Re: IPv6 header insertion in a controlled domain

Alexandre Petrescu <alexandre.petrescu@gmail.com> Wed, 11 December 2019 07:55 UTC

Return-Path: <alexandre.petrescu@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55A3812088E for <ipv6@ietfa.amsl.com>; Tue, 10 Dec 2019 23:55:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.631
X-Spam-Level:
X-Spam-Status: No, score=-2.631 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_CUSTOM_MED=0.001, FREEMAIL_FROM=0.001, NML_ADSP_CUSTOM_MED=0.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7irSIkcJxK5w for <ipv6@ietfa.amsl.com>; Tue, 10 Dec 2019 23:55:00 -0800 (PST)
Received: from cirse-smtp-out.extra.cea.fr (cirse-smtp-out.extra.cea.fr [132.167.192.148]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2293512088C for <ipv6@ietf.org>; Tue, 10 Dec 2019 23:54:59 -0800 (PST)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by cirse-sys.extra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id xBB7swhp039427 for <ipv6@ietf.org>; Wed, 11 Dec 2019 08:54:58 +0100
Received: from pisaure.intra.cea.fr (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id 596772021F5 for <ipv6@ietf.org>; Wed, 11 Dec 2019 08:54:58 +0100 (CET)
Received: from muguet2-smtp-out.intra.cea.fr (muguet2-smtp-out.intra.cea.fr [132.166.192.13]) by pisaure.intra.cea.fr (Postfix) with ESMTP id 4F37B200CE7 for <ipv6@ietf.org>; Wed, 11 Dec 2019 08:54:58 +0100 (CET)
Received: from [10.8.35.150] (is154594.intra.cea.fr [10.8.35.150]) by muguet2-sys.intra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id xBB7swlc002855 for <ipv6@ietf.org>; Wed, 11 Dec 2019 08:54:58 +0100
Subject: Re: IPv6 header insertion in a controlled domain
To: ipv6@ietf.org
References: <CALx6S3588ja9AZzBQ0dqwx0j-ki6A5tusye+odQKPyAyF+hEww@mail.gmail.com> <10E890EA-3278-44EE-881E-EBC91D419587@employees.org> <88287cb0-c0c3-f990-4dd7-338df87c7fb2@joelhalpern.com> <4E76C386-FB1E-4E48-814D-BB626466BEE3@employees.org> <CAO42Z2ze7tmkGh=E-YrPuJHMeD8V6EuxgjjaJ33iz+Ms3abNsA@mail.gmail.com> <ED9B7C60-ACDE-4107-A121-AE2DAEA6B640@employees.org> <8b9e34fe-7a7d-31eb-ce23-056f34c7ba8f@joelhalpern.com>
From: Alexandre Petrescu <alexandre.petrescu@gmail.com>
Message-ID: <09bf286a-3170-d202-20c1-6d0feeb399f9@gmail.com>
Date: Wed, 11 Dec 2019 08:54:58 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.3.0
MIME-Version: 1.0
In-Reply-To: <8b9e34fe-7a7d-31eb-ce23-056f34c7ba8f@joelhalpern.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: fr
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/29Tu966uA52EPN4YeEn8vgQX-y0>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Dec 2019 07:55:02 -0000


Le 08/12/2019 à 17:10, Joel M. Halpern a écrit :
> Ole, as far as I can tell, to answer the apparently simple quesiton you 
> propose "is there a s safe way to do header insertion?" we would need
> o a clear definition of the domain in which it is to be done

In that direction, I think there could be two distinct kinds of domains 
that would denote a limited domain:

- an Enterprise network.

- a single large computer with numerous virtual nodes.

In each of these the EH insertion/deletion might not disturb the 
Internet at large.  The sentinels could be DMZs or 'air gaps'.

Alex

> o a clear definition of the participants
> o and a full re-examination of the discussion which led to the 
> prohibition against doing so in RFC 8200
> 
> We do not have in front of us a document which achieves either of the 
> first two bullets. Without that, it is very hard for us to perform the 
> third bullet.
> 
> I note for example that the presentation in Sngapore did not disucss the 
> implications or behaviors of hosts inside the Segment Routing v6 domain. 
>   But the rfc-to-be explicitly includes hosts inserting the information 
> in the original header.
> the presentation in Singapore did not discuss how SR header creators 
> will deal with errors caused by in=-path header insertion, when the 
> errors arrive at places that did not perform the insertion.
> 
> But there is a more important issue.  The usual IETF practice (not the 
> rule, but a practice we have found to be good) is to ask what problem is 
> being solved BEFORE we evaluate solutions.  There are many good reasons 
> why we have found this helpful.  You seem to be asking for the opposite.
> 
> I find myself forced to repeat my question:  what benefit is header 
> insertion bringing to justify working group consideration.
> I understand your earlier request not to repeat points.  But for me at 
> least, it is very hard to answer your question without that.
> 
> Yours,
> Joel
> 
> On 12/8/2019 4:24 AM, otroan@employees.org wrote:
>> Mark,
>>
>> [...]
>> [renamed thread]
>>
>>> Take an example of 3 routers A, B and C that is under the same control.
>>> Traffic travels from left to right.
>>>
>>> A -- B -- C
>>>
>>> A has a tunnel to C using ULA source and destination.
>>> A packet ingresses on A, is encapsulated and forwarded towards C.
>>> A has for reasons unknown to us outsourced a function to B. Where B 
>>> insert an extension header in the packet originated by A.
>>> C is also in on the game, being a tunnel end-point, removing the 
>>> encapsulating header and extension header.
>>>
>>> If you can leave the nuances of SR and the whatever they propose on 
>>> the shelf for a minute.
>>>
>>> Do you agree in principle that this approach of "header insertion in 
>>> a controlled domain" can be made to work,
>>> and should be indiscernible from A inserting the extension header 
>>> itself?
>>
>> Yes, there are obviously many ways of skinning this cat.
>> In this thread I don't want to try solve whatever problem the EH 
>> insertion camp wants solved. I don't think I understand it well enough.
>> And I'm unconvinced the 6man group in general understands the 
>> underlaying routing problems leading to the proposed solution.
>> What I was interested in exploring in this thread was if we could 
>> reach agreement that there in principle is a safe way of doing header 
>> insertion.
>>
>> In my simple example above.
>> Do you agree that in a controlled distributed system there is no 
>> perceivable difference between node A inserting the header or node B 
>> doing it?
>> Conceptually you could think of it as a tunnel with muliple endpoints 
>> (although that's a bit hard to visualize ;-)).
>>
>> Can we agree that inserting headers and changing the packet size among 
>> participating nodes in a distributed system is not inherently unsafe?
>> As far as I can think of the only complication to be considered is 
>> that node A must be aware of packet size changes when doing PMTU 
>> estimation.
>> (typically though in these types of networks, one simply declares that 
>> "MTU must be well managed. i.e. large enough".
>>
>> Cheers,
>> Ole
>>
>>
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------