Re: [IPv6] Progress of comments resolution on draft-ietf-6man-enhanced-vpn-vtn-id

"Dongjie (Jimmy)" <jie.dong@huawei.com> Mon, 18 December 2023 15:46 UTC

Return-Path: <jie.dong@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E278C14F68B; Mon, 18 Dec 2023 07:46:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.207
X-Spam-Level:
X-Spam-Status: No, score=-4.207 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7PGCQHuQdiMT; Mon, 18 Dec 2023 07:46:40 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E9FFCC14F615; Mon, 18 Dec 2023 07:46:39 -0800 (PST)
Received: from mail.maildlp.com (unknown [172.18.186.216]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4Sv40L6ldMz6JBZ7; Mon, 18 Dec 2023 23:45:22 +0800 (CST)
Received: from lhrpeml500003.china.huawei.com (unknown [7.191.162.67]) by mail.maildlp.com (Postfix) with ESMTPS id E72E8140F68; Mon, 18 Dec 2023 23:46:36 +0800 (CST)
Received: from dggpemm100005.china.huawei.com (7.185.36.231) by lhrpeml500003.china.huawei.com (7.191.162.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Mon, 18 Dec 2023 15:46:36 +0000
Received: from kwepemd100004.china.huawei.com (7.221.188.31) by dggpemm100005.china.huawei.com (7.185.36.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Mon, 18 Dec 2023 23:46:34 +0800
Received: from kwepemd100004.china.huawei.com ([7.221.188.31]) by kwepemd100004.china.huawei.com ([7.221.188.31]) with mapi id 15.02.1258.028; Mon, 18 Dec 2023 23:46:33 +0800
From: "Dongjie (Jimmy)" <jie.dong@huawei.com>
To: "mohamed.boucadair@orange.com" <mohamed.boucadair@orange.com>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>
CC: '6man' <ipv6@ietf.org>, "draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org" <draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org>
Thread-Topic: [IPv6] Progress of comments resolution on draft-ietf-6man-enhanced-vpn-vtn-id
Thread-Index: AQHaLR01Y1R43W8G1UWMSw5Ldo9B17CoMC6AgAbxxIA=
Date: Mon, 18 Dec 2023 15:46:33 +0000
Message-ID: <fc34b0f89c3f4af2b4fb5c5dc5d9f7bd@huawei.com>
References: <165d35ecaaa44a3daff0783cd161eb12@huawei.com> <014c01da2cde$f6e31510$e4a93f30$@olddog.co.uk> <2fcc89b28bc64c7cb5cf2abf20319006@huawei.com> <021e01da2d1d$2efc2930$8cf47b90$@olddog.co.uk> <DU2PR02MB1016002CC68F1D799A4562D9D888CA@DU2PR02MB10160.eurprd02.prod.outlook.com>
In-Reply-To: <DU2PR02MB1016002CC68F1D799A4562D9D888CA@DU2PR02MB10160.eurprd02.prod.outlook.com>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.84.153.253]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/T3Yrr8A3PxyNmzkKQOppw8G9HT8>
Subject: Re: [IPv6] Progress of comments resolution on draft-ietf-6man-enhanced-vpn-vtn-id
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Dec 2023 15:46:44 -0000

Hi Med and Adrian, 

Thanks for the discussion. Here I'd like to give some further explanation about the usage of the S bit and why it is considered useful. 

In normal IPv6 packet forwarding, the next-hop and outgoing interface are determined based on longest matching of the destination IPv6 address. Packets with unmatched destination address are always dropped. 

After the introduction of the VTN (or NRP, will use VTN just in this mail) option, the next-hop and outgoing interface are still determined based on the destination address, this is unchanged. 

Then for packets whose next-hop and outgoing interface are determined, the VTN ID in the packet is used to match with the sets of local resources allocated to VTNs on the outgoing interface. There are two possible results:

  1) The VTN ID in the packet matches with the same VTN ID which is configured on the outgoing interface with a set of network resources, then the packet is forwarded using that set of resources. 

  2) The VTN ID in the packet does not match with any VTN ID configured on the outgoing interface. How should the node behave in this case? There are two options: 1) forward the packet with best effort. 2) discard the packet. 

The S flag is used to tell the node how to forward the packet when the VTN-ID is not configured on the outgoing interface. 

With the above, I hope the functionality of the S flag is clear.

Then the possible question is can this be achieved by configuration? 

The answer is it can, but possibly with a relatively higher cost. Note this is to control the behavior for NRPs which are not provisioned on the node's outgoing interface. Usually devices do not provide control configuration for elements which are not enabled. Even if such configuration is supported, as the behavior can be different per NRP, this requires lots of configuration for NRPs which are not enabled. Then we also need to consider the case where the behavior may be different for different flows under the same NRP...

One analogy (not quite the same) to the S flag is the bits in IPv6 extension header options which are used to control the forwarding behavior when the option cannot be parsed by some node. That may also be achieved via configuration on the nodes, while it turns out a better choice is to use flags to indicate the behavior for unrecognized entities. 

With the above analysis, hope you also agree that the S flag is a more efficient approach for the required functionality. 

