Re: New Version Notification for draft-voyer-6man-extension-header-insertion-07.txt

Tom Herbert <tom@herbertland.com> Sat, 21 September 2019 17:04 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 809C6120071 for <ipv6@ietfa.amsl.com>; Sat, 21 Sep 2019 10:04:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P7S0L49KWLKq for <ipv6@ietfa.amsl.com>; Sat, 21 Sep 2019 10:04:17 -0700 (PDT)
Received: from mail-ed1-x52a.google.com (mail-ed1-x52a.google.com [IPv6:2a00:1450:4864:20::52a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4600812004C for <6man@ietf.org>; Sat, 21 Sep 2019 10:04:17 -0700 (PDT)
Received: by mail-ed1-x52a.google.com with SMTP id r4so9146064edy.4 for <6man@ietf.org>; Sat, 21 Sep 2019 10:04:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=pLejm1FalucBL8HvoozIlZl9qp/RwY0ihcBy5eopl2c=; b=b5zVRluntxm5KcR7nqIxoqEm846UFQYGmQF/zkHNs7xZ2Vn2BGyAx90iKWd8WQSwck cTyobz6hCjsz6Kz3C+MB5iyYObRynBSyZARghyvL7Q1etXjGZj5r5n5ErdzYCWplChQy aIS2pxZQb4l35/hd01lr7VEkc2ogwZKQ6wLoaozIOVGaVZ6V9se/rX3aBw1+cet35JoH 1aAMxjp3NGIxiuwEzqfGD9rHNov14f30w+wGYAHM5Ewn/g51ZoJp0EoNbCWDRG2Ue1Pj i04dsc8KQXfZVPGi0SFVNNT+A7G/slMAqnY/qJsqF83WfGBKvO4T2LJfsWAaXJ0pL/Ll RR5g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=pLejm1FalucBL8HvoozIlZl9qp/RwY0ihcBy5eopl2c=; b=LCnVRHcu/qwa8JEWmpnKBx13qtubA7kDArfl8im85KJhRPagGV/hguaKRrF8lu6UFS 9owmnPW6xBXfewb9K3jZKWfHKLF/0sYKv0NjXcWRMylsax8KrPwNf3XXuGDIZ+PdGTeu YeYes4V2WHC6lUwbFbdGlQgcv/hLYsUP/UYBoXiMpsa6nLpoO8y0Hv7sMEARl79P8kdl ruqlmmHU4xyxyKmy0/R1DaCGGWGlfF8ZSACSoRUh0dj0+ucDTsj9PMGdcgHghFO3thPt mWqotku47Zx+eJ1nAYGHnq4Oeb5y0/rNU9oN7dpUPDtL3nDoTjrYOtqswX7t/z5iqyy5 VMww==
X-Gm-Message-State: APjAAAUM5TVoS+WdOd2tXX5mw/Yhudbrm5uOJc8h/dGHNTO8o0SdgEA3 ZOPVGbxuRuIoMJlMnUiiMd9bykRuoeLLBubo26MywQ==
X-Google-Smtp-Source: APXvYqzUsO5rF99DQHfs/OsxPuZxQVcfe2i2OvX3AWyfw04+AZpD589ZgmGFXbshnfKkNAq/2oehYHt2F/lEaqzbZKE=
X-Received: by 2002:aa7:d789:: with SMTP id s9mr28446519edq.62.1569085455647; Sat, 21 Sep 2019 10:04:15 -0700 (PDT)
MIME-Version: 1.0
References: <156903961357.5092.16907354634703727132.idtracker@ietfa.amsl.com> <21D937AA-0B27-4E8D-BB6E-99452F72AC30@cisco.com>
In-Reply-To: <21D937AA-0B27-4E8D-BB6E-99452F72AC30@cisco.com>
From: Tom Herbert <tom@herbertland.com>
Date: Sat, 21 Sep 2019 10:04:02 -0700
Message-ID: <CALx6S35Mehd_LUMt_gL=nr_B29vTND4KfYjjiiPtBaj_JjyWFQ@mail.gmail.com>
Subject: Re: New Version Notification for draft-voyer-6man-extension-header-insertion-07.txt
To: "Darren Dukes (ddukes)" <ddukes@cisco.com>
Cc: 6man <6man@ietf.org>, SPRING WG <spring@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/C0L_m9z-ajJB74RZgFF2BGrOyX0>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Sep 2019 17:04:21 -0000

Some comments:

Most of the constraints listed section 2.2 should be specified as
normative requirements.

