Re: I-D Action: draft-han-6man-in-band-signaling-for-transport-qos-00.txt

Toerless Eckert <tte@cs.fau.de> Thu, 19 October 2017 21:24 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CD73132CE7 for <ipv6@ietfa.amsl.com>; Thu, 19 Oct 2017 14:24:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qc9CApyKfYGo for <ipv6@ietfa.amsl.com>; Thu, 19 Oct 2017 14:24:11 -0700 (PDT)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD0F9134316 for <ipv6@ietf.org>; Thu, 19 Oct 2017 14:23:57 -0700 (PDT)
Received: from faui40p.informatik.uni-erlangen.de (faui40p.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:77]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id 2D65358C4B6; Thu, 19 Oct 2017 23:23:54 +0200 (CEST)
Received: by faui40p.informatik.uni-erlangen.de (Postfix, from userid 10463) id 11CFBB0CF16; Thu, 19 Oct 2017 23:23:53 +0200 (CEST)
Date: Thu, 19 Oct 2017 23:23:53 +0200
From: Toerless Eckert <tte@cs.fau.de>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: Tom Herbert <tom@herbertland.com>, 6man WG <ipv6@ietf.org>
Subject: Re: I-D Action: draft-han-6man-in-band-signaling-for-transport-qos-00.txt
Message-ID: <20171019212353.GC878@faui40p.informatik.uni-erlangen.de>
References: <150774513036.24791.2138264254901122467@ietfa.amsl.com> <cc11634a-b5a2-88b9-f36f-82b3fd9d8d70@gmail.com> <1D30AF33624CDD4A99E8C395069A2A162CD734B2@sjceml521-mbx.china.huawei.com> <a4da4b26-6402-ad0d-a5f5-5bddc192b8f7@gmail.com> <4E40E3EF-B0E5-490E-BFF2-0511D97E9E80@employees.org> <CALx6S341v1zd2Q9bts8-zrKxU59kieJTJJ=nHQ5w4oQZg=t_cA@mail.gmail.com> <17525287-DDA8-4930-B90B-F9228DF69A90@employees.org> <CALx6S37wLvuJ9tUGjYmzm63eq_bxq0jXSEgfCtH_2i74SvrbLA@mail.gmail.com> <20171017181646.GD31973@faui40p.informatik.uni-erlangen.de> <e7da5913-1fd9-a476-e654-44cb5cfdc10c@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <e7da5913-1fd9-a476-e654-44cb5cfdc10c@gmail.com>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/4jLYetIqfr5tVgvAuA-c5nAR07g>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Oct 2017 21:24:13 -0000

On Wed, Oct 18, 2017 at 08:57:35AM +1300, Brian E Carpenter wrote:
> > Instead of punting them because of presence of
> > RSVP-router-alert option. And of course you can blame IP multicast: every router
> > started to punt router-alert because of MLD (and of course us multicast folks
> > missed the chance to fix this in MLDv2 because it only tried to duplicate IGMPv3),
> > but no RFC told developers to punt because of router-alert + value in the router alert.
> > AFAIK, the same applies to hop-by-hop option in general. Alas, even rfc7045 did not discuss
> > this issue.
> > 
> > IMHO we need a mechanism that specifies: devices MUST NOT punt/slow down packets
> > because of the presence of this mechanism, but only because of presence of
> > (mechanism,value) where value is intended to be supported by device. If the device
> > can not do this, then it MUST IGNORE this mechanism and forward packets with the mechanism
> > as if the option was not present.
> 
> That's pretty much what RFC7045/RC8200 say, except that they
> say it as a warning.

It does not analyze the fact that the existing hop-by-hop option (and options
carried via it like router alert) are burned because existing router imple entations
punt packets with hop-by-hop options even though they do ultimately not
need to process the packets (hop by hop option they don't do or router-alert
protocol they don't do). 

And IMHO the existing hop-by-hop option is burned because the architecture
RFCs did not well enough express in MUST statements that you must never
speed down packets because of hop-by-hop/router-alert unless you really know
you will support/do-something with that option. And that you achieve this eg.:
by filtering/punting based on option/protocol. And that you can NOT do anything else.

This is also the root cause why in our analysis a hacky extraction by
eg: STUN signature inside UDP is a lot safer for existing networks than relying
on any hop-by-hop option. Badly standardized, badly implemented.

> As Ole said - within a domain where hop-by-hop option X is
> supported, you can reasonably expect that all routers process X.

Ask an enterprise operator with 10 different router models from 3 vendors ;-)

Cheers
    Toerless

> But (excuse me repeating myself), whether X is worth doing is not
> really a question for 6man. In this case, it belongs where QoS is
> discussed, which is TSVWG.
> 
>     Brian
> 
> > One simple way to do this is to define hop-by-hop-fixed that does say exactly this
> > and then hopefully allow all existing hop-by-hop TLV to live underneath that
> > fixed hop-by-hop-fixed option. But i would certainly suggest to review processing
> > complexity and extensibility before such a conclusion.
> > 
> > Personally i prefer inband UDP layer signaling, not because i do not like IPv6
> > option headers but because there is just no ubiquitous API to allow apps
> > independent of OS enhancements to set arbitrary options headers, especially ones
> > that are not yet defined (allow apps to fully defined the whole header bit by bit).
> > Lets say from a javascript app in a browser. And i am more interested in ease of
> > adoption than in architectural cleanlyness. But of course its perfectly valid to
> > do the architectural clean appraoch and then prove me wrong and get that option
> > adopted more ;-))
> > 
> > Cheers
> >     Toerless
> > 
> > On Tue, Oct 17, 2017 at 09:54:52AM -0700, Tom Herbert wrote:
> >> On one hand, IETF defined extension headers as the extensibility
> >> mechanism of IPv6, but yet on the other hand the message seems to be
> >> to not use them because deployed devices don't correctly support the
> >> protocol. The upshot is that we see proposals in other WGs of stuffing
> >> network layer information into transport protocols (options or
> >> payloads) with the full expectation that intermediate nodes will parse
> >> into the transport layer, process the embedded information, and
> >> possibly even overwrite transport layer information. IMO that is an
> >> architectural abomination and further abandonment of the end to end
> >> model!
> >>
> >>> While the 6man working group can certainly help the authors with those considerations, I believe the work would have to be owned somewhere else.
> >>> And it might be a little too early to go into the details of packet formats etc.
> >>>
> >> Agreed, but I do think the 6man working group has a vested interest to
> >> make sure that network layer information stays in the network layer.
> >> At some point the information needed is going to be so complex that it
> >> won't be able to be conveyed in any fields of the IP header.
> >>
> >> Tom
> >>
> >>> Best regards,
> >>> Ole
> >>
> >> --------------------------------------------------------------------
> >> IETF IPv6 working group mailing list
> >> ipv6@ietf.org
> >> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> >> --------------------------------------------------------------------
> > 
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------

-- 
---
tte@cs.fau.de