Re: Applicability, Use-cases, and Architecture for the CRH
Brian E Carpenter <brian.e.carpenter@gmail.com> Sat, 16 May 2020 04:45 UTC
Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E44A3A08CA for <ipv6@ietfa.amsl.com>; Fri, 15 May 2020 21:45:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.198
X-Spam-Level:
X-Spam-Status: No, score=-0.198 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GIRGg7XBYycd for <ipv6@ietfa.amsl.com>; Fri, 15 May 2020 21:45:54 -0700 (PDT)
Received: from mail-pj1-x1032.google.com (mail-pj1-x1032.google.com [IPv6:2607:f8b0:4864:20::1032]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0FAE43A0874 for <6man@ietf.org>; Fri, 15 May 2020 21:45:52 -0700 (PDT)
Received: by mail-pj1-x1032.google.com with SMTP id mq3so1864509pjb.1 for <6man@ietf.org>; Fri, 15 May 2020 21:45:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=ow0F8Pqyj3dR37nD5YeqSdJjZmPtHXLZnDAZNmqzcZ0=; b=jTWWvZAh1wCyT8hQAGbjApCQOMHIpGdzRp8lcZX+TeNyVt7+hzDI/ARVDZmPIfQNo7 Fy0ENWb7lhFAPq0EZgoKU3lyl3rDQLpX18/x/o57Zj3+tXyiOtSE8iZYNF8dh35T9Jkv g6VJTID2JFNzJ2Wj3FjxXZlWYnu1rhqh99tBFf2sB26zgYwuRpxg4DQMJicRM9Lpwmmb 7feEM0nEMSoeL7bgoxo2dh8nxwEHNWAcnBC+7bE1eli1gpNDNxPyGYKUw2r5xAyxYsJC S/S17IyUJ1/OFffcqqXU519ydtBCnVAy09J5wNPW/YbwRYhOthEJTij4+62tjb+Bm8um X+7w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=ow0F8Pqyj3dR37nD5YeqSdJjZmPtHXLZnDAZNmqzcZ0=; b=kgQcpJBfUH+VrRPLlBK41SivtQurZ76+xidIu177AeJqkP0g5U8Hlg98PsszAo9ksd GNTMFMKcKXWpEas6WE4AHLkdXGVPmsX5PlQKE8dEEBIANn2nHvVNY4uxOvIzKPWXtngf O1RjV92RBtdfUYQiQx8ujpj3a6fz8Cs1axddVdnuu92vm/idb7o1uE2lH/o4jkFMo4++ YuzGZg4ikIwgcSN8YNvkHkaKe2HgM4Pg6+hEDHbDqQrhEjgbkD4VFSQWNWIaNWPm7TTU PQCzIK0uT+JcFk6ejGM3/06kY5JSyMUhKa3rgX+XRycZoCfWfnoPd5/7KOnZ6yIpe0GX RyQA==
X-Gm-Message-State: AOAM5322Z0Jcx1d4Q2R8QPc2DSCLRwTQgdgktOlT60OEC3T4wUdJJgVg c7cb+8Zdn5eESedCGw3lcgQtPsWs
X-Google-Smtp-Source: ABdhPJz/REnqLF/NdSs8xJIVdRDnzVNFmsOSqXYvFpceQqqHdNYi+HNU95fUXJnHZn99bc0Dr0Vgjg==
X-Received: by 2002:a17:90a:2542:: with SMTP id j60mr7652234pje.70.1589604351722; Fri, 15 May 2020 21:45:51 -0700 (PDT)
Received: from [192.168.178.30] ([165.84.12.178]) by smtp.gmail.com with ESMTPSA id p10sm3115675pff.210.2020.05.15.21.45.49 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 15 May 2020 21:45:50 -0700 (PDT)
Subject: Re: Applicability, Use-cases, and Architecture for the CRH
To: Ron Bonica <rbonica@juniper.net>, "6man@ietf.org" <6man@ietf.org>
References: <DM6PR05MB634898C57C186C0133B2F852AEBA0@DM6PR05MB6348.namprd05.prod.outlook.com> <fec4e31b-0c98-7b3b-bbf0-d3225a21bc30@gmail.com> <DM6PR05MB634857FF18A11F58C42EC176AEBA0@DM6PR05MB6348.namprd05.prod.outlook.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <a6f6ff2c-3ae7-6ffc-928d-fcf37557abfe@gmail.com>
Date: Sat, 16 May 2020 16:45:46 +1200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <DM6PR05MB634857FF18A11F58C42EC176AEBA0@DM6PR05MB6348.namprd05.prod.outlook.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/QY358rstsVC09gNY1YXLNQWjW7g>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 16 May 2020 04:46:06 -0000
Ron, Definitely, if it isn't the same, I would rename it. I like memorable acronyms, so could I suggest FIDO (Forwarding IDentity Object)? Brian On 16-May-20 15:45, Ron Bonica wrote: > Brian, > > > An SRH SID is semantically very different from a CRH SID. So, I would be happy to rename the CRH SID to something else. Maybe the CRH-FIB-ID? > > I would also be glad to recognize the contributions of draft-lc-6man-generalized-srh-00. > > Ron > > > > Juniper Business Use Only > > -----Original Message----- > From: Brian E Carpenter <brian.e.carpenter@gmail.com> > Sent: Friday, May 15, 2020 9:41 PM > To: Ron Bonica <rbonica@juniper.net>; 6man@ietf.org > Subject: Re: Applicability, Use-cases, and Architecture for the CRH > > [External Email. Be cautious of content] > > > Hi Ron, > > Looking at your draft plus this extra material, I still think that the concept of a SID is helicoptered in to some extent. It isn't obvious to me that a SID in CRH is semantically the same thing as a SID in the Spring WG. Either it is, in which case you should cite the relevant SID RFC, or it isn't, in which case there is some more writing to do. > > I think you could also give an ack to the C-SIDs in https://urldefense.com/v3/__https://tools.ietf.org/html/draft-lc-6man-generalized-srh-00__;!!NEt6yMaO-gk!WQLMM8SDvQVSEuBWhatHjEAZG7SR40xhu6n19XNDr1U4m9iTxWJQ17mZH9tRrUf-$ > > Regards > Brian Carpenter > > On 16-May-20 12:41, Ron