Re: [ippm] Suresh Krishnan's Discuss on draft-ietf-ippm-2330-ipv6-05: (with DISCUSS and COMMENT)

Suresh Krishnan <Suresh@kaloom.com> Thu, 21 June 2018 15:39 UTC

Return-Path: <Suresh@kaloom.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DCFB8130EE3; Thu, 21 Jun 2018 08:39:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=kaloom.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RbIwmrb9V372; Thu, 21 Jun 2018 08:39:43 -0700 (PDT)
Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670134.outbound.protection.outlook.com [40.107.67.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A0A1130DF3; Thu, 21 Jun 2018 08:39:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kaloom.onmicrosoft.com; s=selector1-kaloom-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=LTZXtvhPUgk4UgVafa7NhrwOZvcnhMTWY/ZWmFdgY70=; b=ssrzhPttpi0WZAvzZ7BuuAKWj7jbqZaAeEVIc4DrQK2/GwPn+1bizfmfyicl3Q7YbxY7A0b7i1fOI0A6fZWpPm2Qj3M8eeryVIuuI4n9rc9y3t/eDEw3idn4tEuC6xZUZEodRFMLmw4IfXNkBu0Ve40TNRMmql9u7wgwGQ+WeiM=
Received: from YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM (52.132.77.143) by YQXPR0101MB1285.CANPRD01.PROD.OUTLOOK.COM (52.132.80.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.863.19; Thu, 21 Jun 2018 15:39:40 +0000
Received: from YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM ([fe80::4114:6a44:1dad:a17a]) by YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM ([fe80::4114:6a44:1dad:a17a%3]) with mapi id 15.20.0884.010; Thu, 21 Jun 2018 15:39:40 +0000
From: Suresh Krishnan <Suresh@kaloom.com>
To: "MORTON, ALFRED C (AL)" <acm@research.att.com>
CC: The IESG <iesg@ietf.org>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "n.brownlee@auckland.ac.nz" <n.brownlee@auckland.ac.nz>, "draft-ietf-ippm-2330-ipv6@ietf.org" <draft-ietf-ippm-2330-ipv6@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: [ippm] Suresh Krishnan's Discuss on draft-ietf-ippm-2330-ipv6-05: (with DISCUSS and COMMENT)
Thread-Index: AQHUCV1z1tfcpxRmFUWHbmnOolALRKRqubhggAAfrwA=
Date: Thu, 21 Jun 2018 15:39:40 +0000
Message-ID: <43CCA228-6735-49AF-B453-5654AC0E7B79@kaloom.com>
References: <152958494006.31485.7887719162606975251.idtracker@ietfa.amsl.com> <4D7F4AD313D3FC43A053B309F97543CF4A92EE6D@njmtexg4.research.att.com>
In-Reply-To: <4D7F4AD313D3FC43A053B309F97543CF4A92EE6D@njmtexg4.research.att.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Suresh@kaloom.com;
x-originating-ip: [45.19.110.76]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; YQXPR0101MB1285; 7:2R+cvZFF2RoI7izTEpbWS3EoUWcJcdfmFQ1EZHE+5MxybxA3LQSX2TXozz7mO8C20qYGv7p/3CiNTr/vDkviguar9BjCVpNuFIIVMDtD6RcOs1hnIwLUY5Ju9/DIbK2CXIH20EbKATjPNjvBuaq9ARP3YZDCC8qKTK9RE/EqcmpaKZWEztZTtJMmifmSIrM+zNgmcaOEAWQRVBaClYPlTxBV+cvptbIN00gQHofg3Ig7OPFi2PHZOY5TvjbsWsuO
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 8ee8182d-851a-4437-948f-08d5d78d343e
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(7021125)(4534165)(7022125)(4603075)(4627221)(201702281549075)(7048125)(7024125)(7027125)(7028125)(7023125)(5600026)(711020)(2017052603328)(7153060)(7193020); SRVR:YQXPR0101MB1285;
x-ms-traffictypediagnostic: YQXPR0101MB1285:
x-microsoft-antispam-prvs: <YQXPR0101MB1285148F2A7C7CCB793E4C92B4760@YQXPR0101MB1285.CANPRD01.PROD.OUTLOOK.COM>
x-exchange-antispam-report-test: UriScan:(97927398514766);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(93006095)(93001095)(3231254)(944501410)(52105095)(3002001)(10201501046)(149027)(150027)(6041310)(20161123560045)(2016111802025)(20161123562045)(20161123558120)(20161123564045)(6043046)(6072148)(201708071742011)(7699016); SRVR:YQXPR0101MB1285; BCL:0; PCL:0; RULEID:; SRVR:YQXPR0101MB1285;
x-forefront-prvs: 07106EF9B9
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39830400003)(39380400002)(346002)(366004)(396003)(376002)(199004)(189003)(51914003)(6246003)(99286004)(11346002)(76176011)(53936002)(7736002)(14454004)(4326008)(5660300001)(25786009)(68736007)(6916009)(8936002)(83716003)(106356001)(53946003)(36756003)(8676002)(81166006)(966005)(72206003)(54906003)(486006)(102836004)(316002)(2616005)(6506007)(59450400001)(26005)(81156014)(606006)(478600001)(82746002)(476003)(446003)(53546011)(186003)(105586002)(236005)(33656002)(80792005)(66066001)(21615005)(6486002)(97736004)(54896002)(6306002)(2900100001)(6512007)(229853002)(6116002)(6436002)(3846002)(3280700002)(5250100002)(2906002)(3660700001)(86362001); DIR:OUT; SFP:1102; SCL:1; SRVR:YQXPR0101MB1285; H:YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: kaloom.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: xF5Xqhz7OJBAKJeZSoCJa887ZVGQWpKZGgSDEJOS85WZBLPYQieUTBDzRUxi1vXfrzaoSqxgovYOyuTInGJllBeg2aHx/zIdehXTnbMXi/MOhzDrruanEKfIcAGNxmNkMor1NxnD7i9tQ+laZfQoY00qMQu0geWSbwy6xNsRi+n5QU6BN/BiNsAVhzjfWi6ybKNtoMWERS5ZMoPuMTxcxXPw7jMX3BLPcQ9QyqoFu8ar83mqE2OAsqtzAqP9dZOb/AwTveYZUvxUUO3yYH7ThPKunpb87ILbXpExzFpYU87hZA/dQGfJDsHuIZpB6HVLNP7E8SCanYTZVxS8XV/YuA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_43CCA228673549AFB4535654AC0E7B79kaloomcom_"
MIME-Version: 1.0
X-OriginatorOrg: kaloom.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8ee8182d-851a-4437-948f-08d5d78d343e
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Jun 2018 15:39:40.8419 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 47d58e26-f796-48e8-ac40-1c365c204513
X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQXPR0101MB1285
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/PiZm_SJlz3E4-Pd5-sU64_nQV2M>
Subject: Re: [ippm] Suresh Krishnan's Discuss on draft-ietf-ippm-2330-ipv6-05: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jun 2018 15:39:48 -0000

