Re: [spring] New Version Notification for draft-voyer-6man-extension-header-insertion-07.txt

Fernando Gont <fgont@si6networks.com> Sun, 22 September 2019 22:02 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 101A1120089; Sun, 22 Sep 2019 15:02:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O4s_7Fn-W1Iw; Sun, 22 Sep 2019 15:02:07 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [IPv6:2001:67c:27e4::14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 955E6120024; Sun, 22 Sep 2019 15:02:07 -0700 (PDT)
Received: from [192.168.7.112] (unknown [85.104.108.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 76A8D860FD; Mon, 23 Sep 2019 00:02:02 +0200 (CEST)
Subject: Re: [spring] New Version Notification for draft-voyer-6man-extension-header-insertion-07.txt
To: Robert Raszuk <rraszuk@gmail.com>, Mark Smith <markzzzsmith@gmail.com>
Cc: Tom Herbert <tom@herbertland.com>, SPRING WG <spring@ietf.org>, 6man <6man@ietf.org>
References: <156903961357.5092.16907354634703727132.idtracker@ietfa.amsl.com> <21D937AA-0B27-4E8D-BB6E-99452F72AC30@cisco.com> <CALx6S35Mehd_LUMt_gL=nr_B29vTND4KfYjjiiPtBaj_JjyWFQ@mail.gmail.com> <CAO42Z2wncc3Gtgeb1cWJ-kqDHJVdsf7vR+_BH3tXXjw0ZPR=ZA@mail.gmail.com> <CA+b+ERkv6dEpCHKMnVrk=u82ZQjm5roBrJY+5qYRUad46-gGkw@mail.gmail.com>
From: Fernando Gont <fgont@si6networks.com>
Openpgp: preference=signencrypt
Message-ID: <ed0e84cc-249f-09e9-8f1f-515dbe8e600b@si6networks.com>
Date: Mon, 23 Sep 2019 01:01:55 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0
MIME-Version: 1.0
In-Reply-To: <CA+b+ERkv6dEpCHKMnVrk=u82ZQjm5roBrJY+5qYRUad46-gGkw@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/M5IHzYzqyUDEMi0VZdlM96TKYtA>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Sep 2019 22:02:10 -0000

On 22/9/19 16:52, Robert Raszuk wrote:
> Hey Mark,
> 
>  
> 
>     The entire use of the word "insertion" is incorrect if the ID is now
>     only proposing encapsulation/tunnelling to carry transit traffic
>     across the SR domain.
> 
> 
> That is not what the discussed draft says. The draft proposes
> encapsulation on ingress edge of the domain, decapsulation on the egress
> edge of the domain AND freedom of insertion, deletion (and IMHO also it
> should also add modification) of any SRH(s) within the encapsulated
> header at any point in the domain. Yes there can be more then one SRH
> per current notion of the draft too during the protection. 
> 
>      The new outgoing segment tunnel header would have the local device
>     as its source address, providing attribution.
> 
> 
> Who told you that ? 
> 
> Just please read network programming draft and you see that "swapping"
> source address is never the case at segment end points: 
> 
> Quote: 
> 
> Node 8 originates packets with the received SRH with HMAC TLV.
> 
>    P15:(*A8*,S5)(A9,S6,S7,S5;SL=3;HMAC)
> 
>    Node 5 receives and verifies the HMAC for the SRH, then forwards the
>    packet to the next segment
> 
>    P16:(*A8*,S7)(A9,S6,S7,S5;SL=2;HMAC)
> 
>    Node 6 receives
> 
>    P17:(*A8*,S6)(A9,S6,S7,S5;SL=1;HMAC)
> 
>    Node 9 receives
> 
>    P18:(*A8*,A9)(A9,S6,S7,S5;SL=0;HMAC)
> 
> 
> 
> Please notice that encapsulated packet by A8 has source address of A8.
> And that never changes through the entire domain ! 
> 
> 
> Are you now questioning the entire concept of SRv6 architecture ?

Curiously enough you seem to be specifying an architecture by breaking
that of the protocol it relies on.


-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492