Re: Mirja Kühlewind's Discuss on draft-ietf-6man-rfc2460bis-09: (with DISCUSS and COMMENT)

otroan@employees.org Sat, 15 April 2017 18:13 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21AAD128DF6; Sat, 15 Apr 2017 11:13:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=employees.org; domainkeys=pass (1024-bit key) header.from=otroan@employees.org header.d=employees.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7rYmS0jGlkGC; Sat, 15 Apr 2017 11:13:17 -0700 (PDT)
Received: from esa01.kjsl.com (esa01.kjsl.com [IPv6:2607:7c80:54:3::87]) by ietfa.amsl.com (Postfix) with ESMTP id BECE2127977; Sat, 15 Apr 2017 11:13:17 -0700 (PDT)
Received: from cowbell.employees.org ([198.137.202.74]) by esa01.kjsl.com with ESMTP; 15 Apr 2017 18:13:17 +0000
Received: from cowbell.employees.org (localhost [127.0.0.1]) by cowbell.employees.org (Postfix) with ESMTP id EBB9DD788B; Sat, 15 Apr 2017 11:13:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=employees.org; h=from :message-id:content-type:mime-version:subject:date:in-reply-to :cc:to:references; s=selector1; bh=LW6ISfCfci2NO310nXhkhOvQ+mU=; b= bgl2Jx4rVg3eYGnhwLC359ChUiUZ8RG60UMfLJ+F/XSo41Kt9ABcMuIKsz1XqpvV S8KwBVf7r2GYt0hRKAmE1gyYUcoIanBIrO8MVyFEsMYAqAVAVo5JrWj849VWJO8Y GG7pcSLHnBfIC2aGH9YmKkoPjvGP1OEbaoAzaSQZTUU=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=employees.org; h=from :message-id:content-type:mime-version:subject:date:in-reply-to :cc:to:references; q=dns; s=selector1; b=Y+SJH4sv1mWkolU72X7/BzQ IQX6FtS4fkQvARRP3+FE/r0JIq/XQ7gkSdOeXDWUbLkiVPMWyYerBKTwACMqBJBX HOjY43StTQeLvoo/43EDQb9Ym1OoEH8b24QRqPH4Uk/8t+T4q+oyFuvsReDF4Oys XiKjk2MKpUlankzfrfzg=
Received: from h.hanazo.no (96.51-175-103.customer.lyse.net [51.175.103.96]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: otroan) by cowbell.employees.org (Postfix) with ESMTPSA id 762F5D788A; Sat, 15 Apr 2017 11:13:16 -0700 (PDT)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by h.hanazo.no (Postfix) with ESMTP id B20C7A9C909E; Sat, 15 Apr 2017 20:13:13 +0200 (CEST)
From: otroan@employees.org
Message-Id: <9632609F-3B70-4DAA-A8C5-440DB9F73B70@employees.org>
Content-Type: multipart/signed; boundary="Apple-Mail=_7B712628-845C-4618-8E3E-F41C239146E9"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Subject: Re: Mirja Kühlewind's Discuss on draft-ietf-6man-rfc2460bis-09: (with DISCUSS and COMMENT)
Date: Sat, 15 Apr 2017 20:13:12 +0200
In-Reply-To: <FD5D91CA-4641-4ED6-A2F7-12D6992AB73E@kuehlewind.net>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, draft-ietf-6man-rfc2460bis@ietf.org, 6man WG <ipv6@ietf.org>, The IESG <iesg@ietf.org>, 6man-chairs@ietf.org
To: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
References: <149201127005.15808.3277140025315157500.idtracker@ietfa.amsl.com> <248F8BA5-48D6-4933-B45F-7F1B20477C2C@employees.org> <3C06A5F9-19B9-48E1-BB67-57D540E5E38D@kuehlewind.net> <870ca7b4-2ea5-83e8-699e-4f13071a7453@gmail.com> <C1C72619-62C6-4CB0-8EFF-BB6949880F1C@kuehlewind.net> <d0bd2759-3d6a-5bf6-d955-d8475c5ea7d3@gmail.com> <FD5D91CA-4641-4ED6-A2F7-12D6992AB73E@kuehlewind.net>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/Ht8kzR1NHKW3KVNlECPxufoX498>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 15 Apr 2017 18:13:19 -0000

Mirja,

[...]

>> I have no good answer. We got this wrong originally, so what can we do in the Internet Standard except document the problem?
> 
> We could actually deprecate the HBH header, and eventually define a new one/assign a new number (at some later point). And this is exactly the case where I see a new extension header coming up.
> 
> As I said in my original discuss it’s just very unsatisfying to change the HBH handling (correctly) and then say it’s not recommended to use it.

The recommendation not to use it, is because the expectation that an application can give all routers along the packet's delivery path instructions, that will be adhered to is wrong. Essentially we're saying that the HBH option should be mostly ignored, and I would expect mostly have applicability within one administrative domain.

> One more point: I recently realized is that given the destination option and the HBH option use the same registry, it actually is very tempting to simply use the destination option header with HBH options because no current router will inspect it and only new boxes that support the new feature (at the edge) may start looking into it. Just as another side note on what we might see happening in future with this recommendation.

I don't understand why you see using a destination option solves anything.
That will just end up being subject to the same operational policies as the HBH header.
And note any packet that doesn't have the TCP or UDP header directly following the IP header has a significantly higher drop probability anyway.

>> (I suspect that the real answer is that to install any kind of flow state, we need to use an explicit flow state creation protocol, not hang it off a packet header designed mainly for stateless processing. If that sounds like a short explanation of why Integrated Services/RSVP failed, it is. And it's surely out of scope for 2460bis.)
> 
> I agree (I’m working on PLUS for this reason but that’s a different topic). Nothing we have to or should address in this document. But we could be more clear and go the next step and deprecate HBH. I didn’t follow the document or wg discuss closely but to my understanding the option to deprecate HBH was not really discuss in the group. Was it?

Some people have even been discussing deprecating extension header altogether.
The working group decided not to deprecate the HBH header at this point. As in, we still think it can be rescued.

Cheers,
Ole