"SR domain link MTU is sufficiently greater than the MTU at the
ingress edge of the SR domain..." should be the requirement: "The MTU
for all paths in the domain MUST be large enough to accommodate the
maximum length of an inserted SRH"

Also, for sizing MTU some guidance to the operator to determine what
the maximum length SRH they will ever need would be useful.

"Within the context of this document and the described SRH use-case
within the SR domain, the SR domain can guarantee that SRH is the sole
extension header after the outer IPv6 header." should be the
requirement "An SRH MUST NOT be inserted into a packet that already
has extension headers"

"All traffic within the SR domain has IPv6 source and destination
address within the SR domain." should be requirement: "All traffic
within the SR domain MUST have an IPv6 source and destination address
that is within the SR domain."

Similarly, "Only traffic sourced from and destined to nodes in the SR
domain may have an SRH inserted." could be: "Traffic sourced from or
destined to a node outside of the SR domain MUST NOT have an SRH
inserted."

About "IPv6 encapsulation and optional insertion of SRH at the SR
domain ingress edge generates a new IPv6 packet." and "IPv6
encapsulation and SRH insertion at SR Domain ingress edge."

This is a bit confusing in the use of the word "insertion" in the
context of encapsulation, and on first read it seemed to be allowing
SRH insertion at ingress into the domain (without encapsulating).
Instead of saying "insertion" here, maybe something like "the SRH may
be included when encapsulating". That is, reserve the term "insertion"
to explicitly mean when SRH is being inserted into an existing IPv6
packet without encapsulating.

The attribution problem hasn't been addressed. I imagine it may be
possible to put the address of the node inserting an SRH somewhere in
the header in order to provide proper attribution.

Tom


Tom

On Fri, Sep 20, 2019 at 9:35 PM Darren Dukes (ddukes) <ddukes@cisco.com> wrote:
>
> Hello everyone, we’ve just submitted an updated draft that explains why SRH insertion is performed in an SR domain, how it is accomplished and why it is safe within the SR domain.
>
> The authors look forward to your comments and suggestions on how to improve this document.
>
> Thanks!
>   Darren (on behalf of the authors)
>
> Begin forwarded message:
>
> From: <internet-drafts@ietf.org>
> Subject: New Version Notification for draft-voyer-6man-extension-header-insertion-07.txt
> Date: September 21, 2019 at 12:20:13 AM EDT
>
>
> A new version of I-D, draft-voyer-6man-extension-header-insertion-07.txt
> has been successfully submitted by Darren Dukes and posted to the
> IETF repository.
>
> Name: draft-voyer-6man-extension-header-insertion
> Revision: 07
> Title: Insertion of IPv6 Segment Routing Headers in a Controlled Domain
> Document date: 2019-09-20
> Group: Individual Submission
> Pages: 13
> URL:            https://www.ietf.org/internet-drafts/draft-voyer-6man-extension-header-insertion-07.txt
> Status:         https://datatracker.ietf.org/doc/draft-voyer-6man-extension-header-insertion/
> Htmlized:       https://tools.ietf.org/html/draft-voyer-6man-extension-header-insertion-07
> Htmlized:       https://datatracker.ietf.org/doc/html/draft-voyer-6man-extension-header-insertion
> Diff:           https://www.ietf.org/rfcdiff?url2=draft-voyer-6man-extension-header-insertion-07
>
> Abstract:
>   Traffic traversing an SR domain is encapsulated in an outer IPv6
>   header for its journey through the SR domain.
>
>   To implement transport services strictly within the SR domain, the SR
>   domain may require insertion or removal of an SRH after the outer
>   IPv6 header of the SR domain.  Any segment within the SRH is strictly
>   contained within the SR domain.
>
>   The SR domain always preserves the end-to-end integrity of traffic
>   traversing it.  No extension header is manipulated, inserted or
>   removed from an inner transported packet.  The packet leaving the SR
>   domain is exactly the same (except for the hop-limit update) as the
>   packet entering the SR domain.
>
>   The SR domain is designed with link MTU sufficiently greater than the
>   MTU at the ingress edge of the SR domain.
>
>
>
>
>
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> The IETF Secretariat
>
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------