Re: [ippm] Last Call: <draft-ietf-ippm-2330-ipv6-04.txt> (IPv6, IPv4 and Coexistence Updates for IPPM's Active Metric Framework) to Informational RFC

"MORTON, ALFRED C (AL)" <acm@research.att.com> Thu, 19 April 2018 22:43 UTC

Return-Path: <acm@research.att.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7439312E8DF; Thu, 19 Apr 2018 15:43:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.61
X-Spam-Level:
X-Spam-Status: No, score=-0.61 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ejbckEVJPeJJ; Thu, 19 Apr 2018 15:43:12 -0700 (PDT)
Received: from mx0a-00191d01.pphosted.com (mx0b-00191d01.pphosted.com [67.231.157.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0ECE12E3AE; Thu, 19 Apr 2018 15:43:11 -0700 (PDT)
Received: from pps.filterd (m0049459.ppops.net [127.0.0.1]) by m0049459.ppops.net-00191d01. (8.16.0.21/8.16.0.21) with SMTP id w3JMZrRl047088; Thu, 19 Apr 2018 18:42:55 -0400
Received: from tlpd255.enaf.dadc.sbc.com (sbcsmtp3.sbc.com [144.160.112.28]) by m0049459.ppops.net-00191d01. with ESMTP id 2hf36m93tn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 19 Apr 2018 18:42:55 -0400
Received: from enaf.dadc.sbc.com (localhost [127.0.0.1]) by tlpd255.enaf.dadc.sbc.com (8.14.5/8.14.5) with ESMTP id w3JMgsW8130453; Thu, 19 Apr 2018 17:42:54 -0500
Received: from zlp30495.vci.att.com (zlp30495.vci.att.com [135.46.181.158]) by tlpd255.enaf.dadc.sbc.com (8.14.5/8.14.5) with ESMTP id w3JMgosB130427; Thu, 19 Apr 2018 17:42:51 -0500
Received: from zlp30495.vci.att.com (zlp30495.vci.att.com [127.0.0.1]) by zlp30495.vci.att.com (Service) with ESMTP id 672AE40002F1; Thu, 19 Apr 2018 22:42:50 +0000 (GMT)
Received: from clpi183.sldc.sbc.com (unknown [135.41.1.46]) by zlp30495.vci.att.com (Service) with ESMTP id 38C5D4000697; Thu, 19 Apr 2018 22:42:50 +0000 (GMT)
Received: from sldc.sbc.com (localhost [127.0.0.1]) by clpi183.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id w3JMgoEk007904; Thu, 19 Apr 2018 17:42:50 -0500
Received: from mail-azure.research.att.com (mail-azure.research.att.com [135.207.255.18]) by clpi183.sldc.sbc.com (8.14.5/8.14.5) with ESMTP id w3JMggwu007475; Thu, 19 Apr 2018 17:42:43 -0500
Received: from exchange.research.att.com (njbdcas1.research.att.com [135.197.255.61]) by mail-azure.research.att.com (Postfix) with ESMTP id 7EACDE10F0; Thu, 19 Apr 2018 18:42:40 -0400 (EDT)
Received: from njmtexg5.research.att.com ([fe80::b09c:ff13:4487:78b6]) by njbdcas1.research.att.com ([fe80::8c6b:4b77:618f:9a01%11]) with mapi id 14.03.0389.001; Thu, 19 Apr 2018 18:42:40 -0400
From: "MORTON, ALFRED C (AL)" <acm@research.att.com>
To: "C. M. Heard" <heard@pobox.com>
CC: IETF <ietf@ietf.org>, IPPM <ippm@ietf.org>, 6man <ipv6@ietf.org>
Thread-Topic: Last Call: <draft-ietf-ippm-2330-ipv6-04.txt> (IPv6, IPv4 and Coexistence Updates for IPPM's Active Metric Framework) to Informational RFC
Thread-Index: AQHT1CINNWLrZp0gnEmOO2ejSajh+KQByI8QgAB2xgCABm7FsA==
Date: Thu, 19 Apr 2018 22:42:36 +0000
Message-ID: <4D7F4AD313D3FC43A053B309F97543CF4A8EB2B4@njmtexg5.research.att.com>
References: <CACL_3VEDW3bpbYajHXT=QJO7ZnwsdsNauVx+uPcn8wfBSyc=Yg@mail.gmail.com> <4D7F4AD313D3FC43A053B309F97543CF4A8E895E@njmtexg5.research.att.com> <CACL_3VEUg_BQKDGqJ5fgCo2jcT3mLWhAgjXgX2a4_V9CVMNiqA@mail.gmail.com>
In-Reply-To: <CACL_3VEUg_BQKDGqJ5fgCo2jcT3mLWhAgjXgX2a4_V9CVMNiqA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [69.141.203.172]
Content-Type: multipart/alternative; boundary="_000_4D7F4AD313D3FC43A053B309F97543CF4A8EB2B4njmtexg5researc_"
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-04-19_05:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_policy_notspam policy=outbound_policy score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1804190201
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/jj9GiRjw_O4LIzWfgpbTi2O_qD0>
Subject: Re: [ippm] Last Call: <draft-ietf-ippm-2330-ipv6-04.txt> (IPv6, IPv4 and Coexistence Updates for IPPM's Active Metric Framework) to Informational RFC
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Apr 2018 22:43:20 -0000

