RE: [spring] draft-ietf-spring-srv6-network-programming: NH=59 action item closure

Ron Bonica <rbonica@juniper.net> Tue, 17 September 2019 14:42 UTC

Return-Path: <rbonica@juniper.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C5CB12089C; Tue, 17 Sep 2019 07:42:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dYS0CEZPdiy9; Tue, 17 Sep 2019 07:42:10 -0700 (PDT)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C0CEA1208BF; Tue, 17 Sep 2019 07:41:52 -0700 (PDT)
Received: from pps.filterd (m0108158.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id x8HEdFCA020811; Tue, 17 Sep 2019 07:41:48 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=PPS1017; bh=Ujvk3nQkx7gUtgHrPm0Je3AzE8a+FWT2ykHn5Z4EaUA=; b=yjlkRxrJqgBhsBe5jpZDSTmdtksw/LB2LDKegtahlQe8mSK6KWl3ElUiTcTueEeXLsod RgLEGHPctfdP5DI7J94KSf7Sugk7cYZ3wf9bCqsO80KYNbsHyC4FA+U7V9dIPcSK/iuT GaquFM8xD+ain1JDy3K+LRCh9z04OYnSfZXlglh2Zea+qtFmxQGRN2HnCKrO8Q7ux8Kb M+u1K4JKRicZk6NCPygwyjCregyhuc1JZ2pGwICvqF/+j4qloKtTgGbvn9nEIYdaWA98 xkfc6n0Hjf1lwKKP7yAiS7yP9fdN6tgXYdnU8coVWKeg5wvqOCFPentd++y7Rzq8ilb/ Ag==
Received: from nam04-bn3-obe.outbound.protection.outlook.com (mail-bn3nam04lp2055.outbound.protection.outlook.com [104.47.46.55]) by mx0a-00273201.pphosted.com with ESMTP id 2v2nxk13fd-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 17 Sep 2019 07:41:48 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hedzsBu4Dt0GRZKXyODNtw2HZJbX7M9hhJ+sV+JjqK/Xbh/AyEx2G3eo66c0yvbzFwBMHAqSlmo9MSMB3wissIUp98TMzcpGgy2OHNV4MdYDfkyp7vBK0OrI5NexEAoUqCnOA9r3Vqk4eF96q1k743VSxtZ0z/MoMQj40eTdJ1m3orHBl7B0lUMixgGWy1AA00yoC3n57e4KCVdVCB2Zclw7mWk3bmlvg2B5Ne4vgfgkx/pklF+7N5Jx50CDQpQl2uouAhuQF5sJoeMwy0HevIcir39RcQdkElHsn396NcWzSb6tNX4Z8pyTgc50eO6Y9DbLuNMXPDjFT1Q0Jhaneg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ujvk3nQkx7gUtgHrPm0Je3AzE8a+FWT2ykHn5Z4EaUA=; b=oYwKy5OOZRljDsvjsAO9+h+X5ku6hvY1IG/IuA2l82+/bRCfGV9nUmMrZrCoFRhYTMfBpFAr00Xt/McuWjrtxroVK/vutEQXsoe+1owkEiQqUHwYcU8uEf6iLwVqmxxjod3sBLnDJhMyMtr0Uiu/EfA4rHEjRxjwNRd/8dKsqngSRt3TlRYdslWcFA8nhdfwseqy8VqQhlFa46AoXeSQPQGo9dKKrf5i1Im5rd4YpVrQd5WjbFXwYhqzpzFH/adnFUPKOnr5a6NH4991nf77Dw7iuBeBId9TVGIAN0b+0M/r3b0ldBdT9VOAsd4H8nIa9NjU9n6I9ZsjSuEgbu0YYA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
Received: from BYAPR05MB5463.namprd05.prod.outlook.com (20.177.185.144) by BYAPR05MB6695.namprd05.prod.outlook.com (20.178.235.205) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2284.10; Tue, 17 Sep 2019 14:41:46 +0000
Received: from BYAPR05MB5463.namprd05.prod.outlook.com ([fe80::f4f2:f284:d49a:890a]) by BYAPR05MB5463.namprd05.prod.outlook.com ([fe80::f4f2:f284:d49a:890a%4]) with mapi id 15.20.2284.009; Tue, 17 Sep 2019 14:41:46 +0000
From: Ron Bonica <rbonica@juniper.net>
To: Mark Smith <markzzzsmith@gmail.com>, Brian E Carpenter <brian.e.carpenter@gmail.com>
CC: Tom Herbert <tom@herbertland.com>, SPRING WG <spring@ietf.org>, "6man@ietf.org" <6man@ietf.org>, "Pablo Camarillo (pcamaril)" <pcamaril@cisco.com>
Subject: RE: [spring] draft-ietf-spring-srv6-network-programming: NH=59 action item closure
Thread-Topic: [spring] draft-ietf-spring-srv6-network-programming: NH=59 action item closure
Thread-Index: AQHVaYuswjLFh5RZWkGE3xwRL8UAQacoaNiAgAZzygD//+xbgIAAXR2AgADSjuA=
Content-Class:
Date: Tue, 17 Sep 2019 14:41:45 +0000
Message-ID: <BYAPR05MB54633719EE62A2644E7DDC1AAE8F0@BYAPR05MB5463.namprd05.prod.outlook.com>
