Re: [ippm] v6 option types for IOAM data fields

Mark Smith <markzzzsmith@gmail.com> Thu, 08 November 2018 11:40 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: ippm@ietfa.amsl.com
Delivered-To: ippm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 763F6130E6C; Thu, 8 Nov 2018 03:40:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.498
X-Spam-Level:
X-Spam-Status: No, score=-1.498 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wKl8zXJ0vOYF; Thu, 8 Nov 2018 03:40:56 -0800 (PST)
Received: from mail-oi1-x241.google.com (mail-oi1-x241.google.com [IPv6:2607:f8b0:4864:20::241]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 35A30128CB7; Thu, 8 Nov 2018 03:40:56 -0800 (PST)
Received: by mail-oi1-x241.google.com with SMTP id x204-v6so1172951oia.0; Thu, 08 Nov 2018 03:40:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=EKwvSQqhxeNm2jTsVNjvfHczeAou0iB9ktyY1+ME4WQ=; b=I5DBP8QrLRtBdeHuq31jcdRXiH2hVK5lFn9FFF9fZHiSB+4x3fYo3lIfmIUup/HPHj q4aW+aEHtBljvTiFeLwYLAmjyBABKuBElF/UhTYALehlGNSS8arp/8T6YDT2Fqpr8ybU VDn3IjBKOLJjhrpj+WPV2XfIBlqcBOGT8C4MoVY1EUiVTPX2FZLSW2RK5kwi7USNjfG1 EpttycfJNUpKmUG2IcCgM/Jz9nyzJBmtT1gSn6e0Oe9OfhUPuvl+SoTdfGklGNiZYMue osWpsY0/X68um1nI4mVG8EVUtMNhCaX21YE4U9jNB1jmspdiv6TNz24CYPIxS9MoQ5/X mY9g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=EKwvSQqhxeNm2jTsVNjvfHczeAou0iB9ktyY1+ME4WQ=; b=R2/ILERWK82/vYLgxLbeX3ROlAImoNQpk07ShpR27g0bDt3OJxQ7RzWNM+iVVTAPzh QW4iXvifzYWpKONe/WeEBfl/6PHbLL3fJAr1fDPIiCBTMe06QUmERpPPNnCijiWXi2t3 uLOj5qKk4zNqdWQ4rw9AxiLMDq0rtIEDwgcClEO6Z9mYhcterMb0Ipd6kP2rOcdXOenJ LaYCsdscl6BgPVcjoST5pmA78nL4khpLPqYSnf2VAFYKIw/DkvjWjNCSC/1pKx9Bg7XR PmAlwXk4cLzkO7pZle1AOohgVTSAaKdfF1fOQoje8m9jpeoqr/saVxaniiWGGBdPcKvh K6LA==
X-Gm-Message-State: AGRZ1gIc50u2ymbN6fxBheGlt/aQHAjlOdoRCnb+bCK+LavxpLgUEfLS xLtQXdBtbrCLH3lHtDWvR8UhmoinnRWgBSI90mw=
X-Google-Smtp-Source: AJdET5c7rKq2qoc8RkkYooS3/wba8fZFOPKbRQJPS4f1mirkaDR1sDvWcl6f0b9jGFcTtuRG1SfeeRH/bNMvjMbygDg=
X-Received: by 2002:aca:e5d4:: with SMTP id c203-v6mr2440943oih.1.1541677255234; Thu, 08 Nov 2018 03:40:55 -0800 (PST)
MIME-Version: 1.0
References: <CACL_3VGxyn-PYosFsKPVdd8C=P5AbE6HD1zrimHKuh2MPkhnuQ@mail.gmail.com> <505272eac2dd44fa891d4d36d14da9af@XCH-RCD-008.cisco.com> <CAO42Z2wGMzc_RT=eWTx9Ve-5reS0nCWiteGOuE16=MB4Fg8mkg@mail.gmail.com> <f50040ab52d04867b9a5cefa1c3131c3@XCH-RCD-008.cisco.com>
In-Reply-To: <f50040ab52d04867b9a5cefa1c3131c3@XCH-RCD-008.cisco.com>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Thu, 08 Nov 2018 22:40:29 +1100
Message-ID: <CAO42Z2zgguekybwVuCh8Az3mK8gHp292BYnWYhJq-8KEyfKzOA@mail.gmail.com>
To: Frank Brockners <fbrockne@cisco.com>
Cc: "C. M. Heard" <heard@pobox.com>, 6man WG <ipv6@ietf.org>, ippm@ietf.org
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ippm/rVZn9CnJelN0PdT3cCGUAsSJn-o>
Subject: Re: [ippm] v6 option types for IOAM data fields
X-BeenThere: ippm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF IP Performance Metrics Working Group <ippm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ippm>, <mailto:ippm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ippm/>
List-Post: <mailto:ippm@ietf.org>
List-Help: <mailto:ippm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ippm>, <mailto:ippm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Nov 2018 11:40:59 -0000

