Re: [ippm] Suresh Krishnan's Discuss on draft-ietf-ippm-2330-ipv6-05: (with DISCUSS and COMMENT)

Suresh Krishnan <Suresh@kaloom.com> Sat, 30 June 2018 17:04 UTC

Return-Path: <Suresh@kaloom.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C63FA1310E5; Sat, 30 Jun 2018 10:04:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=kaloom.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 52crAajXZ1h7; Sat, 30 Jun 2018 10:04:44 -0700 (PDT)
Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670102.outbound.protection.outlook.com [40.107.67.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80A4B130F47; Sat, 30 Jun 2018 10:04:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kaloom.onmicrosoft.com; s=selector1-kaloom-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=niuQ+M5EDhe/09RV5++YNIrHHg0DROYjuFyUtDV1ZBw=; b=ljZ84Om3+c+gv99ZyfTe69xuLWI8gKH24b6ydChSJDSyYvXnDqKgT7b4BFui8hKioi/hEPGJQBYZ97hlGT+HLWhoZfsWnFTSEG6CxYBE6e05UB3+dII/Gf2CPKZXpnGwlgSwsAqEXcVAkpfTLTMQHAYPDszHxZKZz+9wmqf5xCg=
Received: from YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM (52.132.77.143) by YQXPR0101MB1416.CANPRD01.PROD.OUTLOOK.COM (52.132.81.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.906.25; Sat, 30 Jun 2018 17:04:42 +0000
Received: from YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM ([fe80::4454:d5f1:6e24:a597]) by YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM ([fe80::4454:d5f1:6e24:a597%3]) with mapi id 15.20.0906.025; Sat, 30 Jun 2018 17:04:42 +0000
From: Suresh Krishnan <Suresh@kaloom.com>
To: "MORTON, ALFRED C (AL)" <acm@research.att.com>
CC: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>, "ippm-chairs@ietf.org" <ippm-chairs@ietf.org>, "n.brownlee@auckland.ac.nz" <n.brownlee@auckland.ac.nz>, The IESG <iesg@ietf.org>, "draft-ietf-ippm-2330-ipv6@ietf.org" <draft-ietf-ippm-2330-ipv6@ietf.org>, "ippm@ietf.org" <ippm@ietf.org>
Thread-Topic: [ippm] Suresh Krishnan's Discuss on draft-ietf-ippm-2330-ipv6-05: (with DISCUSS and COMMENT)
Thread-Index: AQHUCV1z1tfcpxRmFUWHbmnOolALRKRqubhggAAfrwCAAAJrAIAHH4CAgADXmPCABKzQIIABlmmA
Date: Sat, 30 Jun 2018 17:04:42 +0000
Message-ID: <B207DC8C-C4CD-446F-ABB7-F86F00CF37D7@kaloom.com>
References: <152958494006.31485.7887719162606975251.idtracker@ietfa.amsl.com> <4D7F4AD313D3FC43A053B309F97543CF4A92EE6D@njmtexg4.research.att.com> <43CCA228-6735-49AF-B453-5654AC0E7B79@kaloom.com> <4D7F4AD313D3FC43A053B309F97543CF4A92EFEE@njmtexg4.research.att.com> <CF1C78F6-9971-46D4-9FAA-B0BCB448A672@kaloom.com> <4D7F4AD313D3FC43A053B309F97543CF4A930678@njmtexg4.research.att.com> <4D7F4AD313D3FC43A053B309F97543CF4A931E80@njmtexg4.research.att.com>
In-Reply-To: <4D7F4AD313D3FC43A053B309F97543CF4A931E80@njmtexg4.research.att.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Suresh@kaloom.com;
x-originating-ip: [50.39.101.212]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; YQXPR0101MB1416; 7:WT6fa4WeCke1rpyHkD0Rj/b4ywW3/yBwrghL1zoYjrrNa6OVy1HC0EHnz6G1fvRTs8IUroZwofQTfXfHTqglpVrbZiqH05Czt8qSiZunbloitIUTvcLzah3xJ2s8Q5164yesOq+Z7VaR8vwmHlfOukVbWv1EX0+l2VUT22ZhFgcda+04l86OOQJMJu7FWJ9lBW525JYDXJnfDq5m/ySHzenIDYT8jhOSQUZxPR0IO41zSRFzMnD/81orkvSm+ZGU
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: b426c0ff-c86a-4f8e-7541-08d5deab9277
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(7021125)(8989117)(4534165)(7022125)(4603075)(4627221)(201702281549075)(8990107)(7048125)(7024125)(7027125)(7028125)(7023125)(5600053)(711020)(2017052603328)(7153060)(7193020); SRVR:YQXPR0101MB1416;
x-ms-traffictypediagnostic: YQXPR0101MB1416:
x-microsoft-antispam-prvs: <YQXPR0101MB1416EB50696C0B0FE5EAF184B44D0@YQXPR0101MB1416.CANPRD01.PROD.OUTLOOK.COM>
x-exchange-antispam-report-test: UriScan:(97927398514766)(100405760836317);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3002001)(3231254)(944501410)(52105095)(149027)(150027)(6041310)(20161123562045)(2016111802025)(20161123558120)(20161123564045)(20161123560045)(6072148)(6043046)(201708071742011)(7699016); SRVR:YQXPR0101MB1416; BCL:0; PCL:0; RULEID:; SRVR:YQXPR0101MB1416;
x-forefront-prvs: 0719EC6A9A
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(366004)(39830400003)(346002)(376002)(136003)(189003)(199004)(45074003)(105586002)(106356001)(6306002)(6486002)(36756003)(2900100001)(82746002)(256004)(561944003)(3846002)(5250100002)(486006)(6116002)(446003)(33656002)(476003)(66066001)(11346002)(2616005)(6512007)(54896002)(229853002)(8936002)(8676002)(81156014)(14444005)(236005)(7736002)(80792005)(186003)(72206003)(14454004)(6436002)(478600001)(966005)(68736007)(99286004)(54906003)(316002)(6506007)(81166006)(53546011)(5660300001)(76176011)(86362001)(26005)(6916009)(2906002)(93886005)(606006)(102836004)(4326008)(97736004)(6246003)(53936002)(83716003)(25786009)(39060400002); DIR:OUT; SFP:1102; SCL:1; SRVR:YQXPR0101MB1416; H:YQXPR0101MB2054.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: kaloom.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: OaIAXxS7g7v5fBPPetuzIfhEKh6r9h5Mknty3RMx3JYZ+KNKDH+xg35GC464MoZ+TYld2nYZx139ZjfasyuSye/ZENA0gpLGA4t7OL5KgQanNymyhJPt6Hxm7t3JR5AdL1Lmg4jSevpBIS80x45/OYD0OcWHq718QJoY30Of6CgSlZbvTqwUo7KB6te7kcxhQh6HbGTIsiAh1O0ARBJvBfwg6BqqQLXVWzfQRyahMqGfajLbpONI0n9BaoAwPthqnOErPrZKJsAQ1l+WXi3ZIu2WxIYwr0keUsDvNsk7tBOs0f+AK6udMIsdYky//vjNn+Ul4IKSeVc41sl4eLHgWRCDkzVtrEtK0UG0C7L45UU=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_B207DC8CC4CD446FABB7F86F00CF37D7kaloomcom_"
MIME-Version: 1.0
X-OriginatorOrg: kaloom.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b426c0ff-c86a-4f8e-7541-08d5deab9277
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Jun 2018 17:04:42.0400 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 47d58e26-f796-48e8-ac40-1c365c204513
X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQXPR0101MB1416
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/aNANxNyFq80eE2fkQeoo44xIfgo>
Subject: Re: [ippm] Suresh Krishnan's Discuss on draft-ietf-ippm-2330-ipv6-05: (with DISCUSS and COMMENT)
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 Jun 2018 17:04:49 -0000