References: <D57D1C4A-277B-4AC5-990F-FB174AC1130C@cisco.com> <CALx6S34Acm6rZ=M0McWr=XKzygm4H=0fYn6fvGf_Y5k+qod-Gw@mail.gmail.com> <89AA4FDD-9812-48CD-8473-6E38E336E57F@cisco.com> <53236a02-a736-b40f-d885-78e0036af416@gmail.com> <CAO42Z2yv=ziqCq7ZDQT6Q5Nyji0CP57vudz=KjTXhSqJ0rKvHA@mail.gmail.com>
In-Reply-To: <CAO42Z2yv=ziqCq7ZDQT6Q5Nyji0CP57vudz=KjTXhSqJ0rKvHA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=True; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Owner=rbonica@juniper.net; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2019-09-17T14:41:43.9087561Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=Juniper Business Use Only; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Application=Microsoft Azure Information Protection; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=413e4a5e-45c0-4658-99e6-9ab9d010509e; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Extended_MSFT_Method=Automatic
dlp-product: dlpe-windows
dlp-version: 11.2.0.14
dlp-reaction: no-action
x-originating-ip: [66.129.241.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0b057d55-5032-4a33-b6ee-08d73b7d2a2f
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600167)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:BYAPR05MB6695;
x-ms-traffictypediagnostic: BYAPR05MB6695:
x-ms-exchange-purlcount: 5
x-microsoft-antispam-prvs: <BYAPR05MB669523CF35B2F47FD71BA64EAE8F0@BYAPR05MB6695.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 01630974C0
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(366004)(53754006)(13464003)(199004)(189003)(5660300002)(66556008)(64756008)(66476007)(66446008)(66946007)(81166006)(81156014)(486006)(476003)(11346002)(7696005)(446003)(14444005)(256004)(71190400001)(71200400001)(26005)(76176011)(6436002)(53546011)(229853002)(102836004)(6506007)(186003)(86362001)(76116006)(8676002)(4326008)(52536014)(6246003)(561944003)(7736002)(3846002)(9686003)(6306002)(6116002)(110136005)(498600001)(66066001)(25786009)(33656002)(99286004)(305945005)(8936002)(966005)(55016002)(54906003)(74316002)(2906002)(14454004); DIR:OUT; SFP:1102; SCL:1; SRVR:BYAPR05MB6695; H:BYAPR05MB5463.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: Zv6mMXGHjszQwfdIdqfX1dIFq8I3mOCLLX+dOcP+88L1Fv56sEZ8+g/XBKhbsgNj/krfK4/R0oegDb7pX3nYSGix1sIdNvpA2MsmwYBQYPUseMa6n5V278mCA5uqnG4awkHKko4iMTo10N+J2YLCQ7eFQqRE5lHRGdIKwcQJu8UHjySh2QBkqjioLoH2Iyg/3IxdrEP5g2Sgx0sfZ0jNMxoNuZSit7wh5fPb7fpRj6la9CyH55i1/Yw+Pq07abcVXyU7SE31wbBG+6tF9r6zga1ovz4CRg68Q5WyYwwbiUpy0xu/kMlVx10Qui5KSRxyaovg6RDEGs0k6z/NaAEdzxZoysXSRjnktEto8L1mxGy5u/wfHTD9hl7evY/wQJq9qQ7cS6IGwJjQjDJHL1eihe3wBWA2qLi8OWCaHhRmk00=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 0b057d55-5032-4a33-b6ee-08d73b7d2a2f
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Sep 2019 14:41:45.2995 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: hpwzYxX9Ca6zNJI+0QTeGPcMYqJkxwSK5satxEaGRZoVUqVD8FB56y46/M8ZrxvCt62SXThrcUhWCGRjsAOTDg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR05MB6695
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.70,1.0.8 definitions=2019-09-17_07:2019-09-17,2019-09-17 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 mlxscore=0 adultscore=0 suspectscore=0 mlxlogscore=999 priorityscore=1501 impostorscore=0 clxscore=1015 lowpriorityscore=0 bulkscore=0 malwarescore=0 phishscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1908290000 definitions=main-1909170143
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/JBmfySLroVaRWtJd2cRSbb4kb04>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Sep 2019 14:42:14 -0000

