Re: Comments on draft-herbert-ipv6-update-dest-ops

Tom Herbert <tom@herbertland.com> Mon, 20 August 2018 20:24 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDA4F130DC6 for <ipv6@ietfa.amsl.com>; Mon, 20 Aug 2018 13:24:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, T_DKIMWL_WL_MED=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZNu6EtIcMiZv for <ipv6@ietfa.amsl.com>; Mon, 20 Aug 2018 13:24:52 -0700 (PDT)
Received: from mail-qt0-x22d.google.com (mail-qt0-x22d.google.com [IPv6:2607:f8b0:400d:c0d::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B2A6C12F18C for <ipv6@ietf.org>; Mon, 20 Aug 2018 13:24:52 -0700 (PDT)
Received: by mail-qt0-x22d.google.com with SMTP id y5-v6so17707247qti.12 for <ipv6@ietf.org>; Mon, 20 Aug 2018 13:24:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=QXrgwj/ROq1qovG57YfhAiSG0qBx7/8M4JGT3K0GB0U=; b=lg5SmnJMWxD5iKE76r9BRIvwqrLuPpQkcu1NzoAeCX+D3Bq0Ozcjunc61WQmLKBzTH q4G2FKqHcVy65jfZqLOGKmYSUt/ueSv0Zs4uM1tSYkhvEOLK/q0Z12vzRnUDFUw2DJIK a72NWr2+4CTfeiiAcg6D7DPUyUSOcuBdSluMpcfN0U9k+O2meGxnzjWjlbT7Kst/Gxuy hgn4kXc1dI37BngDGNNm3eSYbtm5GVmhrnSUFv/zp+ljGgE3cxDLZdG20xZcPX50NADL J48amevG2F35l1p+CudYzVKLlV4YlPHrJNfjguhnhnf1YfppklmkmQCZ33jcPcohj7tb rkSQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=QXrgwj/ROq1qovG57YfhAiSG0qBx7/8M4JGT3K0GB0U=; b=HkNeUy1b6ruuv3zqdH/Nv4mcGN6h9PnKkR0quFKGExohiFAXvLAnfGoiYzvEd75I5/ hOQRNFoHur+jZFDr3Erp4WKFJhKFUmY/w/QP79q953w+VY5Ph18zl4jBpaqGSqdVCxu3 llmADqgOUGvpvY0O3+5OwAVZqkAmBt9f7lVoSrVTzPftQbXm9ozQzNv6KNkvjcuOSATt 6dBYnMYOw2lJq/NM4IokU5viDNVjPqaSsxEjZiYAcNLNXg5kRg118PSqLq+l7kbLdT/f aqJzQKI4KT3Vdnn2yzX42wHb4f988zhifOBfXqxN6CdSisC9WdTvBM3Dv/QqJBpbG9WS wvzA==
X-Gm-Message-State: AOUpUlGPMGW7g/TcHx/nuWM7MMa9tkZ9DeyKGfMHWw1OS84bVgewH5jX 62sXeu4vTZiSHThbcysc43ABR6liJDPEHFvCNaVCNw==
X-Google-Smtp-Source: AA+uWPzy90Jsp8TmNhnBGyC6uunVuMHlLbIOnyXGV6SqQMV4n07EsNs+kbXFeJyg9fc2Fahku676UmGbIjprtnHX89I=
X-Received: by 2002:a0c:fac4:: with SMTP id p4-v6mr42543579qvo.179.1534796691708; Mon, 20 Aug 2018 13:24:51 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:ac8:3312:0:0:0:0:0 with HTTP; Mon, 20 Aug 2018 13:24:50 -0700 (PDT)
In-Reply-To: <3EDB470F-3B52-4410-8E7F-21C0C503CACB@gmail.com>
References: <CACL_3VF+EoKOEF-TkB3179UsmN_Yhaqt60jh_h2d2GLnE0EWDA@mail.gmail.com> <CALx6S356TVnbnZ_zp5+aK_x-DmMJUTidw0Wzbc3Tn=cscTd7VA@mail.gmail.com> <CACL_3VGUUs1FS4Qog6pzJ2WZyir2-keEVZTU6opzXQ4t0M-XUw@mail.gmail.com> <CALx6S35q5EqZt26KSPTGHBXZpzaNYyFBO9UxVNsi4is1BxUHrQ@mail.gmail.com> <CACL_3VGfMj6DjAWsxib6Hw_x=5X3CWASKU1oiGqvFdksDuFXDw@mail.gmail.com> <CALx6S37c_WCa+A3aD7X-rq-kj_RTGfGur8HVekt_LWTg6Os18g@mail.gmail.com> <F01E55CE-0E88-47BF-A30B-B83A0B7F5F0F@employees.org> <f0be4512-b05c-0975-97e2-454a500c8c37@joelhalpern.com> <3EDB470F-3B52-4410-8E7F-21C0C503CACB@gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 20 Aug 2018 13:24:50 -0700
Message-ID: <CALx6S36nC0OMu=d_tK7z5RCK+L3xCJm4kHrthfwhWUQAZgr51A@mail.gmail.com>
Subject: Re: Comments on draft-herbert-ipv6-update-dest-ops
To: Fred Baker <fredbaker.ietf@gmail.com>
Cc: "Joel M. Halpern" <jmh@joelhalpern.com>, Ole Troan <otroan@employees.org>, "C. M. Heard" <heard@pobox.com>, 6man <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/Avb0E1Kb8SX5rFAoBYmy51_wVvg>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Aug 2018 20:24:55 -0000

