Re: I-D Action: draft-han-6man-in-band-signaling-for-transport-qos-00.txt

Tom Herbert <tom@herbertland.com> Tue, 17 October 2017 19:38 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F13413309D for <ipv6@ietfa.amsl.com>; Tue, 17 Oct 2017 12:38:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gYiJqQDf_wZ3 for <ipv6@ietfa.amsl.com>; Tue, 17 Oct 2017 12:38:54 -0700 (PDT)
Received: from mail-qt0-x22b.google.com (mail-qt0-x22b.google.com [IPv6:2607:f8b0:400d:c0d::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DB3C1330AF for <ipv6@ietf.org>; Tue, 17 Oct 2017 12:38:54 -0700 (PDT)
Received: by mail-qt0-x22b.google.com with SMTP id 1so6081475qtn.3 for <ipv6@ietf.org>; Tue, 17 Oct 2017 12:38:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=TPxrTZAWdVk8cHPmji0Nz38A6e0aWhfNOp3qnnTJoII=; b=u5rEotfz/QokL47ov6bkl29WFpam0oCLDOh7JCW20tHxL+d38IIHXYtltw6lUnY62z sADZyUklOs4I6ZPUXt/FjQ9VA8sBhKFho5je1/HydWDpgRxqLsrAySDBwCOsPkLwBf2L AJH/PkbVvumsfSn7txkcSEifm1g4h1Ct9mC28or8mnvNzRAQmvWnDorkHf5p5B2NrOPF I4DZ0YCBilkPlUuB8qedsltzUYYnor/C2/FGFHfwTX5Tx6pF0pD00J8ZENvr3RjH2n9p o/HkG7fRzfPCI0eLYlAK1Wx1pw8Mt4DYuuqVHGyX/QiyKwCOZ8+mwQkFr8uVbv7NewfN 05Gg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=TPxrTZAWdVk8cHPmji0Nz38A6e0aWhfNOp3qnnTJoII=; b=RDPeTG4sZWkQadr1wGOQZXoq5ZRCSRupxpcvg0oQTJ4wbj19PGKnQoxUO+w3GB5tw5 lYaOoVtjWS3KIZ/Z2n2sUcmRmZR43h/uUJ14dEtViHRbl7UreggDlfddT87dZckCXk2n oE9i0tdBIA8YaywuQnlewq3P2o5pXLW0dRFoUiuyESZ7j54Cd69v+88pVazbco3qF5Yw M5QSdjxonsGJwQR1cD/fwdEEmOX6DRipwp0K9X1u4Qx9z6iSrnAb/UDmgBHf8Aua1dKU F/5RgT/vAfAUsO1pqhXj4JQl2TYLBRn6H+UytJq2Vby5HUysYFb/OLp3mW/tlwtw5/97 CY9A==
X-Gm-Message-State: AMCzsaVQiWK+xA6nRB2HYU4TJ5G5SB8vQ7JFbTUO6XIZVi1nILB/pHpd 4xuXDd4nxZKlLS2iFyEKgUiYXtD7lCPMGCf6H3GfJjz6
X-Google-Smtp-Source: AOwi7QC/YJAOhYuaWhj6iT852gg63jiHWxw7wmpjz9myJo10oxQuGVoH/aqDcNwWUv69OwXbAfy+XUO60fP7QZD6jyI=
X-Received: by 10.237.49.46 with SMTP id 43mr21908965qtg.27.1508269133460; Tue, 17 Oct 2017 12:38:53 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.237.54.4 with HTTP; Tue, 17 Oct 2017 12:38:52 -0700 (PDT)
In-Reply-To: <20171017181646.GD31973@faui40p.informatik.uni-erlangen.de>
References: <150774513036.24791.2138264254901122467@ietfa.amsl.com> <cc11634a-b5a2-88b9-f36f-82b3fd9d8d70@gmail.com> <1D30AF33624CDD4A99E8C395069A2A162CD734B2@sjceml521-mbx.china.huawei.com> <a4da4b26-6402-ad0d-a5f5-5bddc192b8f7@gmail.com> <4E40E3EF-B0E5-490E-BFF2-0511D97E9E80@employees.org> <CALx6S341v1zd2Q9bts8-zrKxU59kieJTJJ=nHQ5w4oQZg=t_cA@mail.gmail.com> <17525287-DDA8-4930-B90B-F9228DF69A90@employees.org> <CALx6S37wLvuJ9tUGjYmzm63eq_bxq0jXSEgfCtH_2i74SvrbLA@mail.gmail.com> <20171017181646.GD31973@faui40p.informatik.uni-erlangen.de>
From: Tom Herbert <tom@herbertland.com>
Date: Tue, 17 Oct 2017 12:38:52 -0700
Message-ID: <CALx6S34VRS4GumsFSqN8uDkv4TOLC8q+rOvyN=evUk83KPeHHg@mail.gmail.com>
Subject: Re: I-D Action: draft-han-6man-in-band-signaling-for-transport-qos-00.txt
To: Toerless Eckert <tte@cs.fau.de>
Cc: Ole Troan <otroan@employees.org>, 6man WG <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/RXm6oGwAqI93-GStE_59uXtPYg8>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Oct 2017 19:38:56 -0000

