162)(192374486261705)(97927398514766);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3002001)(3231254)(944501410)(52105095)(149027)(150027)(6041310)(2016111802025)(20161123562045)(20161123560045)(20161123564045)(20161123558120)(6043046)(6072148)(201708071742011)(7699016); SRVR:YQXPR0101MB0982; BCL:0; PCL:0; RULEID:; SRVR:YQXPR0101MB0982;
x-forefront-prvs: 071518EF63
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39830400003)(136003)(366004)(346002)(396003)(376002)(51914003)(189003)(199004)(2616005)(186003)(80792005)(5250100002)(3846002)(6116002)(66066001)(4326008)(476003)(8676002)(99286004)(229853002)(97736004)(86362001)(25786009)(81166006)(53546011)(6506007)(446003)(256004)(81156014)(14444005)(26005)(8936002)(11346002)(102836004)(72206003)(486006)(7736002)(68736007)(82746002)(5660300001)(83716003)(36756003)(76176011)(6916009)(6246003)(106356001)(105586002)(6436002)(33656002)(2900100001)(93886005)(6306002)(54906003)(54896002)(53936002)(53946003)(966005)(236005)(606006)(316002)(6512007)(478600001)(14454004)(561944003)(6486002)(2906002); DIR:OUT; SFP:1102; SCL:1; SRVR:YQXPR0101MB0982; H:YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: kaloom.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 56Y6o51Kj7WgNybcWG2F3UHhJFPhu9nJ8r/npA4fx0tIQry4AXuTLQBCZtRQ1fsQcU/p9Owh9NOMs8TN3i2FBSY+AquXgcsN7j3LEOt4jgQsOdazST7o+d1xiGJdozJmo3iJs6Z0W6BxHyNZRRaOH6oNuVpT840KLXqIaDLSpm3UReiiIVexgxAwsYZnbSFTb+77KeBZi36ZgXEs3KH9QMB5i3lvjYbzQAZLNK6gIHyrWRtDVBezG++iToiYIckwirztk7Omeu+/oazFR1dbHn5I8wAcVrNMMHpN7o6Ixl37r4gFDRLt9IjtnMK9MyLImvhE4yKRwSwMWNnNReH60UXrXdqGXs46MzUusY0AuDI=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_CF1C78F6997146D49FAAB0BCB448A672kaloomcom_"
MIME-Version: 1.0
X-OriginatorOrg: kaloom.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3447ded2-eafd-492f-2a92-08d5db1e2a0e
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Jun 2018 04:34:54.2895 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 47d58e26-f796-48e8-ac40-1c365c204513
X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQXPR0101MB0982
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/FBDjJF8oGHe2pNecbpQpA2O1ehg>
Subject: Re: [ippm] Suresh Krishnan's Discuss on draft-ietf-ippm-2330-ipv6-05: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jun 2018 04:35:02 -0000

Hi Al,

On Jun 21, 2018, at 12:30 PM, MORTON, ALFRED C (AL) <acm@research.att.com<mailto:acm@research.att.com>> wrote:

Hi Suresh,
Thanks for your reply. We’re getting closer. Let’s keep going…

Excellent.


From: ippm [mailto:ippm-bounces@ietf.org] On Behalf Of Suresh Krishnan
Sent: Thursday, June 21, 2018 11:40 AM
To: MORTON, ALFRED C (AL) <acm@research.att.com<mailto:acm@research.att.com>>
Cc: ippm-chairs@ietf.org<mailto:ippm-chairs@ietf.org>; n.brownlee@auckland.ac.nz<mailto:n.brownlee@auckland.ac.nz>; The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>; draft-ietf-ippm-2330-ipv6@ietf.org<mailto:draft-ietf-ippm-2330-ipv6@ietf.org>; ippm@ietf.org<mailto:ippm@ietf.org>
Subject: Re: [ippm] Suresh Krishnan's Discuss on draft-ietf-ippm-2330-ipv6-05: (with DISCUSS and COMMENT)

Hi Al,
  Thanks for the quick reply. Please find comments inline.


On Jun 21, 2018, at 10:23 AM, MORTON, ALFRED C (AL) <acm@research.att.com<mailto:acm@research.att.com>> wrote:

Hi Suresh,
Thanks for your review.
Please see the discussion below.
We have things to talk about.

Al

...

----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

* Section 4

Since this behavior is clearly forbidden in RFC8200
[acm]
Although much of the IETF community shares your view,
"forbidden" is much too strong a word to describe this
sentence/statement in RFC8200

  Extension headers (except for the Hop-by-Hop Options header) are not
  processed, inserted, or deleted by any node along a packet's delivery
  path, until the packet reaches the node (or each of the set of nodes,
  in the case of multicast) identified in the Destination Address field
  of the IPv6 header.

"are not" would not translate to "forbidden" in any SDO I know.
I understand that some folks proposed to update the wording to 2119
terms, and were found to be in the rough.

Actually, the lack of 2119 language in RFC8200 is completely unrelated to this issue. We, in the IETF, do not require standards track documents to use 2119 language (IMHO, I think this is unfortunate and that we should!).
[acm]
Yes, we heard this position on 2119 terms during the exchange
with 6man folks. IMO, it doesn’t help to take a fringe/exception position
when stating such an important requirement. As I said,
someone reading this “cold” is not going to see a requirement, and
so the IETF’ers have heavy baggage to carry – to explain this to
everyone who gets it wrong. This is one reason we need to be prepared
to detect this in measurement systems (and that’s the relationship,
ambiguous requirement wording will make this error more likely!).