Hi Frank,

On Thu, 8 Nov 2018 at 19:36, Frank Brockners (fbrockne)
<fbrockne@cisco.com> wrote:
>
> Hi Mark, Mike,
>
>
>
> thanks for summarizing the concerns around leaked packets – and outlining an approach to mitigate those. There are a couple of other challenges we face. Unfortunately we did not get to a discussion in the 6man WG meeting this time due to the limited time we had. The meeting slides https://datatracker.ietf.org/meeting/103/materials/slides-103-6man-in-situ-oam-ipv6-options-00 provide a summary of concerns.
>
>
>
> In a nutshell:
>
> 1.       Potential HbH ext header and IOAM option insertion and removal by transit nodes (i.e. “en route”) in a restricted administrative domain.
>
> a)       How do you deal with PMTU? – Packet size changes might exceed PMTU.
>
> b)      Misleading ICMP errors confusing the source
>
> c)       Possible leaks that affect the forwarding behavior and state of network elements outside the domain.
>

Yes, all of the above, good summary.

An additional one is that if you were are receiver of this outside of
the domain because it as leaked, at the destination, after the packet
as traversed a number of ASes over the Internet, there is nothing to
identify the device/AS that inserted the EH. Very time consuming to
troubleshoot who inserted the EH but didn't remove it (you have to
walk the AS path, contacting each operator, asking them to verify
their config, get packet captures etc.), and all the while you may
have a number of angry customers/end-users.

> 2.       Incremental Trace IOAM HbH Option – which is to support a hardware-friendly implementation: Changes Option Data Len en-route.
>
> a)       Dealing with PMTU– Packet size changes can exceed PMTU; see above
>
> 3.       Clarify applicability statement and scope
>
>
>
> While 3. is something that is in the works, there are no easy answers to 1. and 2. Considerations:
>
>
>
> On 1. Supporting HbH ext header and option insertion/removal in transit. A couple of solution approaches…
>
> 1.       Fix PMTU and offset for packet size change in PMTU discovery - https://tools.ietf.org/html/draft-troan-6man-pmtu-solution-space-00
> Hope that we can make progress towards a solution tomorrow…
>
> 2.       IP-in-IP with IOAM extension header in the *inner* packet.
> New IPv6 packet is created with encapsulating node as source and the original destination as the destination
> (this is slightly different than what you, Mark, suggest – because we’d like to keep the forwarding path the same. Tunneling with ULA would not get us there; the slides above have a diagram that depicts the potential encap):
>
> a)       Payload of this packet is the original IPv6 packet along with an extension header inserted inside.
>
> b)      The original packet is restored by removing the outer IPv6 header and the inner extension header by a node at the domain boundary.
>
> c)       Caveats:
>
>                                                                i.      Modified packet may still leak – but will only confuse the destination node. The dest node will likely send an ICMP back to the encap node, which gets the encap node an understanding that something is going wrong.
>

This is certainly better, because the source address identifies the
device that inserted the EH of the packet that leaked to where ever it
leaked to.