Hi Al,
  Thanks for the quick reply. Please find comments inline.

On Jun 21, 2018, at 10:23 AM, MORTON, ALFRED C (AL) <acm@research.att.com<mailto:acm@research.att.com>> wrote:

Hi Suresh,
Thanks for your review.
Please see the discussion below.
We have things to talk about.

Al

...
----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

* Section 4

Since this behavior is clearly forbidden in RFC8200
[acm]
Although much of the IETF community shares your view,
"forbidden" is much too strong a word to describe this
sentence/statement in RFC8200

  Extension headers (except for the Hop-by-Hop Options header) are not
  processed, inserted, or deleted by any node along a packet's delivery
  path, until the packet reaches the node (or each of the set of nodes,
  in the case of multicast) identified in the Destination Address field
  of the IPv6 header.

"are not" would not translate to "forbidden" in any SDO I know.
I understand that some folks proposed to update the wording to 2119
terms, and were found to be in the rough.

Actually, the lack of 2119 language in RFC8200 is completely unrelated to this issue. We, in the IETF, do not require standards track documents to use 2119 language (IMHO, I think this is unfortunate and that we should!). The reason header insertion was not allowed in RFC8200 was because the proponents of header insertion could not describe how to do header insertion safely on the internet and were not willing to scope the header insertion to private networks. I do not have a religious position on this and I summarized my position in a mail to the 6man list on this issue (https://www.ietf.org/mail-archive/web/ipv6/current/msg27336.html).

"I have heard from several persons being concerned about the possibility of new text in 2460bis being blindly used to block header insertion work in the future. I just want to confirm that header insertion work can be considered in the future, and that it should be judged on its own merits and not be blocked solely based on the header insertion related text in 2460bis."

When the ippm work hits the IESG, I (if I am still on it :-)) will hold that work to the same standard. There is some work ongoing (albeit very slowly) in 6man to specify safe header insertion

https://tools.ietf.org/html/draft-voyer-6man-extension-header-insertion-03

and hopefully this work will complete before the in-situ OAM work will hit the IESG. If not, I see encapsulation and tight scoping as the only way forward on this issue.


Would someone outside IETF
reading RFC8200 interpret this sentence as an absolute requirement?
I won't list the many possible interpretations.


there is no need to add a
special case for this (as middleboxes perform any number of
transformations that not standards compliant).
[acm]
Right, but we would want to know those translations happened.
Keep in mind that IPPM is in the measurement business,
and our systems work better if we detect the unexpected.
So, If you are reading the bullet text below as some form of
encouragement to insert/delete headers, it is not.

Given that safe header insertion/deletion is a
hard problem that has not been solved, I would remove this text or
significantly augment it to describe potential issues that may occur due to
header insertion/deletion (similar to the sections related to 6lowpan and
translation).
[acm]
I think we would be glad to cite several references to cover
the potential issues that you provide, but this bullet point has real
value to the measurement community.

Yep. That would be a good way to address this DISCUSS point, because I will clear right away as long as the issues are put forth just like the extensive work you have done in Section 5 for the other *similar* transforms.



* Section 4

I think this text should be removed

  [RFC8250] endorses the use of IPv6 extension headers for measurement
  purposes, consistent with other approved IETF specifications.

as RFC8250 uses a destination option and defining new extension headers has
been explicitly recommended against by section 4.8 of RFC8200.
[acm]
Then how was RFC8250 approved? This RFC was developed in IPPM, too.
We are clearly not on the same page for this topic, and IPPM's
new charter including In-situ OAM may insert more space between us.

RFC8250 defines a new *destination option* and not a new extension header. That is why it was approved :-)

Thanks
Suresh