Hi Mike, Please see in-line replies,
Al

From: C. M. Heard [mailto:heard@pobox.com]
Sent: Sunday, April 15, 2018 11:56 AM
To: MORTON, ALFRED C (AL) <acm@research.att.com>
Cc: IETF <ietf@ietf.org>; IPPM <ippm@ietf.org>; 6man <ipv6@ietf.org>
Subject: Re: Last Call: <draft-ietf-ippm-2330-ipv6-04.txt> (IPv6, IPv4 and Coexistence Updates for IPPM's Active Metric Framework) to Informational RFC

Hello Al,

Apologies for the truncated message ... the full version is available at https://www.ietf.org/mail-archive/web/ippm/current/msg04999.html<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mail-2Darchive_web_ippm_current_msg04999.html&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=_6cen3Hn-e_hOm0BhY7aIpA58dd19Z9qGQsr8-6zYMI&m=2J2Uwt4fnAeyqXqxbWRacD0soZcfUMDCm3bv_ySNZ9w&s=Hw-I-LklaEoa82ghk2Aqo5L0sh0Wv-dqicd6ajKCQ4g&e=>.  I'll resend off-list shortly. In the meantime, my responses below are marked [cmh]
[acm]
thanks! it was obvious the end was missing...
I’ve appended your PMTUD comments in this message,
at the end (allegedly, we’ll see if they get through).


Mike Heard
…

 [ non-controversial stuff elided ]


Section 3, page 4, third paragraph, says:


   [...] For example, the packet length will

   change if IP headers are converted to the alternate version/address

   family, or if optional Extension Headers are added or removed. [...]

Adding or removing extension headers contravenes RFC 8200. Since this is just an example, I would recommend deleting the controversial second clause.
[acm]
Understand, see below.

Section 4, page 6, last paragraph, and page 7, first paragraph, say:


   The topic of IPv6 Extension Headers brings current controversies into

   focus as noted by [RFC6564<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc6564&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=OfsSu8kTIltVyD1oL72cBw&m=Yk9GCxmytKBlMMeadFP5mNWDshrNtD3ur_Qg-wMX_ts&s=qQyZYT0zxt-ClqRU8hIUUNYk5xi5rQvBozAWxjm67os&e=>] and [RFC7045<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc7045&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=OfsSu8kTIltVyD1oL72cBw&m=Yk9GCxmytKBlMMeadFP5mNWDshrNtD3ur_Qg-wMX_ts&s=9I656AjTSjYpQlMstCRImNUaZvenm4kPNq_rI7-VZAg&e=>].  However, measurement use

   cases in the context of the IPPM framework like in-situ OAM in

   enterprise environments or IPv6 Performance and Diagnostic Metrics

   (PDM) Destination Option measurements [RFC8250<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc8250&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=OfsSu8kTIltVyD1oL72cBw&m=Yk9GCxmytKBlMMeadFP5mNWDshrNtD3ur_Qg-wMX_ts&s=tw0fik0bS0uC_ifn0S1ue66X-bs70H7Da0xHoQ2ckAA&e=>] can benefit from

   inspection, modification, addition or deletion of IPv6 extension

   headers in hosts along the measurement path.