Mark,

You have hit the nail on the head. Packets should be self-describing. If we are going to ask for a new codepoint, it should represent Ethernet.

                                               Ron



Juniper Business Use Only

-----Original Message-----
From: spring <spring-bounces@ietf.org> On Behalf Of Mark Smith
Sent: Monday, September 16, 2019 10:07 PM
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: Tom Herbert <tom@herbertland.com>; SPRING WG <spring@ietf.org>; 6man@ietf.org; Pablo Camarillo (pcamaril) <pcamaril@cisco.com>
Subject: Re: [spring] draft-ietf-spring-srv6-network-programming: NH=59 action item closure

On Tue, 17 Sep 2019 at 06:34, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
>
> Pablo,
>
> On 17-Sep-19 07:44, Pablo Camarillo (pcamaril) wrote:
> > Hi Tom,
> >
> > I agree with your suggestion. What do you think of the following text?
> >
> > <OLD>
> >    9.  IANA Considerations
> >
> >
> >       This document requests the following new IANA registries:
> > </OLD>
> >
> > <NEW>
> >    9.  IANA Considerations
> >
> > This document requests IANA to allocate a new IP Protocol Number value for “Opaque” with the following definition:
> > The value TBD in the Next Header field of an IPv6 header or any extension header indicates that the payload is interpreted via a semantics previously established between the source and destination.
>

Is there really any need for this?

An opaque protocol could be encoded using UDP with end-point agreed ephemeral source and destination ports. That would provide a distinguisher in the packet that identifies the end-point agreed semantics. This distinguisher would almost be essential for any troubleshooting based on a packet capture.

Isn't this also creating an opportunity for IETF WGs to bypass IANA, creating their own registry, likely run badly?

Surely all IETF developed protocols should be required to get IANA approved protocol, port, type, code numbers if they need fixed ones, or be required to use dynamic numbers such as UDP ports? Isn't transparency, with exception to when encryption is purposely applied, the fundamental definition of an open protocol?

if this IP protocol value goes ahead, then I think it should be called "Proprietary", and restricted to non-IETF developed protocols.

(And this is ignoring that past proprietary protocols such as EIGRP applied for and received IANA official protocol values.)


Alternatively, isn't this Opaque NH value really saying that the upper layer protocol identifier information has been shifted into the packet's address information?

If payload type and transport layer information is being shifted into the packets' address fields, isn't effectively shrinking the IPv6 address field size from 128 bits to 128 minus the bits required to identify the upper layer protocol type and identifier bits?

Both Multicast formally and anycast informally encodes service or function information in addresses. I still think it is necessary to have upper layer transport protocol headers and identifiers (ports), to allow for the case where a single identifier allocated to a service or function e.g. "Name Resolution", can be implemented using different protocols (UDP/TCP 53 DNS, DoH, DoT).

Another example would be a "Time Synchronisation" service, with a single address, provided over possibly RFC 868 time protocol, NTP, PTP, or Time over HTTPS (https://urldefense.com/v3/__http://phk.freebsd.dk/time/20151129/__;!8WoA6RjC81c!R6VTgMTmL2xmewkItMnWbiB25T06w2rZuGndVkYpND8HOGeD5hqUgEXfUWQo-mCw$ )

Regards,
Mark.