On Mon, Aug 20, 2018 at 12:00 PM, Fred Baker <fredbaker.ietf@gmail.com> wrote:
> From my perspective, a tunnel endpoint is a destination. If we want any given destination, an example of which is a tunnel endpoint, to not process some set of options, I would suggest that we simply don't put those options into the header. The question isn't whether the endpoint should process them; it's whether the option is appropriate and useful.
>
Fred,

The problem isn't that the endpoint doesn't handle any unknown options
that would otherwise be skipped, it's that endpoints are dropping
packets simply by virtue that a Destination Options header is present.
That behavior is not consistent with RFC8200 and is detrimental to our
ability to ever define and use useful options.

Tom

>> On Aug 20, 2018, at 9:07 AM, Joel M. Halpern <jmh@joelhalpern.com> wrote:
>>
>> I can see two sides to this.  On the one hand, we want tunnel termination logic to be fast and effecient.  Requiring that it have only the necessary information, and not other random things, is part of our tool kit for achieving that.
>>
>> On the other hand, the outer IP header, in the case of v6, is clearly destined for the tunnel terminator.  And the IPv6 spec is very clear that certain kinds of processing for IPv6 destination options are mandatory at such a destination.  For example, retunring an error if ther eia an unknown IPv6 destination option with the bit set to force errors.
>>
>> Clearly, doing the checks for that is more expensive.  Equally, it seems to be clearly required by our current specs.
>>
>> Yours,
>> Joel
>>
>> On 8/20/18 11:40 AM, Ole Troan wrote:
>>>> On 20 Aug 2018, at 17:05, Tom Herbert <tom@herbertland.com> wrote:
>>>>
>>>> The negative converse also seems to be true. If an implementation does
>>>> not support parsing of Destantion Options before the Routing header,
>>>> then the node probably doesn't support parsing of any Destination
>>>> Options. This becomes an issue in router implementations that
>>>> terminate tunnels int the network with intent to and forward the
>>>> tunneled packets. For instance FD.io VPP supports VXLAN, LISP, SR-IPIP
>>>> among other encapsulations, AFAICT if the implementation receives an
>>>> encapsulated packet addressed to the node that has a Destination
>>>> Option (second type that follows any Routing header), either the
>>>> packet is either dropped or the Destination options are ignored.
>>> [wearing the VPP committer hat]
>>> VPP as a tunnel endpoint does not parse destination options. In fact at least for rfc2473 tunnels I believe it would drop packets containing one. I am not convinced you can use one implementation’s behavior to support your argument (or not). At least from a VPP perspective I would add destination option header support, as soon as there were any options that made sense to support. (And I am not convinced the tunnel encap limit option is one of them.). I certainly wouldn’t build an implementation that blindly processed destination options, if there were any to support.
>>> Cheers
>>> Ole
>>> --------------------------------------------------------------------
>>> IETF IPv6 working group mailing list
>>> ipv6@ietf.org
>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>> --------------------------------------------------------------------
>>
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
>
> --------------------------------------------------------------------------------
> The fact that there is a highway to hell and a stairway to heaven is an interesting comment on projected traffic volume...
>