   As a particular use case, hosts on the path may store sending and

   intermediate timestamps into dedicated extension headers to support

   measurements, monitoring, auditing, or reproducibility in critical

   environments.  [RFC8250<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc8250&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=OfsSu8kTIltVyD1oL72cBw&m=Yk9GCxmytKBlMMeadFP5mNWDshrNtD3ur_Qg-wMX_ts&s=tw0fik0bS0uC_ifn0S1ue66X-bs70H7Da0xHoQ2ckAA&e=>] endorses the use and manipulation of IPv6

   extension headers for measurement purposes, consistent with other

   approved IETF specifications



[acm]

This is the end-of-message I received, but I imagine you intended to

point-out that 8200 and 8250 appear to be in conflict over

addition/deletion of extension headers.



From 8200, section 4:


   Extension headers (except for the Hop-by-Hop Options header) are not
   processed, inserted, or deleted by any node along a packet's delivery
   path, until the packet reaches the node (or each of the set of nodes,
   in the case of multicast) identified in the Destination Address field
   of the IPv6 header.



I wonder why RFC 2119 requirement terms were not used to

express this idea? We certainly have agreements about

requirements language for Standards Track memos in IETF.

[cmh]
RFC 2119 language is not strictly required, and the 6man WG decided not to introduce it in the transition from 2460 to 8200.

I didn't agree with that decision, but I was "in the rough."
[acm]
That’s heavy baggage 6man will have to carry, IMO.
“are not” doesn’t translate to a requirement in any SDO I know.


RFC8250 does not involve Extension header insertion/deletion

along the path, but other work-in-progress (in-situ OAM) would.
[cmh]
Correct, 8250 does not involve extension header insertion/deletion/modification along the path.

Thus, the wording of the latter two highlighted sentences above needs to be reworked.
[acm]
I discussed this at length with co-authors, and arrived at
a tighter wording. We simply delete the PDM citation in the 2nd sentence,
and then we refer to the chartered work on in-situ OAM only:

   The topic of IPv6 Extension Headers brings current controversies into
   focus as noted by [RFC6564] and [RFC7045].  However, measurement use
   cases in the context of the IPPM framework like in-situ OAM [ref] in
   enterprise environments can benefit from
   inspection, modification, addition or deletion of IPv6 extension
   headers in hosts along the measurement path.

We will also delete the first sentence in the second paragraph above,
and delete the words “and manipulation”:

   [RFC8250] endorses the use of IPv6 extension headers for
    measurement purposes, consistent with other approved IETF specifications.

The first highlighted sentence is now dated (as predicted by Fred Baker in https://mailarchive.ietf.org/arch/msg/ippm/8sgikiZbSiD4v2VeKK_FA7TkjmM<https://urldefense.proofpoint.com/v2/url?u=https-3A__mailarchive.ietf.org_arch_msg_ippm_8sgikiZbSiD4v2VeKK-5FFA7TkjmM&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=_6cen3Hn-e_hOm0BhY7aIpA58dd19Z9qGQsr8-6zYMI&m=2J2Uwt4fnAeyqXqxbWRacD0soZcfUMDCm3bv_ySNZ9w&s=y3wSRgv_Y4EZ5aBh6uUbxxRTTMcHDpuIYw2nfcWcH0Y&e=>), but there is ongoing discussion in 6man about updating RFC 8200 to permit insertion/deletion/modification of extension headers (other than hop-by-hop options) under certain circumstances. See https://tools.ietf.org/html/draft-voyer-6man-extension-header-insertion<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dvoyer-2D6man-2Dextension-2Dheader-2Dinsertion&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=_6cen3Hn-e_hOm0BhY7aIpA58dd19Z9qGQsr8-6zYMI&m=2J2Uwt4fnAeyqXqxbWRacD0soZcfUMDCm3bv_ySNZ9w&s=15z5qksVffY_75SBOZfwpw76NvzJpu18E9LWFvNillM&e=>.
[acm]
Let me know when there is a consensus call,
I will stand with you for using 2119 modal verbs
in the update...