Best regards,
Jie

> -----Original Message-----
> From: mohamed.boucadair@orange.com <mohamed.boucadair@orange.com>
> Sent: Thursday, December 14, 2023 8:23 PM
> To: adrian@olddog.co.uk; Dongjie (Jimmy) <jie.dong@huawei.com>
> Cc: '6man' <ipv6@ietf.org>; draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org
> Subject: RE: [IPv6] Progress of comments resolution on
> draft-ietf-6man-enhanced-vpn-vtn-id
> 
> Hi Adrian,
> 
> > If the reason for splitting was technical or made for a radical
> > improvement in readability, I might buy it. But I think it is purely a
> > documentation issue.
> 
> It isn't.
> 
> The issue is that the use of the S bit is not justified, including with the case you
> mentioned below. This scan be handled by a local config parameter. I fail to see
> valid arguments so far why a per-NRP per-packet behavior will needed to
> process a packet.
> 
> Cheers,
> Med
> 
> > -----Message d'origine-----
> > De : ipv6 <ipv6-bounces@ietf.org> De la part de Adrian Farrel Envoyé :
> > mardi 12 décembre 2023 18:04 À : 'Dongjie (Jimmy)'
> > <jie.dong@huawei.com> Cc : '6man' <ipv6@ietf.org>;
> > draft-ietf-6man-enhanced-vpn-vtn- id@ietf.org Objet : Re: [IPv6]
> > Progress of comments resolution on draft-ietf-
> > 6man-enhanced-vpn-vtn-id
> >
> > Hi Jie,
> >
> > I rather expected some more comments on this, and I sat back to watch
> > them, but then it went quiet and I forgot.
> >
> > So, "better late than never".
> >
> > As an aside, I wonder whether you should follow the advice given by
> > TEAS in its work on draft-ietf-teas-enhanced-vpn, and feeding into IDR
> > on draft-dong-idr-sr-policy-nrp. That is, generalise the VTN use case
> > to NRP. I don't think this makes any technical change to the document,
> > but makes the applicability wider (more
> > generic) in step with what TEAS is doing. This seems to in keeping
> > with the suggestions in your Section 5. But it would require some
> > editorial work.
> >
> > I am not enthusiastic about splitting out multiple documents. It just
> > makes more work.
> >
> > While I understand that the authors and Med thought this might be a
> > compromise, I doubt that the authors really want to do this (that is,
> > make more work for themselves) and since no one spoke up on the list,
> > I wonder whether it the (perfectly valid) preference of only one
> > person.
> >
> > If the reason for splitting was technical or made for a radical
> > improvement in readability, I might buy it. But I think it is purely a
> > documentation issue.
> >
> > It is worth noting that if the document was split then, without the S
> > flag, the whole flags field would be unused in the remaining document.
> > It is "unusual" for a spec to define a field that has no documented
> > use. I'd be uncomfortable with that.
> > Conversely, I think this drat should introduce a new registry to track
> > the flags field
> >
> > Personally, I see some value in the S bit as defined. At least, I do
> > in the context of the network slicing use of the NRP. Consider a
> > network where some resources are strictly partitioned
> > (reserved) at some transit nodes, but at other nodes (perhaps ones
> > that are known to have plenty of capacity) no partitioning has been
> > performed. In this case, you would want the nodes that have not done
> > any partitioning to not be bothered by the VTN/NRP ID carried in the
> > packet. But consider, instead, a network that is resource constrained
> > where partitioning has been carefully performed on all nodes. In this
> > case you would want to observe that the packet cannot be assigned to
> > any partition and so should not use the resources of any other
> > partition.
> >
> > Well, I think this might be softened for two reasons:
> > 1. If a node does not understand the HBH option, it will skip over it
> > (you have specified the highest-order 2 bits are set to 00), so the
> > default behaviour is to try to forward the packet.
> > 2. Assigning best-effort forwarding to packets seems like a reasonable
> > default.
> >
> > So, I would keep the S bit in this, but I would change "drop" to
> > "perform best effort forwarding". (Noting, of course, that the best
> > you can do might still be to drop the packet.)
> >
> > Cheers,
> > Adrian
> >
> > > From: ipv6 [mailto:ipv6-bounces@ietf.org] On Behalf Of Dongjie
> > (Jimmy)
> > > Sent: Wednesday, November 8, 2023 12:59 AM
> > > To: 6man <mailto:ipv6@ietf.org>
> > > Cc: draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org
> > > Subject: [IPv6] Progress of comments resolution on
> > draft-ietf-6man-enhanced-vpn-vtn-id
> > >
> > > Hi WG,
> > >
> > > Regarding Med's review comments on
> > > draft-ietf-6man-enhanced-vpn-vtn-id,
> > the authors
> > > and Med met in Prague and reach some agreement about the
> > possible
> > resolution of his
> > > comments.
> > >
> > > The proposed approach is to split the definition of the S flag
> > out
> > > from
> > this document, so
> > > that this document will focus on the specification of the VTN
> > option
> > > with
> > all the flags as
> > > reserved, and the S Flag could be defined as an extension to
> > the VTN
> > option in a separate
> > > document.
> > >
> > > Before updating this WG draft, we would like to know the WG's
> > opinion
> > > on
> > this approach
> > > to move forward. Any feedback is welcome.
> >
> > -----------------------------------------------------------------
> > ---
> > IETF IPv6 working group mailing list
> > ipv6@ietf.org
> > Administrative Requests:
> > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> >
> Fwww.ietf.org%2Fmailman%2Flistinfo%2Fipv6&data=05%7C01%7Cmohamed.
> >
> boucadair%40orange.com%7Cc7b66a0799ca41a4b00e08dbfb346dd5%7C90c
> 7a
> >
> 20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C638379974860934578%7CUn
> know
> > n%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1ha
> >
> WwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=9bNvzWEsR9J86r5zy3V%
> 2BD6Y
> > Iv9ZsyazWDcIjP6aUlNA%3D&reserved=0
> > -----------------------------------------------------------------
> > ---
> ___________________________________________________________________
> _________________________________________
> Ce message et ses pieces jointes peuvent contenir des informations
> confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou
> copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le
> signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages
> electroniques etant susceptibles d'alteration, Orange decline toute
> responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
> 
> This message and its attachments may contain confidential or privileged
> information that may be protected by law; they should not be distributed,
> used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this
> message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been
> modified, changed or falsified.
> Thank you.