Re: I-D Action: draft-ietf-6man-segment-routing-header-23.txt

Mark Smith <markzzzsmith@gmail.com> Tue, 17 September 2019 04:59 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 478A21200FB for <ipv6@ietfa.amsl.com>; Mon, 16 Sep 2019 21:59:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.498
X-Spam-Level:
X-Spam-Status: No, score=-0.498 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=0.999, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7pacjNlU4Xl0 for <ipv6@ietfa.amsl.com>; Mon, 16 Sep 2019 21:59:22 -0700 (PDT)
Received: from mail-ot1-x333.google.com (mail-ot1-x333.google.com [IPv6:2607:f8b0:4864:20::333]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D9851200E9 for <ipv6@ietf.org>; Mon, 16 Sep 2019 21:59:22 -0700 (PDT)
Received: by mail-ot1-x333.google.com with SMTP id 21so1849555otj.11 for <ipv6@ietf.org>; Mon, 16 Sep 2019 21:59:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=Nbv+k8aFiutLU8YpIOFlOTmFyEKDrrLGADDlJzRxvmM=; b=WwFVzF9CiZhTB5G4klSmukBmG5/wTya1r0oICQz6QoaPx8FKgybXHQp6Q7+tup8oKT voDMzJl0IQTwwTwuHLuu1ieLku+Jk0mmEJDu2rViT7bsUZ3WAUQxTmqW/wNc8UZdAKlW j9rYIloNxDJiLmrpomclksJa4wLpJM+96ZZqq8sFWEgCplGbzojGD+DQsrP+JHwY+iDD G8cLWluZHuCgT83AT3/t1QggQeMuClVXq2R/QHg5lLBixajJ/exTj1IQ8LZlOq6jfgJb NjEqIWPz946h/0QAQyzJKSKWlOUEptRcdkgn2LF5HWTc+oetzbPqmlkO5tIThnSBXi8Y TvbQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=Nbv+k8aFiutLU8YpIOFlOTmFyEKDrrLGADDlJzRxvmM=; b=bxKCvl4ELRObo/Jc0pS2gKm4zSi1w9njPDVRVbNmeXBqh/RUA5dC3VFbZdvIt/WpkJ bgLavhKrDGPgeiU8l+wrHMGiPi19KvwwKXy9Z6pkL2WsyBv7U4R8IjgLVogQjsCt7Uxq M1V9WVmDBxYwsL4YyjDqFqbBNLARUFDiDFP/rdwTkzHiiQ7GugxDJb5afiQB9xBUER1f Tx9Hy6tM69Z9zI38Q6LR4UAbM6DaXkyjc6sT68SQVcvPaAlOTgWnoYs+I8uOOwoqEFqU F0KC7sJXE3uX2t3lMzYgUaTeAn1FWvrpv57Q7B840HelcHT0IwvQD6IFtqIOZplbGF1P 5k2A==
X-Gm-Message-State: APjAAAXwiMJHfT0b4Qg5NAbE2vanzueIXVjIyE6ed/jRh8QWRsf/DE2H vbEryFjuu0SCLTKhbXrN5MZFMs/essFJhtZj2sU=
X-Google-Smtp-Source: APXvYqxask5DKismkwSDRhAPWGZMeDUtxVQqNh2gYD1L6YbsbIHrXiL5S/wCKFvSkortWon8E3wEX+ZQmXQPu+IdKtA=
X-Received: by 2002:a05:6830:18b:: with SMTP id q11mr1326999ota.94.1568696361692; Mon, 16 Sep 2019 21:59:21 -0700 (PDT)
MIME-Version: 1.0
References: <156869252478.28110.8327750972087890322@ietfa.amsl.com> <9A620045-D641-4478-B548-477880EF769D@cisco.com>
In-Reply-To: <9A620045-D641-4478-B548-477880EF769D@cisco.com>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Tue, 17 Sep 2019 14:58:55 +1000
Message-ID: <CAO42Z2yoYB6-jjqVGBE_C7uQvVdHBCfeecOXbcrZJA4n2JonAg@mail.gmail.com>
Subject: Re: I-D Action: draft-ietf-6man-segment-routing-header-23.txt
To: "Darren Dukes (ddukes)" <ddukes@cisco.com>
Cc: 6man <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/Uw0aOCCtL-2f_dqnTGXCu8ap3Fw>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Sep 2019 04:59:24 -0000

Hi,

I really think this ID should be strongly recommending the use of the
Unique Local Unicast Address space (RFC 4193) for the outer tunnel
addressing used for the SR function.

It's specifically designed and intended for local network limited
traffic. Consequently, it is clearly invalid traffic if it leaks onto
the Internet, which can't as easily be said about GUA addressed
traffic. ULA traffic's ability to travel very far across the Internet
is inherently limited.

Furthermore, it has a 40 bit global ID portion that is required to be
likely globally unique via an algorithm ("Unique" Local Unicast
Address space). That means than in a scenario where two SR networks
are joined together e.g. carrier-to-carrier SR, each of their unique
/48 ULA prefixes can be routed into the others' network without
requiring renumbering or any form of IPv6 NAT.

(For some more background on ULAs, I recently did a presentation at
the AusNOG conference on getting them right, as some people have been
treating them as exact equivalents of RFC 1918s, and making them
non-unique - "Ausnog 2019 - Getting IPv6 Private Addressing Right" -
https://www.slideshare.net/MarkSmith214/ausnog-2019-getting-ipv6-private-addressing-right
)

Regards,
Mark.





On Tue, 17 Sep 2019 at 14:02, Darren Dukes (ddukes) <ddukes@cisco.com> wrote:
>
> This version addresses some editorial and minor changes based on the IESG review including:
> Liang Xie - minor edits
> Alexey Melnikov - BCP38 reference
> Magnus Westerlund’s -indicate HMAC verification failure results in drop
>
> Darren
>
> > On Sep 16, 2019, at 11:55 PM, internet-drafts@ietf.org wrote:
> >
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts directories.
> > This draft is a work item of the IPv6 Maintenance WG of the IETF.
> >
> >        Title           : IPv6 Segment Routing Header (SRH)
> >        Authors         : Clarence Filsfils
> >                          Darren Dukes
> >                          Stefano Previdi
> >                          John Leddy
> >                          Satoru Matsushima
> >                          Daniel Voyer
> >       Filename        : draft-ietf-6man-segment-routing-header-23.txt
> >       Pages           : 32
> >       Date            : 2019-09-16
> >
> > Abstract:
> >   Segment Routing can be applied to the IPv6 data plane using a new
> >   type of Routing Extension Header called the Segment Routing Header.
> >   This document describes the Segment Routing Header and how it is used
> >   by Segment Routing capable nodes.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-6man-segment-routing-header/
> >
> > There are also htmlized versions available at:
> > https://tools.ietf.org/html/draft-ietf-6man-segment-routing-header-23
> > https://datatracker.ietf.org/doc/html/draft-ietf-6man-segment-routing-header-23
> >
> > A diff from the previous version is available at:
> > https://www.ietf.org/rfcdiff?url2=draft-ietf-6man-segment-routing-header-23
> >
> >
> > Please note that it may take a couple of minutes from the time of submission
> > until the htmlized version and diff are available at tools.ietf.org.
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > --------------------------------------------------------------------
> > IETF IPv6 working group mailing list
> > ipv6@ietf.org
> > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> > --------------------------------------------------------------------
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------