In any case, a measurement framework should be prepared to

handle some unexpected/discouraged behaviors encountered on the path.

[cmh]
I do not disagree with that; but but might it not be appropriate to change to Section 4, page 7, fifth paragraph, from:


   o  Extension Header insertion or deletion: It is possible that

      Extension Headers could be added to, or removed from the header

      chain.  The resulting packet may be standard-formed, with a

      corresponding Type-P.

to something like:


   o  Extension Header insertion or deletion: Although such behavior is

      not endorsed by current standards, it is possible that Extension

      Headers could be added to, or removed from the header chain.  The

      resulting packet may be standard-formed, with a corresponding

      Type-P.

If that doesn't work for you, perhaps say something to the same effect could be said in the paragraphs at the bottom of page 6 and the top of page 7.
[acm]
Your text suggestion WFM, it’s in our working copy now.

Note that there were comments on PMTUD in the part of the message that you didn't get; hopefully those will get to you in the re-send coming shortly.

Mike Heard

[ ...  truncated portion follows …]

Section 4, page 7, next-to-last paragraph says:


   [...] Path MTU Discovery

   for IP version 6 (PMTUD, [RFC8201<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc8201&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=_6cen3Hn-e_hOm0BhY7aIpA58dd19Z9qGQsr8-6zYMI&m=QmkalCghj2UWXAYbUNBvVzmVYsjZz3QCRNMcCapKLHI&s=wuYf87r5Jd9R1REA97G2-ftjyVl77Myo6qmYQAHE4JU&e=>]) or Packetization Layer Path MTU

   Discovery (PLPMTUD, [RFC4821<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc4821&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=_6cen3Hn-e_hOm0BhY7aIpA58dd19Z9qGQsr8-6zYMI&m=QmkalCghj2UWXAYbUNBvVzmVYsjZz3QCRNMcCapKLHI&s=xTmoRZSTUrTKeA0f9Y_gPjyRuOeOQEPtPe2blgphY40&e=>]) is recommended to prevent

   fragmentation (or ICMP error messages) as a result of IPv6 extension

   header manipulation.

The trailing clause "(or ICMP error messages) as a result of IPv6 extension header manipulation" should be removed, as it is just plain wrong. PMTUD relies on ICMP Packet Too Big messages for proper operation, and in-flight increases in packet length due to insertion of extension headers actually break PTMTUD.

[acm]
Your deletion WFM, it’s in our working copy now.


Section 5, page 8, next-to-last paragraph says:


   o  Modification or addition of headers or header field values in

      intermediate nodes.  As noted in Section 4<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Dippm-2D2330-2Dipv6-2D04-23section-2D4&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=_6cen3Hn-e_hOm0BhY7aIpA58dd19Z9qGQsr8-6zYMI&m=QmkalCghj2UWXAYbUNBvVzmVYsjZz3QCRNMcCapKLHI&s=OmLE-PPyxr3OLg9q10BoDE4yGhg_E_PNGhibcCMmWWk&e=> for IPv6 extension

      header manipulation, NAT, IPv4-IPv6 transitioning or IPv6 header

      compression mechanisms may result in changes of the measurement

      packets' Type-P, too.  Consequently, hosts along the measurement

      path may treat packets differently because of the Type-P

      modification.  Measurements at observation points along the path

      may also need extra context to uniquely identify a packet.

If the changes I recommend above are implemented, it will be necessary to remove the clause "As noted in Section 4 for IPv6 extension header manipulation,"

[acm]
again WFM, Thanks.


Mike Heard