On Tue, Oct 17, 2017 at 11:16 AM, Toerless Eckert <tte@cs.fau.de> wrote:
> As mentioned in my prior mail: RSVP-IP deployments got killed by SPs that filtered
> packets with router-alert because common network devices punted packets because of
> the presence of router-alert. Instead of punting them because of presence of
> RSVP-router-alert option. And of course you can blame IP multicast: every router
> started to punt router-alert because of MLD (and of course us multicast folks
> missed the chance to fix this in MLDv2 because it only tried to duplicate IGMPv3),
> but no RFC told developers to punt because of router-alert + value in the router alert.
> AFAIK, the same applies to hop-by-hop option in general. Alas, even rfc7045 did not discuss
> this issue.
>
> IMHO we need a mechanism that specifies: devices MUST NOT punt/slow down packets
> because of the presence of this mechanism, but only because of presence of
> (mechanism,value) where value is intended to be supported by device. If the device
> can not do this, then it MUST IGNORE this mechanism and forward packets with the mechanism
> as if the option was not present.
>
> One simple way to do this is to define hop-by-hop-fixed that does say exactly this
> and then hopefully allow all existing hop-by-hop TLV to live underneath that
> fixed hop-by-hop-fixed option. But i would certainly suggest to review processing
> complexity and extensibility before such a conclusion.
>
> Personally i prefer inband UDP layer signaling, not because i do not like IPv6
> option headers but because there is just no ubiquitous API to allow apps
> independent of OS enhancements to set arbitrary options headers, especially ones

The API does exist. OSes like Linux have implemented APIs described in
RFC2292 and other common APIs.

> that are not yet defined (allow apps to fully defined the whole header bit by bit).
> Lets say from a javascript app in a browser. And i am more interested in ease of
> adoption than in architectural cleanlyness. But of course its perfectly valid to
> do the architectural clean appraoch and then prove me wrong and get that option
> adopted more ;-))

It's not just about architectural cleanliness, it's about correctness.
In the case that an intermediate node parses a UDP payload it is
likely doing this based on the some common destination port number.
Port numbers don't have global and persistent meaning (e.g. TCP port
80 does not always have to be HTTP) so this leads to the possibility
of misinterpretation as described in RFC7605. If the node improperly
writes data into the UDP payload and updates the checksum, then this
becomes silent data corruption. Extension headers do not have this
possibility of misinterpretation in the network.

This potential misinterpretation of UDP ports and many other issues
with trying to turn UDP into a network layer protocol were brought up
in the SPUD/PLUS discussions.

Tom