Re: I-D Action: draft-voyer-6man-extension-header-insertion-02.txt
Tom Herbert <tom@herbertland.com> Sat, 02 December 2017 18:05 UTC
Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0C065127ABE for <ipv6@ietfa.amsl.com>; Sat, 2 Dec 2017 10:05:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VwWrp0-f3Czm for <ipv6@ietfa.amsl.com>; Sat, 2 Dec 2017 10:05:53 -0800 (PST)
Received: from mail-qt0-x229.google.com (mail-qt0-x229.google.com [IPv6:2607:f8b0:400d:c0d::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C64801200FC for <ipv6@ietf.org>; Sat, 2 Dec 2017 10:05:52 -0800 (PST)
Received: by mail-qt0-x229.google.com with SMTP id u10so16791528qtg.2 for <ipv6@ietf.org>; Sat, 02 Dec 2017 10:05:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ZMG2dmHmYvJcDzJrLGVf9jqeyIr54WuXYfwXD+Tbb0M=; b=uxfyhx25yqwCWaD48NhNZOO4e1tk8a/5BGdxy5WFoyS865gduem3rlinZRe2Fuv+X5 2UGTpWz0V064kfNoO7srClj1ReOmAtLDoovgxZxwT50tfp2slr/H9rCic/jkQi1f4NDP 37VRM2USlioXu3dnquq55TapbzxtTw8oyOPLEYFeII97IqbEZ6vvTasBaA8jl13HNOU3 GQ6KacwupVxtAR1aGyBfGCIJ6KhkAj4sGaNwAJED3NwtqRJfk7obKN2LvPzNL3eGpSou /8f5/6+a3BWT7ZJfDQHFjKiOOOwqF67ZWXFwwZmcpnaQQr1044XLp9Gc//UGisdrjG8n mQ9A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ZMG2dmHmYvJcDzJrLGVf9jqeyIr54WuXYfwXD+Tbb0M=; b=W6Wv8Orz/OnR2JIBBVpDFearhYwBojhCWavDAEl7kYkyy2m6s+yzRMhEIHK9DAjRKd J8gBxPYgt5S1SexNEXMr0jxB6HPq+JUBHqrNOqL6CQK1KWk+EwvOkw+/nJc7XQWTqDKZ ufO7SQNj9ToDKnAB0d+eLFKBJeVDT8r+DQcCMh0xRENHItytSgzmKvl5JQIQu7S809JG vj6wX7ckXxFng6+Aj5MD6R8LRcnaNCuuoaJyR/o0a1RXhx3xX27oj1d+FoXwqgDP5uC8 SwSIeQCfNkRvDZTf4Z8516+ekbDiyA2iSnpEc3Gn1QNfGG3r0/vKx37UThyXUqCC8rbb l+gA==
X-Gm-Message-State: AKGB3mJVmuE4gKdL3nix+o6oXy9pOXRj7sCXH4vvD8dYSNuKw3WEXz/E ua+OLM6hzr+vItsmGdpV7VjanSvrWOkHLDIgxJMthQ==
X-Google-Smtp-Source: AGs4zMYwT7Wh2U7rinZb4YrFYL1U3S2Pq/6MSdMgpBJlajyZZ3pu6G/mMZ7x3DIKd2fuO8bBJRZLwAh2DU8QCKLYp8g=
X-Received: by 10.200.3.158 with SMTP id t30mr14188869qtg.149.1512237951822; Sat, 02 Dec 2017 10:05:51 -0800 (PST)
MIME-Version: 1.0
Received: by 10.200.43.121 with HTTP; Sat, 2 Dec 2017 10:05:51 -0800 (PST)
In-Reply-To: <8ecf3590-5313-551e-fbb3-f95aada87a67@uniroma2.it>
References: <151120281628.21912.1099097760493570225@ietfa.amsl.com> <4ca3fd6b-4cd6-f6ac-ce03-415c2c9a4c3c@gmail.com> <f4425076-2f76-5713-2819-9d26671d56bb@si6networks.com> <4E92F160-C586-4C7B-BAEF-97C204856A8A@employees.org> <bc9d7f57-8687-7f85-8ac3-49751683232b@si6networks.com> <CA+b+ERnKbRXgFycgKd7EXMVvS1Mu_RTC5tfPbNE781TDZ49rYA@mail.gmail.com> <CAO42Z2wWSucKNouo0RxNf7pmyPErNk1bVny43qTLY6E333mpcQ@mail.gmail.com> <e41ee3ae-05ef-0a1a-505e-968323b07625@gmail.com> <CAO42Z2x2-WFyxYKpcwtm_z4WiFFf1M5oiW2=j6fXnqgUG1F8DQ@mail.gmail.com> <8ecf3590-5313-551e-fbb3-f95aada87a67@uniroma2.it>
From: Tom Herbert <tom@herbertland.com>
Date: Sat, 02 Dec 2017 10:05:51 -0800
Message-ID: <CALx6S35e0krDCLUhUQFws_gSJhtv0m_E_KQkyRQQWO=zL_=vnQ@mail.gmail.com>
Subject: Re: I-D Action: draft-voyer-6man-extension-header-insertion-02.txt
To: Stefano Salsano <stefano.salsano@uniroma2.it>
Cc: Mark Smith <markzzzsmith@gmail.com>, draft-voyer-6man-extension-header-insertion@ietf.org, 6man WG <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/HcepJEDFJTAIwQ76_KN0IOWP7NU>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Dec 2017 18:05:55 -0000
On Fri, Dec 1, 2017 at 11:15 PM, Stefano Salsano <stefano.salsano@uniroma2.it> wrote: > Il 2017-12-01 23:07, Mark Smith ha scritto: > > <snip> >> >> >> I asked numerous times (at least 3 from memory), what is wrong with >> exclusively using tunnelling for this. I think eventually Robert said >> because of the tunnelling overhead. >> >> The trouble with this argument is that this draft doesn't exclusively >> propose extension header insertion, it also describes using >> tunnelling. The only distinction between which method to use is >> whether the packet originates within the SR domain ("Source Domain and >> Packet Journey") or originates externally to it ("Transit through a >> Source Domain"). So tunnelling overhead is apparently quite acceptable >> as long packets happen to come from outside the SR domain. I can't see >> anything that explains why packets that originate internally can't or >> must not be tunnelled. > > > Hi Mark, > > with the first tunneling operation you create a new packet that originates > in your SR domain. > > We definitely want it, so the further SR insertion will only be applied to > such packets (and hosts outside the domain will not receive unexpected > ICMP...) and we believe that it is worth paying the tunneling overhead here. > Stefano, The problem is that almost all hosts are outside of the SR domain, even ones attached to the local network. If hosts were within the SR domain they could just source packets with the right extension headers or encapsulation. But that is not common, especially in a public network. So it seems likely nearly all packets would end up being encpasulated anyway (i.e. the