Hi Al,

On Jun 29, 2018, at 4:35 PM, MORTON, ALFRED C (AL) <acm@research.att.com<mailto:acm@research.att.com>> wrote:

Hi Suresh,

As this week draws to a close, let me provide the current status
on your DISCUSS.

Rather than wait for a text suggestion**, the co-authors exchanged
many messages as we researched the topic from your DISCUSS:
“...describe potential issues that may occur due to header insertion/deletion.”
We proposed that a few concise references and a sentence to introduce
them might be sufficient.

Since this is a topic where consensus is evolving,
the co-authors agreed that we should not propose any
text or references that others might see as controversial
(and move us further from everyone’s goal of approval).

Instead, we sought sources/lists of issues that have been vetted,
such as those published as an RFC or a peer-reviewed conference paper
by someone with a prominent reputation in this field.

We found many Internet Drafts that identify general issues related to EH:
https://tools.ietf.org/html/draft-gont-v6ops-ipv6-ehs-packet-drops-03
https://tools.ietf.org/html/draft-wkumari-long-headers-03
Also, this draft that presents issues specific to the SRH proposal:
https://tools.ietf.org/html/draft-voyer-6man-extension-header-insertion-04#section-4
But Individual drafts that raise issues aren’t agreed at any level.
We looked at many e-mails and other items, too.

OTOH, there is some of evidence of strained EH-compliance
found through measurements:
https://tools.ietf.org/html/rfc7872

We could infer an issue from the RFC 7112 Header Chain limitations:
https://tools.ietf.org/html/rfc7112#section-5
where inserting any new EH at an intermediate node could exceed the PMTU.
But the EH insertion/deletion issue is not discussed in the RFC text.

The current Bullet item reads:

   o  Extension Header insertion or deletion: Although such behavior is
      not endorsed by current standards, it is possible that Extension
      Headers could be added to, or removed from the header chain.  The
      resulting packet may be standard-formed, with a corresponding
      Type-P.

We propose to append:

This point simply encourages measurement system designers to be prepared
for the unexpected, and to notify users when such events occur.
There are issues with Extension Header insertion and deletion,
such as exceeding header chain size limitations, like those
described in [RFC7112], of course.

Let us know what you think,
Al, for the co-authors

I was working on text that was along similar lines (expect the unexpected) and I believe your text proposal strikes the right balance in this regard. Thanks! I will clear right away when this new text is added. I would prefer removing the reference to 7112 as it is not directly related to insertion at intermediate points and make the following minor change (but I will leave it to your discretion whether to take this suggestion or not)

OLD:
There are issues with Extension Header insertion and deletion,
such as exceeding header chain size limitations, like those
described in [RFC7112], of course.

NEW:
There are issues with Extension Header insertion and deletion,
such as exceeding path MTUs due to insertion, inability of the
original packet initiator to react to ICMPv6 error messages etc.,
of course.


** We saw Mike Heard’s suggestion, but we felt it didn’t address your
DISCUSS directly, and didn’t meet our criteria to avoid more controversy.

Yep. That I figured it was probably too controversial for you as well.

Regards
Suresh