> That seems clear enough. I would expect an addition to draft-ietf-opsec-ipv6-eh-filtering, however. Something like:
>
> 3.4.x.  Opaque (Protocol Number=TBD)
> ...
> 3.4.x.3.  Specific Security Implications
>
>    The security implications of the Opaque header are completely unknown.
>
> 3.4.x.4.  Operational and Interoperability Impact if Blocked
>
>    The impact is completely unknown.
>
> 3.4.x.5.  Advice
>
>    Intermediate systems should discard packets containing Opaque unless
>    explicitly configured to allow it.
>
> Regards
>    Brian
>
>
> >
> >       This document requests the following new IANA registries:
> > </NEW>
> >
> > Any feedback or other text proposal is welcome.
> >
> > Many thanks,
> > Pablo.
> >
> >
> > -----Original Message-----
> > From: Tom Herbert <tom@herbertland.com>
> > Date: Thursday, 12 September 2019 at 21:12
> > To: "Pablo Camarillo (pcamaril)" <pcamaril@cisco.com>
> > Cc: SPRING WG <spring@ietf.org>, "6man@ietf.org" <6man@ietf.org>
> > Subject: Re: draft-ietf-spring-srv6-network-programming: NH=59 
> > action item closure
> >
> >     On Thu, Sep 12, 2019 at 10:02 AM Pablo Camarillo (pcamaril)
> >     <pcamaril@cisco.com> wrote:
> >     >
> >     > Hi all,
> >     >
> >     > Following the comments from IETF105, the working group preferred to allocate a new Next Header value.
> >     >
> >     > The authors would like to propose this diff. Any feedback is welcome.
> >     >
> >     > <OLD>
> >     >
> >     >    9.  IANA Considerations
> >     >
> >     >
> >     >
> >     >
> >     >
> >     >       This document requests the following new IANA registries:
> >     >
> >     > </OLD>
> >     >
> >     >
> >     >
> >     >
> >     >
> >     > <NEW>
> >     >
> >     >    9.  IANA Considerations
> >     >
> >     >
> >     >
> >     > This document requests IANA to allocate a new IP Protocol Number value for “SRv6 payload” with the following definition:
> >     >
> >     > The value TBD in the Next Header field of an IPv6 header or any extension header indicates that the payload content is identified via the segment identifier in the IPv6 Destination Address.
> >     >
> >     This seems like an extremely narrow use case to justify an IP Protocol
> >     Number allocation. If this is the route taken, I would suggest to
> >     define something more generic like "Interpreted" which could mean that
> >     there is a next header, but it's interpretation requires information
> >     elsewhere in the packet. That way the number could potentially be used
> >     in other contexts than just SR.
> >
> >     Tom
> >
> >     >
> >     >
> >     >       This document requests the following new IANA registries:
> >     >
> >     > </NEW>
> >     >
> >     >
> >     >
> >     > We would propose to submit a revision with this text on the IANA section of NET-PGM beginning of next week.
> >     >
> >     > Thanks,
> >     > Pablo.
> >     >
> >     > --------------------------------------------------------------------
> >     > IETF IPv6 working group mailing list
> >     > ipv6@ietf.org
> >     > Administrative Requests: https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ipv6__;!8WoA6RjC81c!R6VTgMTmL2xmewkItMnWbiB25T06w2rZuGndVkYpND8HOGeD5hqUgEXfUTM5N-q1$ 
> >     > 
> > --------------------------------------------------------------------
> >
> >
> > --------------------------------------------------------------------
> > IETF IPv6 working group mailing list ipv6@ietf.org Administrative 
> > Requests: 
> > https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ip
> > v6__;!8WoA6RjC81c!R6VTgMTmL2xmewkItMnWbiB25T06w2rZuGndVkYpND8HOGeD5h
> > qUgEXfUTM5N-q1$
> > --------------------------------------------------------------------
> >
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: 
> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ipv6
> __;!8WoA6RjC81c!R6VTgMTmL2xmewkItMnWbiB25T06w2rZuGndVkYpND8HOGeD5hqUgE
> XfUTM5N-q1$
> --------------------------------------------------------------------

_______________________________________________
spring mailing list
spring@ietf.org
https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/spring__;!8WoA6RjC81c!R6VTgMTmL2xmewkItMnWbiB25T06w2rZuGndVkYpND8HOGeD5hqUgEXfUW1NafP1$