Re: [IPv6] Progress of comments resolution on draft-ietf-6man-enhanced-vpn-vtn-id

"Dongjie (Jimmy)" <jie.dong@huawei.com> Thu, 22 February 2024 14:53 UTC

Return-Path: <jie.dong@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B4D3AC180B58; Thu, 22 Feb 2024 06:53:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.896
X-Spam-Level:
X-Spam-Status: No, score=-6.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JavrUXgycFqg; Thu, 22 Feb 2024 06:53:33 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B4A14C180B57; Thu, 22 Feb 2024 06:53:32 -0800 (PST)
Received: from mail.maildlp.com (unknown [172.18.186.31]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4Tgbcy6vqCz6JB5X; Thu, 22 Feb 2024 22:49:06 +0800 (CST)
Received: from lhrpeml100004.china.huawei.com (unknown [7.191.162.219]) by mail.maildlp.com (Postfix) with ESMTPS id BEEB3141B1A; Thu, 22 Feb 2024 22:53:29 +0800 (CST)
Received: from dggpemm100008.china.huawei.com (7.185.36.125) by lhrpeml100004.china.huawei.com (7.191.162.219) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Thu, 22 Feb 2024 14:53:28 +0000
Received: from kwepemd100004.china.huawei.com (7.221.188.31) by dggpemm100008.china.huawei.com (7.185.36.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Thu, 22 Feb 2024 22:53:26 +0800
Received: from kwepemd100004.china.huawei.com ([7.221.188.31]) by kwepemd100004.china.huawei.com ([7.221.188.31]) with mapi id 15.02.1258.028; Thu, 22 Feb 2024 22:53:26 +0800
From: "Dongjie (Jimmy)" <jie.dong@huawei.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>
CC: '6man' <ipv6@ietf.org>, "draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org" <draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org>
Thread-Topic: [IPv6] Progress of comments resolution on draft-ietf-6man-enhanced-vpn-vtn-id
Thread-Index: AQHaLR01Y1R43W8G1UWMSw5Ldo9B17CoMC6AgAbxxICABgQwAIBfhXMAgAIwZZA=
Date: Thu, 22 Feb 2024 14:53:26 +0000
Message-ID: <f1df53ca24c74c6db6f8a3c50df55b3e@huawei.com>
References: <165d35ecaaa44a3daff0783cd161eb12@huawei.com> <014c01da2cde$f6e31510$e4a93f30$@olddog.co.uk> <2fcc89b28bc64c7cb5cf2abf20319006@huawei.com> <021e01da2d1d$2efc2930$8cf47b90$@olddog.co.uk> <DU2PR02MB1016002CC68F1D799A4562D9D888CA@DU2PR02MB10160.eurprd02.prod.outlook.com> <fc34b0f89c3f4af2b4fb5c5dc5d9f7bd@huawei.com> <05a901da3503$3d7a9a30$b86fce90$@olddog.co.uk> <DU2PR02MB10160EC5E57CE538ADC0B6B8D88572@DU2PR02MB10160.eurprd02.prod.outlook.com>
In-Reply-To: <DU2PR02MB10160EC5E57CE538ADC0B6B8D88572@DU2PR02MB10160.eurprd02.prod.outlook.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.82.104.242]
Content-Type: multipart/alternative; boundary="_000_f1df53ca24c74c6db6f8a3c50df55b3ehuaweicom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/E-_jH4M8MUc-C1UUyKzYhU9bVXI>
Subject: Re: [IPv6] Progress of comments resolution on draft-ietf-6man-enhanced-vpn-vtn-id
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Feb 2024 14:53:35 -0000

Hi Med,

Thanks for your reply. Yes the draft was updated based on the discussion on and off the list.

Please find some of my response inline:

From: mohamed.boucadair@orange.com <mohamed.boucadair@orange.com>
Sent: Wednesday, February 21, 2024 9:01 PM
To: adrian@olddog.co.uk; Dongjie (Jimmy) <jie.dong@huawei.com>
Cc: '6man' <ipv6@ietf.org>; draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org
Subject: RE: [IPv6] Progress of comments resolution on draft-ietf-6man-enhanced-vpn-vtn-id

Hi Adrian, Jie, all,

(apologies for the long delay to follow-up. Thanks Jie for the updated version)

You made good observations, but I'm still struggling to see a good justification for the complexity induced by this S bit.

