Re: [ippm] on supporting IOAM in IPv6

Tom Herbert <tom@quantonium.net> Wed, 15 July 2020 18:52 UTC

Return-Path: <tom@quantonium.net>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B4DB3A09AA for <ipv6@ietfa.amsl.com>; Wed, 15 Jul 2020 11:52:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=quantonium-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6RmF-IBkTZLp for <ipv6@ietfa.amsl.com>; Wed, 15 Jul 2020 11:52:08 -0700 (PDT)
Received: from mail-ej1-x630.google.com (mail-ej1-x630.google.com [IPv6:2a00:1450:4864:20::630]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0FE103A0C7B for <6man@ietf.org>; Wed, 15 Jul 2020 11:52:07 -0700 (PDT)
Received: by mail-ej1-x630.google.com with SMTP id n26so3286231ejx.0 for <6man@ietf.org>; Wed, 15 Jul 2020 11:52:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quantonium-net.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=IUb54MuK8L85lZmsDycgIDnXG3a0iExyW0e5k6rg6c0=; b=C+b4nhOlvqYOxrtalkKsq2SB1zZV3Ix6PdUr8Ggf4/ICVogIfb+Tj9BIeqw089pL2b VQebN/rh+SXZUk+gXFCt8Lz5XrbArLVs5/AmxKYDJJBnKCif5ORQUyw7ZlRmRD/Kfc2Z ARvlUJ5uxI40KGINh7sEqr3pSmu1oY2gp5eqRaOLUM0YA10PxzFCP8DNMuwiewzYlhVU TJ3nVQ+EH5MHpFj0Uga/CGvfdpRnTXS5IUwL1RNieHARRxG2Uew8um/YSy2EDGu3lvwK Y9ZZkZBhh9GxMeH8n14RYCUvCAJ/nOkCfAFDaT0EqfeQHt4ScUSRQ5TOnQwXQb5H2kWp XQyQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=IUb54MuK8L85lZmsDycgIDnXG3a0iExyW0e5k6rg6c0=; b=hQWinJ9lqNK8tUfevNyj7SgBKawJMDYTuK1bpvyA7aJ+ASkaAeDAS8/hR9SlqVwEX9 J2oSc1LYAShZw8nejnPbAiEbx+zcRS5uJyBiIur3WIrgeb7Oovztu2uTDz8PJoiRtEjK EeRjF+YNY+JoXuF4G867Tx1gBJ/vQuziHTpx/px1hvOQgB0lc0z1mz9YPFhybiW3t4vN 911ziloAowX83r4Rem+D4cX9NxZu84BQYpbENzdloV65d8hJDvICu4g/8bmm3pnlVn1L +w7gGr8x4hyG+IUL2vHbcc561NBMTkMhazrqZAnUnEMoUjL339pyRzdX6txmqzeXiO+A zMAg==
X-Gm-Message-State: AOAM530tYJu1PEXgcZCIzivL0ldxUSznPE2Br9mYtZ8t9EAfXQYY3iGv n6VzCsx5ror0cFVpum2UcL8JTR1FrkC/nBl18G2Ic1ukf0my4A==
X-Google-Smtp-Source: ABdhPJx5PsNTkrqpOdg/vTadllfrDd9f9HOFDsJAN1rdcAGKpUc6bvBAf93H4wc9ABkCp86+boTN/7ipUiPhP7jMGPg=
X-Received: by 2002:a17:906:c78f:: with SMTP id cw15mr374593ejb.58.1594839125798; Wed, 15 Jul 2020 11:52:05 -0700 (PDT)
MIME-Version: 1.0
References: <DM6PR13MB27626672DC0B7333B0FA69F99A7E0@DM6PR13MB2762.namprd13.prod.outlook.com>
In-Reply-To: <DM6PR13MB27626672DC0B7333B0FA69F99A7E0@DM6PR13MB2762.namprd13.prod.outlook.com>
From: Tom Herbert <tom@quantonium.net>
Date: Wed, 15 Jul 2020 11:51:54 -0700
Message-ID: <CAPDqMeq9vWxJ7QGzsmA6ck3Ts1gZ59iL9DUGgF84KNNPg-nbtA@mail.gmail.com>
Subject: Re: [ippm] on supporting IOAM in IPv6
To: Haoyu Song <haoyu.song@futurewei.com>
Cc: "IETF IPPM WG (ippm@ietf.org)" <ippm@ietf.org>, 6man <6man@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/PEyzEpPQmWarCK4nwpG8GLZGSGE>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jul 2020 18:52:10 -0000

On Wed, Jul 15, 2020 at 11:17 AM Haoyu Song <haoyu.song@futurewei.com> wrote:
>
> Hi all,
>
>
>
> We will present this draft in the lighting talk session of IPPM WG meeting in IETF108
>
> https://datatracker.ietf.org/doc/draft-song-ippm-ioam-ipv6-support/
>
>
>
> Since there is usually no time for any discussion for the short talk in the meeting, we’d like to start this email discussion thread, also involving the relevant 6man WG, to solicit suggestions and comments.
>
> Below is a quick summary:
>
>
>
> The draft is related to another WG draft https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-ipv6-options/ in which the IOAM trace option is proposed to be carried as an IPv6 HBH option..
>
>
>
> However, using HBH, the mandatory first extension header,  to carry the large and potentially variable size IOAM trace option can be very challenging for implementations,
>

> especially when some other extension headers, such as SRv6 RH, must be accessed.
>
Haoyu,

>From the draft:

"There are practical limitations on how far the hardware can reach
into a packet in forwarding hardware."

Can you quantify these limitations? For instance, the draft is
concerned about large headers, but what exactly is a "large header".
In other words can you assign the number of bytes of headers for which
we can expect hardware to be able to generally process, and so only
when the length of headers exceeds that particular number do we need
to consider alternative mechanisms?

Also:
"A potentially more detrimental issue is that the incremental tracing
option will expand the HbH header at each hop and push back all other
headers, which keeps shifting the locations of the other extension
headers, further complicating the hardware implementation and impeding
the forwarding."

Changing the size of the HBH header inflight is currently prohibited
by RFC8200 (see draft-herbert-6man-eh-attrib-01 for how this might be
done safely). But even if this is done, it doesn't seem like it
changes the problem statement that a node can't process a packet if
the necessary headers don't fit into it's parsing buffer.

Tom


>
>
> This draft discuss several alternatives to avoid or mitigate the problem, including:
>
> Separate the header part and data part of the IOAM trace option, and move the data part to a later extension header while keeping the header part in HBH
> Using the IOAM DEX option instead to avoid carrying data in packet
> Using the segment IOAM trace method to ensure the IOAM data will be stripped off and exported at some specific nodes (e.g., SRv6 segments),  so the IOAM option header can remain short and constant at these nodes.
>
> Flavor 1: Fixed segment size encoded in IOAM option header
> Flavor 2: Configurable by network controller
>
>
>
> Please see more detailed description in the draft. The draft only covers the IOAM-related methods, although other methods are also possible.
>
>
>
> Please let us know what you think. Thank you very much!
>
>
>
> Best regards,
>
> Haoyu
>
> _______________________________________________
> ippm mailing list
> ippm@ietf.org
> https://www.ietf.org/mailman/listinfo/ippm