What the source address should be is an interesting question.

If it is a global/public source address, then anybody who receives the
packet leaked with the EH can identify who inserted it and therefore
who didn't remove it.

OTOH, if it is a private/local ULA Source Address, then BCP38 source
address filters would cause the invalid leaked packet to be dropped
sooner, rather than being forwarded onto the final destination. Total
packet loss of OAM encapsulated packets would make the failure obvious
to the OAM domain operator. Slight drawback is BCP38 filters haven't
been universally implemented across the Internet.

I think I like the latter better because commonly it would localise
the symptoms of the failure to remove the EH to the domain that
inserted it, rather than having to have an external party get involved
in troubleshooting.



>                                                              ii.      ECMP computation needs to be reworked.
>
>                                                            iii.      Complex/costly implementation in HW & SW – IOAM-capable nodes need to hunt for the IOAM data fields in the inner packet.
>

Yes, the implementation complexity of insertion is another concern -
encapsulation is the most common and simplest cross layer forwarding
function performed and there's decades of history in optimising it.

The root cause of both the possible leak and the risk that the
inserted EH will reach the final packet destination is that the Dest.
Addr. of the packet with the inserted EH is both valid outside of the
domain, and valid all the way across the Internet to the final and
actual original packet destination. That creates a "default permit" if
a packet leaks with the inserted EH rather than a far better "default
deny" in this failure situation.

In this OAM case, it seems to me the ideal and the requirements would be:

- have the packet with the added OAM information follow the same path
within the domain that the same packet without the OAM information
would follow within the domain

- have the Dest. Addr. of the packet with the added OAM information
only be valid within the OAM domain i.e. an "interior DA", so that if
through failure the packet leaks, it isn't a valid DA on the Internet
and will be dropped by, if nothing else earlier, an Internet router
with a default free route table.

- encapsulate rather than insert, because encapsulation would be
simpler, and is the traditional way of adding information to PDUs
across many decades and many protocols (I can only think of VLAN ID
insertion as the only existing counter example, and according to Radia
Perlman in her book, that is only because at the time they weren't
sure if all NICs commonly available could successfully encapsulate a
full sized ethernet frame inside another one).

In other words, preserve the original IPv6 packet, add an OAM header
in front of it, then encapsulate it in another header to forward
within and across the OAM domain.

Bog standard IGP/LDP MPLS could achieve those requirements, with the
OAM header inserted after the final MPLS tag and before the IPv6
header. The MPLS/OAM/IPv6 packet follows an LSP across the domain that
matches the path that the IPv6 packet without MPLS would follow across
the domain. In that scenario, the MPLS LSP across the domain is the
"interior DA" that isn't valid outside of the OAM domain, because MPLS
wouldn't (normally) be valid outside of the OAM domain (i.e. OAM
domain is MPLS domain 1:1). If MPLS fails to be removed at the OAM
domain egress edge, the packet is dropped immediately, so a fail safe,
localised to the OAM domain.

For an IPv6-in-IPv6 scenario:

- for each OAM domain interior IPv6 routes/prefixes used by hosts
(i.e. hosts have addresses from these prefixes), automatically create
a matching interior OAM route/prefix (maybe just a /128), 1:1, with
the interior OAM route/prefix originated by the same router(s) where
the interior IPv6 routes/prefixes are created/originated. The interior
OAM routes come from ULA space or perhaps a new designated and
reserved private/local OAM address space for this purpose.

When a end host originated packet ingresses the OAM domain edge, the
DA address of the packet is looked up to find the 1:1 matching
internal OAM route/prefix/address. This internal OAM
route/prefix/address is used as the DA for the outer IPv6 header,
outer header SA is the OAM address of the OAM ingress device, an OAM
header follows, and then the original, inner IPv6 packet follows
without modification.

