Re: Network Tokens and HBH option

Tom Herbert <tom@herbertland.com> Mon, 13 July 2020 15:41 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 064A73A1353 for <ipv6@ietfa.amsl.com>; Mon, 13 Jul 2020 08:41:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SmeJCF5wdKDI for <ipv6@ietfa.amsl.com>; Mon, 13 Jul 2020 08:41:50 -0700 (PDT)
Received: from mail-ed1-x541.google.com (mail-ed1-x541.google.com [IPv6:2a00:1450:4864:20::541]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 57A293A14D6 for <6man@ietf.org>; Mon, 13 Jul 2020 08:41:36 -0700 (PDT)
Received: by mail-ed1-x541.google.com with SMTP id h28so14125426edz.0 for <6man@ietf.org>; Mon, 13 Jul 2020 08:41:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=d7/2CtClQzmju+sE35F0A2H1N12v1TIR4CsVVBnjlR0=; b=0tX0eKi3aBIaDA85Dm2/ZvoF2hbULV8IH1zkPXkp5pxODOsWARTHgtah2r0GFNdRZn qo1zl5WOu5Fr/DiUy57f5MhwyXIRllB7gMm6lMZZi1r83oFb4S2C195J/QyGtr/XDU59 wQb4EAQnuAZ9TYFQLjJLhMEYT1Dc3BhX8unO4P6y/xAmb3X5h+HiqylrvD3UdCpC7GIp lQuEb++zcxiczFOL9gEUwga88JJttu6f8274XSPqr1yCS+rxdr3T/z2hBQPsGRhjySCL JyHpuRHCVZnUEaQ0Zqi06Ih9o4d8XNEqh2/nU7i8BNZ0q6W67ZhJzdMF+EwI1w31JoCr SRaQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=d7/2CtClQzmju+sE35F0A2H1N12v1TIR4CsVVBnjlR0=; b=FhRRt2yQFmILGOY5X3WcdN0DDgH+d5k83YinhDFkpcPLtA11p9xXVFOUEbS8KV7BEC gixrWqvaAL46PjZer6u1dXPJghq9hbHYHqSqFX8j11ADFHKGeJECc5uZZL6vqoqgzrte jl9vykwcvej2F1XYMXXjn2qCtMkv3KTE4R5bW3CNoC9FfDzVFeggXahkcsRPhNaADoXS 7B55OTCK9hDah+wCcJRXwcBadJ7WJ7dwEhOuYqxsergnPlisH3A7bG534naDzxZvS3U5 LhIuWJPl8usPyXl/z6c5fGSCV7sxV+z3/KXQBLDXSZMsajINE6kQX/v2nlAmPgz0HtO6 CCdw==
X-Gm-Message-State: AOAM5311WHV8qgJ/1en8TowYZtmjkU3j9poRyxlNnzVvk/r3I6/coCLM mTs9QsZEVbVMBbvn+iNLG7zhRcG7iugvoMm8KTI30A==
X-Google-Smtp-Source: ABdhPJwYtfagm3xXw/6TK+EO3xYV3lydvWQv+3brlAPfT6aWl8l4fI6WpRK4/zRxVgvOmXl39y2YmCMEC1PwVrCwIsQ=
X-Received: by 2002:aa7:d5cd:: with SMTP id d13mr14988eds.370.1594654894708; Mon, 13 Jul 2020 08:41:34 -0700 (PDT)
MIME-Version: 1.0
References: <CALx6S35sXX6J75dzQH=hN7pC5=9wZP=o6SqOMpivGPtOdo+YNQ@mail.gmail.com> <CAKD1Yr2iUA9SWJoNsDNFdNYDksKcw8YE2oSB1eJBfy9hiJXb4g@mail.gmail.com>
In-Reply-To: <CAKD1Yr2iUA9SWJoNsDNFdNYDksKcw8YE2oSB1eJBfy9hiJXb4g@mail.gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 13 Jul 2020 08:41:23 -0700
Message-ID: <CALx6S354pDw20Vpiu2g2rOvY4s0cau5F-5wnWr6ts8LPkgg77w@mail.gmail.com>
Subject: Re: Network Tokens and HBH option
To: Lorenzo Colitti <lorenzo@google.com>
Cc: 6MAN <6man@ietf.org>, Yiannis Yiakoumis <yiannis@selfienetworks.com>, network-tokens@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/IUpCcCJ7Y8cx32ZZTq90uhBGV1Q>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jul 2020 15:41:52 -0000

On Mon, Jul 13, 2020 at 1:14 AM Lorenzo Colitti <lorenzo@google.com> wrote:
>
> Is a hop-by-hop option the right tool here? They have several disadvantages:
>
Lorenzo,

>From a protocol perspective, Hop-by-Hop options are not only the right
tool, but they are the only correct method to perform host to network
signaling robustly beyond whatever information is in the IP header.
The alternatives like DPI in transport headers payload (see SPUD for
instance) aren't robust in the end and inevitably lead to more
protocol ossification and limits to how we use protocol.

> The presence of IPv6 extension headers often causes packets to be dropped, so anything that relies on them is impossible to deploy reliably on the Internet.

This is the typical RFC7872 argument. Network tokens can be scoped to
local domains that support them. It's the network that provides tokens
to applications, so the network should be able to know if the tokens
are usable to the requested destination.

> They don't work with forwarded traffic (e.g., a mobile hotspot) because routers aren't really permitted to add extension headers.

The primary use case is UE to first hop in the network. It's possible
that the network can remove the options at the point if they are not
needed beyond the first hop. Likewise the options can be removed at an
egress router before sending into the Internet. or at the egress
router in a limited domain. draft-herbert-6man-eh-attrib-01 defines a
mechanism to safely remove options.

> They are expensive because IIRC for a long time the standards said that all intermediate nodes on the path must process them. Many router implementations do not do this, but probably some do.

As I said, we can restrict use to limited domains as necessary where
the nodes properly support hop-by-hop options.

Tom


>
>
> On Sat, Jul 11, 2020 at 12:54 AM Tom Herbert <tom@herbertland.com> wrote:
>>
>> Hello,
>>
>> This is a draft on "Network Tokens" which is a form of host-to-network
>> signaling for the purposes of providing a highly granular network
>> services and QoS to applications. A primary mechanism to carry the
>> signaling is expected to be a Hop-by-Hop option.
>>
>> https://tools.ietf.org/html/draft-yiakoumis-network-tokens-01
>>
>> There is also a mailing list in
>> https://www.ietf.org/mailman/listinfo/network-tokens
>>
>> We are planning to present in tsvwg and app aware networking and
>> possibly have a side meeting on this topic in IETF108.
>>
>> Thanks,
>> Tom
>>
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------