[Jie] That is fine. It is useful to share opinions on the S bit on the list, which could help people to better understand it.


For example, even if the S bit is used, configuration actions are still required. At least, ingress nodes should be provided with the appropriate instructions that will trigger the setting of the S bit as a function of the NRP ID, and eventually as a function of the flow (if I got well the finer grained use case you listed below).

[Jie] You are right that for NRPs which the node needs to participate in, NRP-specific configuration is needed, but this is not what the S bit is designed for. In contrary, the S bit is used to control the forwarding behavior for NRPs (or for some flows of the NRPs) which are NOT configured on the node (please note in the text of the draft, S bit is checked if the NRP ID in the NRP option does NOT match with any of the NRP ID provisioned on the network node).


Likewise, intermediate node should provided with the NRP-ID they belong to + resources partitioning information (which are much more complex, IMO) + any configuration as per 5.1.1. of draft-ietf-6man-hbh-processing.

[Jie] Same response as above, for NRPs which need to be enabled on the node, such configuration is needed. While this is orthogonal to the functionality of the S bit.


You said: "I would say that the field should be marked "Reserved" not "Flags", meaning that the document that defined the S flag would also have to Update the base spec to define the Flags field". I'm not sure the argument stands here because the field can simply be tagged as "Unassigned" as per Section 6 of RFC 8126:

      Unassigned:  Not currently assigned, and available for assignment
            via documented procedures.  While it's generally clear that
            any values that are not registered are unassigned and
            available for assignment, it is sometimes useful to
            explicitly specify that situation.  Note that this is
            distinctly different from "Reserved".

[Jie] I'd not comment on this. While if the WG reaches consensus that the S bit is needed, we may not need to discuss this further.

Best regards,
Jie

Thank you.

Cheers,
Med

De : Adrian Farrel <adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>>
Envoyé : vendredi 22 décembre 2023 19:18
À : 'Dongjie (Jimmy)' <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>; BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>>
Cc : '6man' <ipv6@ietf.org<mailto:ipv6@ietf.org>>; draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org<mailto:draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org>
Objet : RE: [IPv6] Progress of comments resolution on draft-ietf-6man-enhanced-vpn-vtn-id


Well, I'm going to pile in once more (it *is* Christmas) and then sit back to see whether there are other opinions...



  *   As Ketan observed (a little late ;-) the proposed S flag comes from the NRP ID extension header, so there is no shortage of flags.



  *   Yes, Med is right, this function could be configured at each node. Indeed, most things can be configured at nodes, but does that mean we discard the IGPs? :-)



  *   The S flag provides greater granularity than can be achieved with configuration. If you configure "discard or best effort" you have some choices:



     *   Configure the default behaviour for "I don't have resources for this NRP ID". That is relatively simple, but it is "one size fits all."
     *   Configure the behaviour for each NRP ID that might be seen and for which resources aren't reserved. That feels like a nightmare for configuration.
     *   Set the requested behaviour in the packet (as the S flag) which allows different behaviours for different NRP IDs without the overhead of configuration on nodes that are unlikely to see packets for an NRP ID for which they don't have reserved resources.



  *   In fact, the S flag provides even greater granularity because it can be set per packet meaning that some packets within the NRP can take best effort, while others can be dropped. This, I think, recognises that an NRP carries multiple flows for different purposes (easy example is that different network slices might need different treatments).



And (again, in case any one is still worried) the NRP ID in the packet is not used to make any routing or forwarding decisions. It simply indicates which resources (bandwidth, queues, ...) are used by the packet.



So, I *do* see that the S flag could be moved to another document.  However, I think that would be jut making work for everyone. I also think it would be odd to define the base extension header with a flags field that has no flags defined - if I were an external reviewer of that, I would say that the field should be marked "Reserved" not "Flags", meaning that the document that defined the S flag would also have to Update the base spec to define the Flags field.



Cheers,

Adrian



-----Original Message-----
From: Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>
Sent: 18 December 2023 15:47
To: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>; adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>
Cc: '6man' <ipv6@ietf.org<mailto:ipv6@ietf.org>>; draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org<mailto:draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org>
Subject: RE: [IPv6] Progress of comments resolution on draft-ietf-6man-enhanced-vpn-vtn-id



Hi Med and Adrian,



Thanks for the discussion. Here I'd like to give some further explanation about the usage of the S bit and why it is considered useful.