As the OAM route/prefix/address is originated at the same place as the
OAM domain interior IPv6 route/prefix, the path the now IPv6-in-IPv6
packet follows through the OAM domain should be the same as that which
the original, now inner packet would have followed with its DA. In a
sense this OAM route/prefix/address is an internal routeable index or
proxy for the inner packet destination prefix.

- for exterior routes, IPv6-in-IPv6 tunnelling too between BGP border
routers per RFC1772, "A.2.3 Encapsulation", with the addition of the
OAM header between the new outer IPv6 header and the inner original
IPv6 packet, and OAM local addresses for the tunnel end points. This
avoids having to create 1:1 matching internal OAM route/prefix/address
for each exterior route.

(And perhaps a somewhat radical idea for reducing tunnelling overhead.
All of this tunnelling stuff already exists for IPv4; and it is sunk
cost. Would there be much harm in using IPv4 as the interior outer
tunnelling protocol for this IPv6 traffic with the added OAM
information? I'd much rather keep running an IPv4 OAM island to carry
IPv6 than any splitting apart of IPv6 packets to insert EHs in them
...)

> 3.       No support of IOAM in transit network. Support only source initiated IOAM tracing, proof of transit..
> Caveat: Limits usage of IOAM significantly.
>
>
> On 2. Incremental Trace IOAM HbH Option
>
> 1.       Use PMTU to determine max possible Incremental Trace IOAM Option length
>
> 2.       Do not support Incremental Trace IOAM Option in IPv6.
>
>

Could what I've suggested above solve those? I think the use of
tunnelling/encapsulation supports a transit OAM scenario.

Regards,
Mark.


