Re: Comments on draft-herbert-ipv6-update-dest-ops

Tom Herbert <tom@herbertland.com> Mon, 20 August 2018 16:10 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BA48130934 for <ipv6@ietfa.amsl.com>; Mon, 20 Aug 2018 09:10:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aPr7PfPDkmci for <ipv6@ietfa.amsl.com>; Mon, 20 Aug 2018 09:10:28 -0700 (PDT)
Received: from mail-qt0-x22f.google.com (mail-qt0-x22f.google.com [IPv6:2607:f8b0:400d:c0d::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6EE15127332 for <ipv6@ietf.org>; Mon, 20 Aug 2018 09:10:28 -0700 (PDT)
Received: by mail-qt0-x22f.google.com with SMTP id r21-v6so16783026qtm.2 for <ipv6@ietf.org>; Mon, 20 Aug 2018 09:10:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=pISNSdGvzCH8cbsdwOFwfrvG7CrAGH44GzjGapcb2EE=; b=oIbrjAXdADNwgZ90SgoKKmY153o/DRbjal/EpZCELOyV9GwgGnsk3RDX7hwibDnz10 gkK6aUSJYFGUqVpwbivQrRampdv+CZ2IiifSuwvTG8eKQi2Qlckdq4F5aPSj9UUYVWX6 kpD7eHOU5Ra2eJv1t2BkNG6krJoi1UoUc4IT4s61Iio4gw6UU30dWQGww5Wlgq0aGGXT a1CN0WPeq4nbh/2cKQv1brT1UkwcnHrqzlZOxgvmJUF0lWE5zExh82whn5QHmPr4mvbk G7pT6v8vLFCt8Sn1A9IfBHj30Vx3VWfOow+McITUQykD+0E1SxW2H/yAeQ0XT+TRoOT/ 0M4g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=pISNSdGvzCH8cbsdwOFwfrvG7CrAGH44GzjGapcb2EE=; b=GPnHiXqUkG0fl4SGlCzy9QI7+2NQFDhutNIlpwWwTVcy0/wCyt6qdQ/zvMJYZkQfnE bvooUz8bk/V2hP0Xu7RhwdFy1tBZuAe6g57dRrfT79HneDCFuf9310cw+uJ35OCK0Mhb xARRKtMoH+/ut8BmBThawWd78Tn8co2TD8PLAbnxQO24FKQO/Wvb/6nKpkXBX9JNtoWq RyRAeRv2X5rE4nAcMUdxCsjhGshN6bhQFUXvkyWYFkHioL0X3CS/iZ+xZVGKB/KpeUAP z/SEZzijKwrr5CeAn32kmhe+GrMr/UQ8HKdJa4Fyfe1VZGJxsBlQqddd4yjh3wSKkk4c 1vHg==
X-Gm-Message-State: AOUpUlEmTqwFbl3Dcb171YDIQJJM2xD5pWxj+fsZrnsXfNLvquBIRUaj UP0HbMAyzQXlpsz7Pt8l1W2lacfnHt2AtHCvdgoBFA==
X-Google-Smtp-Source: AA+uWPylJWFk0eLt5uYiMMrnzcKvDMncsEAtZFtsXGXrzLo6n0sw++os2fvfxRkvod9Ej5ZVbbH2wtvf2xrbvnUr9eE=
X-Received: by 2002:ac8:22ac:: with SMTP id f41-v6mr44715591qta.197.1534781427379; Mon, 20 Aug 2018 09:10:27 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ac8:3312:0:0:0:0:0 with HTTP; Mon, 20 Aug 2018 09:10:26 -0700 (PDT)
In-Reply-To: <F01E55CE-0E88-47BF-A30B-B83A0B7F5F0F@employees.org>
References: <CACL_3VF+EoKOEF-TkB3179UsmN_Yhaqt60jh_h2d2GLnE0EWDA@mail.gmail.com> <CALx6S356TVnbnZ_zp5+aK_x-DmMJUTidw0Wzbc3Tn=cscTd7VA@mail.gmail.com> <CACL_3VGUUs1FS4Qog6pzJ2WZyir2-keEVZTU6opzXQ4t0M-XUw@mail.gmail.com> <CALx6S35q5EqZt26KSPTGHBXZpzaNYyFBO9UxVNsi4is1BxUHrQ@mail.gmail.com> <CACL_3VGfMj6DjAWsxib6Hw_x=5X3CWASKU1oiGqvFdksDuFXDw@mail.gmail.com> <CALx6S37c_WCa+A3aD7X-rq-kj_RTGfGur8HVekt_LWTg6Os18g@mail.gmail.com> <F01E55CE-0E88-47BF-A30B-B83A0B7F5F0F@employees.org>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 20 Aug 2018 09:10:26 -0700
Message-ID: <CALx6S35mAnjCw=0Jmz7Niacobw2QmKkUxNJPJ-CNVok_4dAOeQ@mail.gmail.com>
Subject: Re: Comments on draft-herbert-ipv6-update-dest-ops
To: Ole Troan <otroan@employees.org>
Cc: "C. M. Heard" <heard@pobox.com>, 6man <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/7507PJuVarSui6k1X8xhOv35dRg>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Aug 2018 16:10:30 -0000

On Mon, Aug 20, 2018 at 8:40 AM, Ole Troan <otroan@employees.org> wrote:
>
>
>> On 20 Aug 2018, at 17:05, Tom Herbert <tom@herbertland.com> wrote:
>>
>> The negative converse also seems to be true. If an implementation does
>> not support parsing of Destantion Options before the Routing header,
>> then the node probably doesn't support parsing of any Destination
>> Options. This becomes an issue in router implementations that
>> terminate tunnels int the network with intent to and forward the
>> tunneled packets. For instance FD.io VPP supports VXLAN, LISP, SR-IPIP
>> among other encapsulations, AFAICT if the implementation receives an
>> encapsulated packet addressed to the node that has a Destination
>> Option (second type that follows any Routing header), either the
>> packet is either dropped or the Destination options are ignored.
>
> [wearing the VPP committer hat]
>
> VPP as a tunnel endpoint does not parse destination options. In fact at least for rfc2473 tunnels I believe it would drop packets containing one. I am not convinced you can use one implementation’s behavior to support your argument (or not). At least from a VPP perspective I would add destination option header support, as soon as there were any options that made sense to support. (And I am not convinced the tunnel encap limit option is one of them.). I certainly wouldn’t build an implementation that blindly processed destination options, if there were any to support.
>
Ole,

What you're describing is the type of deadlock that has led to IPv6
options being ossified. On one side middelboxes are only going to
support them properly once there are "options that make sense" to
support, and on the other hand host developers don't want to work to
define ones that make sense to support since middleboxes don't support
options. In-situ OAM is a good example of this. The original idea was
to put OAM in every encapsulation protocol, however that would be much
better server in either Hop-by-Hop or Destination options and now at
least IPv6 options are being defined for that.

Specifically in the case of VPP, I'm not sure why proper parsing of
Destination Options would be a be major effort. This is just software,
and probably just a few lines of implementation to implement the
parsing loop and then you'd be able to claim the VPP is protocol
compliant in this area. I think this will be a bigger issue for
hardware implementations.

Tom

> Cheers
> Ole