Bonica wrote: >> Darren, >> >> In previous emails, you suggest that the CRH draft needs information regarding Applicability, Use-cases and Architecture. After the call for adoption, we could add the proposed text, below. >> >> Would this text address your concerns. If not, please provide specific recommendations. >> >> Ron >> >> >> >> PROPOSED TEXT >> >> ---------------------- >> >> >> >> 9.0 Applicability >> >> >> >> The CRH can be used within any network where: >> >> * All nodes implement IPv6. >> * Edge node can filter inbound packets that contain the CRH. >> * Selected nodes can process the CRH. If a node is identified in a CRH, and it is not the packet’s ultimate destination, it must be able to process the CRH. >> * All nodes can maintain a basic FIB that maps IPv6 prefixes to next-hops. >> * Selected nodes can maintain a CRH-FIB that maps SIDs to IPv6 addresses and forwarding methods. If a node is identified in a CRH, and it is not the packet’s ultimate destination, it must be able to >> * CRH overhead is acceptable >> >> CRH-16 overhead is as follows: >> >> * 2 SIDs can be stored in a 8-byte CRH >> * 6 SIDs can be stored in a 16-byte CRH >> * 10 SIDs can be stored in a 24-byte CRH >> * 14 SIDs can be stored in a 32-byte CRH >> * Etc. >> >> CRH-32 overhead is as follows: >> >> * 1 SIDs can be stored in a 8-byte CRH >> * 3 SIDs can be stored in a 16-byte CRH >> * 5 SIDs can be stored in a 24-byte CRH >> * 7 SIDs can be stored in a 32-byte CRH >> * Etc. >> >> >> >> 10.0 Use-cases >> >> >> >> The CRH can be used to provide traffic steering in: >> >> >> >> * Data centers >> * Service provider networks >> * Enterprise networks >> >> Each of these networks may have a preferred method for populating the basic FIB and the CRH-FIB. For example, a data center may use a controller to populate both FIBs while a service provider may use an IGP to populate both FIBs. >> >> The CRH can implemented on: >> >> * ASIC-based routers >> * Software-based routers >> o Stand-alone >> o In a container on a server in a data center >> >> >> >> >> >> 11.0 Architecture >> >> >> >> CRH architecture determined entirely by RFC 8200. Specifically: >> >> >> >> * IPv6 source nodes use the CRH to determine nodes that a packet visits on route to is ultimate destination. >> * The CRH does not subsume the function of any other IPv6 extension header. For example, the CRH cannot be used for authentication, or to deliver optional internet-layer information to the packet’s ultimate destination node. >> * A packet that contains the CRH can also contain any valid combination of IPv6 extension headers. All extension header should function as per their specifications. >> * The CRH assumes that IPv6 Destination Address semantics are as defined in RFC 8200 and RFC 4291. >> * The CRH is processed identically on every node (See Section 5 of this document). Processing rules do not depend upon information encoded in the IPv6 Destination Address. >> * >> >> The CRH conforms to the letter and spirit of RFC 8200. For example: >> >> * A packet cannot contain two instances of the CRH >> * A CRH cannot be added or deleted by any node along a packet’s processing path >> >> >> >> >> >> >> Juniper Business Use Only >> >> >> -------------------------------------------------------------------- >> IETF IPv6 working group mailing list >> ipv6@ietf.org >> Administrative Requests: https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/ipv6__;!!NEt6yMaO-gk!WQLMM8SDvQVSEuBWhatHjEAZG7SR40xhu6n19XNDr1U4m9iTxWJQ17mZH-k2Yi-w$ >> -------------------------------------------------------------------- >>
- Applicability, Use-cases, and Architecture for th… Ron Bonica
- Re: Applicability, Use-cases, and Architecture fo… Brian E Carpenter
- RE: Applicability, Use-cases, and Architecture fo… Ron Bonica
- Re: Applicability, Use-cases, and Architecture fo… Brian E Carpenter
- Re: Applicability, Use-cases, and Architecture fo… Mark Smith
- RE: Applicability, Use-cases, and Architecture fo… Ron Bonica
- Re: Applicability, Use-cases, and Architecture fo… John Scudder
- Re: Applicability, Use-cases, and Architecture fo… Gyan Mishra
- Re: Applicability, Use-cases, and Architecture fo… Greg Mirsky
- Re: Applicability, Use-cases, and Architecture fo… otroan
- Re: Applicability, Use-cases, and Architecture fo… Brian E Carpenter
- RE: Applicability, Use-cases, and Architecture fo… Ron Bonica
- RE: Applicability, Use-cases, and Architecture fo… Chengli (Cheng Li)