>
> While there isn’t an easy answer, IMHO we should still try to find a workable and implementable solution. I sometimes compare the situation with the road network: What we have today is a network of gravel roads (Internet with often poor ext header processing) and cars are built to cope with gravel roads. Now faster and comfy cars become available, though they only work on tared/concrete roads (specific administrative domains). If you try to drive these new cars on gravel roads they break and the wrecks jam the roads…, still we probably want to allow folks to buy and use the fast & comfy cars, because they will also push for better roads  as well (do proper ext header processing).
>
>
>
> Thoughts?
>
>
>
> Thanks, Frank
>
>
>
>
>
> From: Mark Smith <markzzzsmith@gmail.com>
> Sent: Dienstag, 30. Oktober 2018 05:26
> To: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> Cc: C. M. Heard <heard@pobox.com>; 6man WG <ipv6@ietf.org>; ippm@ietf.org
> Subject: Re: v6 option types for IOAM data fields
>
>
>
>
> Hi Frank,
>
>
>
> On Tue., 30 Oct. 2018, 05:36 Frank Brockners (fbrockne), <fbrockne@cisco.com> wrote:
>
> Thanks Mike. On the scope of an IOAM deployment:
> draft-ietf-ippm-ioam-data-04 clarifies in section 3 that IOAM is a domain focused feature, i.e. not expected to be deployed on the open Internet.
>
>
>
> That still violates RFC 8200, there are no exceptions for "closed" domains.
>
>
>
> From section 3:
>
>
>
> "Designers of
>
>    carrier protocols for IOAM must specify mechanisms to ensure that
>
>    IOAM data stays within an IOAM domain.  In addition, the operator of
>
>    such a domain is expected to put provisions in place to ensure that
>
>    IOAM data does not leak beyond the edge of an IOAM domain, e.g. using
>
>    for example packet filtering methods."
>
>
>
> Neither the designers or the operators can ensure this IOAM information won't leak.
>
>
>
> Possible reasons it can leak:
>
>
>
> - operator configuration error - e.g. forgetting to configure the domain boundary (e.g. router with multiple domain exit interfaces, forgetting to add that option on one of them), or misconfiguring it.
>
>
>
> - partial device failure - the device still forwards packets, but ceases to remove this information due to a hardware fault that has appeared
>
>
>
> - vendor implementation bugs that fails to remove the information.
>
>
>
> Any or all of these can occur, and as it is on egress, the consequences may not be visible to the domain network operator, because network operators rarely inspect packets after they've left their network. Once a packet is sent onto somebody else, it is assumed to have been sent without faults.
>
>
>
> There are many instances of leaks at the boundary of what are supposed to be closed domains, such as packets containing RFC1918 private addresses (in packet headers themselves, or in DNS packets - such a big problem that www.as112.net was created), and route leaks e.g. https://bgpmon.net/how-the-internet-in-australia-went-down-under/
>
>
>
> As operators usually have only one device at the edge of the domain, that would be performing the domain boundary function, that device becomes a single point of failure. Enforcement is therefore quite fragile. A domain boundary enforced by two domain edge devices in-line would increase robustness, however I'd think that would be rarely deployed, because we haven't seen that commonly with IPv4 NAT.
>
>
>
> The only way for an operator to ensure these leaks don't and never occur is for the domain to literally not be physically connected to the Internet i.e. the domain is air gapped from the Internet. If there is a link between the domain and the Internet that can carry IP packets, then there is always a possibility that information can leak from the domain.
>
>
>
> So accepting that leaks can always occur, a far more robust option is to leave the original packet alone entirely, and encapsulate it in a domain local IPv6 header (i.e RFC2473, section 3.1) with domain local limited addresses (i.e. ULA addresses) and the additional EH.
>
>
>
> That still doesn't ensure that packet won't leak outside the domain, because those packets will follow a default route, however as the packet's addressing is invalid outside of the domain, that packet will be dropped once it reaches either an invalid Internet address filter, or a default free Internet router. The packet with the failed-to-be-removed outer ULA IPv6 header will never reach the destination address of the inner packet, because the DA of the inner packet is in the ULA IPv6 packet's payload.
>
>
>
> Failure of the mechanism would be much more obvious, localised to the domain implementing the mechanism (rather than being externalised to somebody else's domain/network), and absolute, because the failure mode is packets being entirely discarded.
>
>
>
> Regards,
>
> Mark.
>
>
>
>
>
>
> Frank
>
> -----Original Message-----
> From: C. M. Heard <heard@pobox.com>
> Sent: Montag, 29. Oktober 2018 16:03
> To: 6man <ipv6@ietf.org>; IPPM <ippm@ietf.org>
> Cc: Frank Brockners (fbrockne) <fbrockne@cisco.com>
> Subject: Re: v6 option types for IOAM data fields
>
> On Thu, 25 Oct 2018 15:06:57 +0000 Frank Brockners (fbrockne) wrote:
> > Quick heads up: In the 6MAN meeting in BKK, we’ll review
> > draft-ioametal-ippm-6man-ioam-ipv6-options-01 – which requests 2
> > option types from the DO/HbyH options sub-registry.
> >
> > While the bulk of the IOAM work is progressed in the IPPM WG, we’d
> > greatly appreciate your feedback on
> > draft-ioametal-ippm-6man-ioam-ipv6-options-01,
> > which defines how IOAM data fields are carried using v6 extension headers.
> > Cc’ing the IPPM WG as well, to keep everyone on the same page.
>
> I have two brief comments on this work.
>
> First, I see that the Incremental Tracing Option changes length in transit.
> It is not appropriate for it to be carried in an IPv6 option intended for use on the open Internet, for exactly the same reason that insertion of extension headers by intermediate nodes is not allowed on the open Internet.
>
> Second, I see that two IPv6 option code points are requested, one with the "chg" flag set, the other with the "chg" flag clear. While there is no harm in this, it is not strictly necessary; the only real purpose of this flag is to determine whether the option data is or is not included in the Authentication Header Integrity Check Value computation.
>
> Mike Heard
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------