RE: I-D Action: draft-han-6man-in-band-signaling-for-transport-qos-00.txt

Lin Han <Lin.Han@huawei.com> Thu, 19 October 2017 17:28 UTC

Return-Path: <Lin.Han@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71B301342FC for <ipv6@ietfa.amsl.com>; Thu, 19 Oct 2017 10:28:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7S3Mgxv8vfH7 for <ipv6@ietfa.amsl.com>; Thu, 19 Oct 2017 10:28:55 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E58E134219 for <ipv6@ietf.org>; Thu, 19 Oct 2017 10:28:54 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml708-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DQY85132; Thu, 19 Oct 2017 17:28:52 +0000 (GMT)
Received: from SJCEML702-CHM.china.huawei.com (10.208.112.38) by lhreml708-cah.china.huawei.com (10.201.108.49) with Microsoft SMTP Server (TLS) id 14.3.361.1; Thu, 19 Oct 2017 18:28:47 +0100
Received: from SJCEML521-MBX.china.huawei.com ([169.254.1.102]) by SJCEML702-CHM.china.huawei.com ([169.254.4.145]) with mapi id 14.03.0361.001; Thu, 19 Oct 2017 10:28:41 -0700
From: Lin Han <Lin.Han@huawei.com>
To: Tom Herbert <tom@herbertland.com>, Toerless Eckert <tte@cs.fau.de>
CC: 6man WG <ipv6@ietf.org>
Subject: RE: I-D Action: draft-han-6man-in-band-signaling-for-transport-qos-00.txt
Thread-Topic: I-D Action: draft-han-6man-in-band-signaling-for-transport-qos-00.txt
Thread-Index: AQHTRJJxnUgwu2qqQUiZZRbG4Yh0Q6LnHDEwgADKFoCAADQaAIAAW74OgAL2meA=
Date: Thu, 19 Oct 2017 17:28:41 +0000
Message-ID: <1D30AF33624CDD4A99E8C395069A2A162CD75EEC@sjceml521-mbx.china.huawei.com>
References: <150774513036.24791.2138264254901122467@ietfa.amsl.com> <cc11634a-b5a2-88b9-f36f-82b3fd9d8d70@gmail.com> <1D30AF33624CDD4A99E8C395069A2A162CD734B2@sjceml521-mbx.china.huawei.com> <a4da4b26-6402-ad0d-a5f5-5bddc192b8f7@gmail.com> <4E40E3EF-B0E5-490E-BFF2-0511D97E9E80@employees.org> <CALx6S341v1zd2Q9bts8-zrKxU59kieJTJJ=nHQ5w4oQZg=t_cA@mail.gmail.com> <17525287-DDA8-4930-B90B-F9228DF69A90@employees.org> <CALx6S37wLvuJ9tUGjYmzm63eq_bxq0jXSEgfCtH_2i74SvrbLA@mail.gmail.com> <20171017181646.GD31973@faui40p.informatik.uni-erlangen.de> <CALx6S34VRS4GumsFSqN8uDkv4TOLC8q+rOvyN=evUk83KPeHHg@mail.gmail.com>
In-Reply-To: <CALx6S34VRS4GumsFSqN8uDkv4TOLC8q+rOvyN=evUk83KPeHHg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.213.49.88]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020205.59E8E0D5.0080, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=169.254.1.102, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: c9374dfe7a6cb005bff3ecb8271d0a43
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/H2A90rQZICGIkBgDiUxHCVluL9I>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Oct 2017 17:28:57 -0000

Hi, Tom

Agreed with you.
Actually we come out the solution by using IPv6 extension header after we failed in using upper layer information, such as TCP or UDP options.
>From the NPU processing point of view, retrieving the signaling message from either part of the data packet have almost no difference in terms of complexity and performance; 
We selected using transport layer information at the beginning was because it is independent of IPv4 and IPv6. But later on, we found that this solution will be limited in the case of un-encrypted TCP and UDP, and it cannot apply to other newer protocol such as QUIC. Considering the encrypted transport service is almost a default configuration in the future, this limit is absolutely un-acceptable. We got the same feedback after we chat with some ICCRG folks in previous IETF meeting. To use upper layer information for the network layer purpose is strongly opposed by TCP community.
One more thing to inspire us to use the IPv6 HbH is that the very original in-band singling proposed by John Harper (quoted in the draft) was finally resulting the TCP Quick-Start (RFC4782). Our draft could be seen as a further step to provide a more complete QoS support for all transport protocols.

Regards

Lin

-----Original Message-----
From: ipv6 [mailto:ipv6-bounces@ietf.org] On Behalf Of Tom Herbert
Sent: Tuesday, October 17, 2017 12:39 PM
To: Toerless Eckert <tte@cs.fau.de>
Cc: 6man WG <ipv6@ietf.org>
Subject: Re: I-D Action: draft-han-6man-in-band-signaling-for-transport-qos-00.txt

On Tue, Oct 17, 2017 at 11:16 AM, Toerless Eckert <tte@cs.fau.de> wrote:
> As mentioned in my prior mail: RSVP-IP deployments got killed by SPs 
> that filtered packets with router-alert because common network devices 
> punted packets because of the presence of router-alert. Instead of 
> punting them because of presence of RSVP-router-alert option. And of 
> course you can blame IP multicast: every router started to punt 
> router-alert because of MLD (and of course us multicast folks missed 
> the chance to fix this in MLDv2 because it only tried to duplicate IGMPv3), but no RFC told developers to punt because of router-alert + value in the router alert.
> AFAIK, the same applies to hop-by-hop option in general. Alas, even 
> rfc7045 did not discuss this issue.
>
> IMHO we need a mechanism that specifies: devices MUST NOT punt/slow 
> down packets because of the presence of this mechanism, but only 
> because of presence of
> (mechanism,value) where value is intended to be supported by device. 
> If the device can not do this, then it MUST IGNORE this mechanism and 
> forward packets with the mechanism as if the option was not present.
>
> One simple way to do this is to define hop-by-hop-fixed that does say 
> exactly this and then hopefully allow all existing hop-by-hop TLV to 
> live underneath that fixed hop-by-hop-fixed option. But i would 
> certainly suggest to review processing complexity and extensibility before such a conclusion.
>
> Personally i prefer inband UDP layer signaling, not because i do not 
> like IPv6 option headers but because there is just no ubiquitous API 
> to allow apps independent of OS enhancements to set arbitrary options 
> headers, especially ones

The API does exist. OSes like Linux have implemented APIs described in
RFC2292 and other common APIs.

> that are not yet defined (allow apps to fully defined the whole header bit by bit).
> Lets say from a javascript app in a browser. And i am more interested 
> in ease of adoption than in architectural cleanlyness. But of course 
> its perfectly valid to do the architectural clean appraoch and then 
> prove me wrong and get that option adopted more ;-))

It's not just about architectural cleanliness, it's about correctness.
In the case that an intermediate node parses a UDP payload it is likely doing this based on the some common destination port number.
Port numbers don't have global and persistent meaning (e.g. TCP port
80 does not always have to be HTTP) so this leads to the possibility of misinterpretation as described in RFC7605. If the node improperly writes data into the UDP payload and updates the checksum, then this becomes silent data corruption. Extension headers do not have this possibility of misinterpretation in the network.

This potential misinterpretation of UDP ports and many other issues with trying to turn UDP into a network layer protocol were brought up in the SPUD/PLUS discussions.

Tom

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------