In normal IPv6 packet forwarding, the next-hop and outgoing interface are determined based on longest matching of the destination IPv6 address. Packets with unmatched destination address are always dropped.



After the introduction of the VTN (or NRP, will use VTN just in this mail) option, the next-hop and outgoing interface are still determined based on the destination address, this is unchanged.



Then for packets whose next-hop and outgoing interface are determined, the VTN ID in the packet is used to match with the sets of local resources allocated to VTNs on the outgoing interface. There are two possible results:



  1) The VTN ID in the packet matches with the same VTN ID which is configured on the outgoing interface with a set of network resources, then the packet is forwarded using that set of resources.



  2) The VTN ID in the packet does not match with any VTN ID configured on the outgoing interface. How should the node behave in this case? There are two options: 1) forward the packet with best effort. 2) discard the packet.



The S flag is used to tell the node how to forward the packet when the VTN-ID is not configured on the outgoing interface.



With the above, I hope the functionality of the S flag is clear.



Then the possible question is can this be achieved by configuration?



The answer is it can, but possibly with a relatively higher cost. Note this is to control the behavior for NRPs which are not provisioned on the node's outgoing interface. Usually devices do not provide control configuration for elements which are not enabled. Even if such configuration is supported, as the behavior can be different per NRP, this requires lots of configuration for NRPs which are not enabled. Then we also need to consider the case where the behavior may be different for different flows under the same NRP...



One analogy (not quite the same) to the S flag is the bits in IPv6 extension header options which are used to control the forwarding behavior when the option cannot be parsed by some node. That may also be achieved via configuration on the nodes, while it turns out a better choice is to use flags to indicate the behavior for unrecognized entities.



With the above analysis, hope you also agree that the S flag is a more efficient approach for the required functionality.



Best regards,

Jie



> -----Original Message-----

> From: mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com> <mohamed.boucadair@orange.com<mailto:mohamed.boucadair@orange.com>>

> Sent: Thursday, December 14, 2023 8:23 PM

> To: adrian@olddog.co.uk<mailto:adrian@olddog.co.uk>; Dongjie (Jimmy) <jie.dong@huawei.com<mailto:jie.dong@huawei.com>>

> Cc: '6man' <ipv6@ietf.org<mailto:ipv6@ietf.org>>; draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org<mailto:draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org>

> Subject: RE: [IPv6] Progress of comments resolution on

> draft-ietf-6man-enhanced-vpn-vtn-id

>

> Hi Adrian,

>

> > If the reason for splitting was technical or made for a radical

> > improvement in readability, I might buy it. But I think it is purely a

> > documentation issue.

>

> It isn't.

>

> The issue is that the use of the S bit is not justified, including with the case you

> mentioned below. This scan be handled by a local config parameter. I fail to see

> valid arguments so far why a per-NRP per-packet behavior will needed to

> process a packet.

>

> Cheers,

> Med

>

> > -----Message d'origine-----

> > De : ipv6 <ipv6-bounces@ietf.org<mailto:ipv6-bounces@ietf.org>> De la part de Adrian Farrel Envoyé :

> > mardi 12 décembre 2023 18:04 À : 'Dongjie (Jimmy)'

> > <jie.dong@huawei.com<mailto:jie.dong@huawei.com>> Cc : '6man' <ipv6@ietf.org<mailto:ipv6@ietf.org>>;

> > draft-ietf-6man-enhanced-vpn-vtn- id@ietf.org<mailto:id@ietf.org> Objet : Re: [IPv6]

> > Progress of comments resolution on draft-ietf-

> > 6man-enhanced-vpn-vtn-id

> >

> > Hi Jie,

> >

> > I rather expected some more comments on this, and I sat back to watch

> > them, but then it went quiet and I forgot.

> >

> > So, "better late than never".

> >

> > As an aside, I wonder whether you should follow the advice given by

> > TEAS in its work on draft-ietf-teas-enhanced-vpn, and feeding into IDR

> > on draft-dong-idr-sr-policy-nrp. That is, generalise the VTN use case

> > to NRP. I don't think this makes any technical change to the document,

> > but makes the applicability wider (more

> > generic) in step with what TEAS is doing. This seems to in keeping

> > with the suggestions in your Section 5. But it would require some

> > editorial work.

> >

> > I am not enthusiastic about splitting out multiple documents. It just

> > makes more work.