OK. Fair enough.



The reason header insertion was not allowed in RFC8200 was because the proponents of header insertion could not describe how to do header insertion safely on the internet and were not willing to scope the header insertion to private networks. I do not have a religious position on this and I summarized my position in a mail to the 6man list on this issue (https://www.ietf.org/mail-archive/web/ipv6/current/msg27336.html<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mail-2Darchive_web_ipv6_current_msg27336.html&d=DwMFAg&c=LFYZ-o9_HUMeMTSQicvjIg&r=OfsSu8kTIltVyD1oL72cBw&m=c0q9R673pxJFQtApvfYaAgkBdWTLaVGLE0njCE2DVl8&s=Y8OnjtPK9mZSD4B6zvXu932dgzCwYYfIMBwB1PJXwzQ&e=>)..

"I have heard from several persons being concerned about the possibility of new text in 2460bis being blindly used to block header insertion work in the future. I just want to confirm that header insertion work can be considered in the future, and that it should be judged on its own merits and not be blocked solely based on the header insertion related text in 2460bis."

When the ippm work hits the IESG, I (if I am still on it :-)) will hold that work to the same standard. There is some work ongoing (albeit very slowly) in 6man to specify safe header insertion

https://tools.ietf.org/html/draft-voyer-6man-extension-header-insertion-03<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dvoyer-2D6man-2Dextension-2Dheader-2Dinsertion-2D03&d=DwMFAg&c=LFYZ-o9_HUMeMTSQicvjIg&r=OfsSu8kTIltVyD1oL72cBw&m=c0q9R673pxJFQtApvfYaAgkBdWTLaVGLE0njCE2DVl8&s=bHo-N2I44qQUiGNT3deL8lrmvmBLV0hGN_SNBYU4OOo&e=>

and hopefully this work will complete before the in-situ OAM work will hit the IESG. If not, I see encapsulation and tight scoping as the only way forward on this issue.


Would someone outside IETF
reading RFC8200 interpret this sentence as an absolute requirement?
I won't list the many possible interpretations.



there is no need to add a
special case for this (as middleboxes perform any number of
transformations that not standards compliant).
[acm]
Right, but we would want to know those translations happened.
Keep in mind that IPPM is in the measurement business,
and our systems work better if we detect the unexpected.
So, If you are reading the bullet text below as some form of
encouragement to insert/delete headers, it is not.


Given that safe header insertion/deletion is a
hard problem that has not been solved, I would remove this text or
significantly augment it to describe potential issues that may occur due to
header insertion/deletion (similar to the sections related to 6lowpan and
translation).
[acm]
I think we would be glad to cite several references to cover
the potential issues that you provide, but this bullet point has real
value to the measurement community.

Yep. That would be a good way to address this DISCUSS point, because I will clear right away as long as the issues are put forth just like the extensive work you have done in Section 5 for the other *similar* transforms.
[acm]
As I said above, we need some help here. We have already cited:

   The topic of IPv6 Extension Headers brings current controversies into
   focus as noted by [RFC6564<https://tools.ietf.org/html/rfc6564>] and [RFC7045<https://tools.ietf.org/html/rfc7045>].

in the sentences leading to this bullet list. If you (or others)
can provide additional references that describe the issues, then
it’s completely appropriate to include them, IMO. At the same
time, I hope you are not asking that we research and summarize
all discussions on Extension Header Insertion issues in this memo.
That’s well beyond our scope, and would seem to be better positioned
if the issues were cataloged in the Internet Area literature.

Sounds good. I will propose some text here. If that works for you, we can move past this.



* Section 4

I think this text should be removed

  [RFC8250] endorses the use of IPv6 extension headers for measurement
  purposes, consistent with other approved IETF specifications.

as RFC8250 uses a destination option and defining new extension headers has
been explicitly recommended against by section 4.8 of RFC8200.
[acm]
Then how was RFC8250 approved? This RFC was developed in IPPM, too.
We are clearly not on the same page for this topic, and IPPM's
new charter including In-situ OAM may insert more space between us.

RFC8250 defines a new *destination option* and not a new extension header. That is why it was approved :-)
[acm]
So, it seems our terminology needs reconciliation, too.
RFC8250 says
3.1.  Destination Options Header

   The IPv6 Destination Options extension header [RFC8200] is used to
   carry optional information that needs to be examined only by a
   packet's destination node(s).  The Destination Options header is
   identified by a Next Header value of 60 in the immediately preceding
   header and is defined in RFC 8200 [RFC8200].

and goes on to define the PDM DOH.

RFC 8200 (sec 4) says:
   A full implementation of IPv6 includes implementation of the
   following extension headers:

      Hop-by-Hop Options
      Fragment
      Destination Options
      Routing
      Authentication
      Encapsulating Security Payload

What subtlety of RFC8200 are we missing here?

I don’t see any contradiction in RFC8250. It creates an option for use in an existing extension header instead of creating a new extension header. I think the following text change proposal is both accurate and would make the intent clearer.

OLD:

[RFC8250] endorses the use of IPv6 extension headers for measurement
  purposes, consistent with other approved IETF specifications.

NEW:

[RFC8250] endorses the use of IPv6 destination options for measurement
  purposes, consistent with other approved IETF specifications.

Regards
Suresh