packet flow in section 3 will be common). If packets are tunneled when they enter the domain then that should provide sufficient isolation so that the encapsulating node can use whatever extension headers it wants (e.g. tunneling should ensure that source hosts won't receive unexpected ICMP). But then that's not EH insertion, that is sourcing a packet with EH in compliance with RFC8200. The only argument for EH insertion then would be if some intermediate node in the domain inserted something; this at least only affects packets sourced within the domain so information is less likely to leak out of the domain. However, in that case why not do the segment routing at the ingress node of the domain in conjuction with the encapsulation and avoid the complexities needed to make EH insertion work correctly? > We think that for further operations that require adding of SRH information > to such packets originating in your SR domain, the SR insertion is more > efficient than tunnelling into a new packet. > > This is both from the point of view of the packet size (and increase of > packet headers size) and from the point of view of the cost of packet > manipulation operations. > Packet manipulation operations where? At an intermediate node processing is more likely to take a performance hit because of the presence of extension headers regardles of whether they were inserted directly or in an encapsulation, An assumption that more bits in the packet always reduces efficiency would be incorrect. For instance, we have shown on real hardware that GRE/UDP/IP is more efficient than GRE/IP. This is because network devices have optimized for processing UDP/IP as opposed to GRE/IP so the benefits of additional eight bytes UDP header outweighs the cost. A performance analysis based on empirical data should be in the draft if efficiency of packet manipulation is a primary motivation. > There can be scenarios in which you have more than one such operation to be > applied to the packet, let us assume two. If you go for tunnelling you have > the first encapsulation, then two more IPv6-in-IPv6 encapsulation in the > same packet, for a total of 3 encapsulations. If you go for tunneling + SR > insertion you only have the first encapsulation and then "simple" mangling > of SRH header. > I understand how nested encapsulation could work to cross multiple domains, I don't see how this would be done with SR insertion. Maybe the intent is that packets will have a stack of routing headers? Please elaborate this use case in the draft. Tom
- Re: I-D Action: draft-voyer-6man-extension-header… Brian E Carpenter
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… Fernando Gont
- Re: I-D Action: draft-voyer-6man-extension-header… Ole Troan
- Re: I-D Action: draft-voyer-6man-extension-header… Fernando Gont
- Re: I-D Action: draft-voyer-6man-extension-header… Robert Raszuk
- Re: I-D Action: draft-voyer-6man-extension-header… Brian E Carpenter
- Re: I-D Action: draft-voyer-6man-extension-header… Fernando Gont
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… Robert Raszuk
- Re: I-D Action: draft-voyer-6man-extension-header… Robert Raszuk
- Re: I-D Action: draft-voyer-6man-extension-header… Mark Smith
- Re: I-D Action: draft-voyer-6man-extension-header… Robert Raszuk
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… Robert Raszuk
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… Robert Raszuk
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… Brian E Carpenter
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… 神明達哉
- Re: I-D Action: draft-voyer-6man-extension-header… Mark Smith
- Re: I-D Action: draft-voyer-6man-extension-header… Mark Smith
- Re: I-D Action: draft-voyer-6man-extension-header… Stefano Salsano
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… Robert Raszuk
- Re: I-D Action: draft-voyer-6man-extension-header… Brian E Carpenter
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… C. M. Heard
- Re: I-D Action: draft-voyer-6man-extension-header… Robert Raszuk
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… Robert Raszuk
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… Robert Raszuk
- Re: I-D Action: draft-voyer-6man-extension-header… Brian E Carpenter
- Re: I-D Action: draft-voyer-6man-extension-header… Bob Hinden
- Re: I-D Action: draft-voyer-6man-extension-header… Darren Dukes (ddukes)
- Re: I-D Action: draft-voyer-6man-extension-header… Fernando Gont
- Re: I-D Action: draft-voyer-6man-extension-header… Brian E Carpenter
- Re: I-D Action: draft-voyer-6man-extension-header… Mark Smith
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… Mark Smith
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert
- Re: I-D Action: draft-voyer-6man-extension-header… Brian E Carpenter
- Re: I-D Action: draft-voyer-6man-extension-header… Mark Smith
- Re: I-D Action: draft-voyer-6man-extension-header… Tom Herbert