> >

> > While I understand that the authors and Med thought this might be a

> > compromise, I doubt that the authors really want to do this (that is,

> > make more work for themselves) and since no one spoke up on the list,

> > I wonder whether it the (perfectly valid) preference of only one

> > person.

> >

> > If the reason for splitting was technical or made for a radical

> > improvement in readability, I might buy it. But I think it is purely a

> > documentation issue.

> >

> > It is worth noting that if the document was split then, without the S

> > flag, the whole flags field would be unused in the remaining document.

> > It is "unusual" for a spec to define a field that has no documented

> > use. I'd be uncomfortable with that.

> > Conversely, I think this drat should introduce a new registry to track

> > the flags field

> >

> > Personally, I see some value in the S bit as defined. At least, I do

> > in the context of the network slicing use of the NRP. Consider a

> > network where some resources are strictly partitioned

> > (reserved) at some transit nodes, but at other nodes (perhaps ones

> > that are known to have plenty of capacity) no partitioning has been

> > performed. In this case, you would want the nodes that have not done

> > any partitioning to not be bothered by the VTN/NRP ID carried in the

> > packet. But consider, instead, a network that is resource constrained

> > where partitioning has been carefully performed on all nodes. In this

> > case you would want to observe that the packet cannot be assigned to

> > any partition and so should not use the resources of any other

> > partition.

> >

> > Well, I think this might be softened for two reasons:

> > 1. If a node does not understand the HBH option, it will skip over it

> > (you have specified the highest-order 2 bits are set to 00), so the

> > default behaviour is to try to forward the packet.

> > 2. Assigning best-effort forwarding to packets seems like a reasonable

> > default.

> >

> > So, I would keep the S bit in this, but I would change "drop" to

> > "perform best effort forwarding". (Noting, of course, that the best

> > you can do might still be to drop the packet.)

> >

> > Cheers,

> > Adrian

> >

> > > From: ipv6 [mailto:ipv6-bounces@ietf.org] On Behalf Of Dongjie

> > (Jimmy)

> > > Sent: Wednesday, November 8, 2023 12:59 AM

> > > To: 6man <mailto:ipv6@ietf.org>

> > > Cc: draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org<mailto:draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org>

> > > Subject: [IPv6] Progress of comments resolution on

> > draft-ietf-6man-enhanced-vpn-vtn-id

> > >

> > > Hi WG,

> > >

> > > Regarding Med's review comments on

> > > draft-ietf-6man-enhanced-vpn-vtn-id,

> > the authors

> > > and Med met in Prague and reach some agreement about the

> > possible

> > resolution of his

> > > comments.

> > >

> > > The proposed approach is to split the definition of the S flag

> > out

> > > from

> > this document, so

> > > that this document will focus on the specification of the VTN

> > option

> > > with

> > all the flags as

> > > reserved, and the S Flag could be defined as an extension to

> > the VTN

> > option in a separate

> > > document.

> > >

> > > Before updating this WG draft, we would like to know the WG's

> > opinion

> > > on

> > this approach

> > > to move forward. Any feedback is welcome.

> >

> > -----------------------------------------------------------------

> > ---

> > IETF IPv6 working group mailing list

> > ipv6@ietf.org<mailto:ipv6@ietf.org>

> > Administrative Requests:

> > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2<https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%252>

> >

> Fwww.ietf.org%2Fmailman%2Flistinfo%2Fipv6&data=05%7C01%7Cmohamed.

> >

> boucadair%40orange.com%7Cc7b66a0799ca41a4b00e08dbfb346dd5%7C90c

> 7a

> >

> 20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C638379974860934578%7CUn

> know

> > n%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1ha

> >

> WwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=9bNvzWEsR9J86r5zy3V%

> 2BD6Y

> > Iv9ZsyazWDcIjP6aUlNA%3D&reserved=0

> > -----------------------------------------------------------------

> > ---

> ___________________________________________________________________

> _________________________________________

> Ce message et ses pieces jointes peuvent contenir des informations

> confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou

> copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le

> signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages

> electroniques etant susceptibles d'alteration, Orange decline toute

> responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

>

> This message and its attachments may contain confidential or privileged

> information that may be protected by law; they should not be distributed,

> used or copied without authorisation.

> If you have received this email in error, please notify the sender and delete this

> message and its attachments.

> As emails may be altered, Orange is not liable for messages that have been

> modified, changed or falsified.

> Thank you.

____________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.