RE: Lars Eggert's Discuss on draft-ietf-6man-ipv6-alt-mark-08: (with DISCUSS and COMMENT)

Giuseppe Fioccola <giuseppe.fioccola@huawei.com> Mon, 11 October 2021 13:46 UTC

Return-Path: <giuseppe.fioccola@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CB4B3A0BCF; Mon, 11 Oct 2021 06:46:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VB1Vx_XrkLkC; Mon, 11 Oct 2021 06:46:16 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 166703A0BD4; Mon, 11 Oct 2021 06:46:16 -0700 (PDT)
Received: from fraeml714-chm.china.huawei.com (unknown [172.18.147.201]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4HSg3C54qKz689nS; Mon, 11 Oct 2021 21:42:47 +0800 (CST)
Received: from fraeml714-chm.china.huawei.com (10.206.15.33) by fraeml714-chm.china.huawei.com (10.206.15.33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.8; Mon, 11 Oct 2021 15:46:12 +0200
Received: from fraeml714-chm.china.huawei.com ([10.206.15.33]) by fraeml714-chm.china.huawei.com ([10.206.15.33]) with mapi id 15.01.2308.008; Mon, 11 Oct 2021 15:46:12 +0200
From: Giuseppe Fioccola <giuseppe.fioccola@huawei.com>
To: Lars Eggert <lars@eggert.org>, "draft-ietf-6man-ipv6-alt-mark@ietf.org" <draft-ietf-6man-ipv6-alt-mark@ietf.org>
CC: The IESG <iesg@ietf.org>, Bob Hinden <bob.hinden@gmail.com>, "otroan@employees.org" <otroan@employees.org>, "ipv6@ietf.org" <ipv6@ietf.org>, "6man-chairs@ietf.org" <6man-chairs@ietf.org>
Subject: RE: Lars Eggert's Discuss on draft-ietf-6man-ipv6-alt-mark-08: (with DISCUSS and COMMENT)
Thread-Topic: Lars Eggert's Discuss on draft-ietf-6man-ipv6-alt-mark-08: (with DISCUSS and COMMENT)
Thread-Index: AQHXiqaCe4LS65IPoke4Ve63Qoanj6vN2QKAgAA/jFA=
Date: Mon, 11 Oct 2021 13:46:12 +0000
Message-ID: <c8e1f6518f344594ab962947edda7948@huawei.com>
References: <162824256748.9012.15703111505505730185@ietfa.amsl.com> <5A3DB972-AC12-40A2-970D-1846F916AD6E@eggert.org>
In-Reply-To: <5A3DB972-AC12-40A2-970D-1846F916AD6E@eggert.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.48.218.182]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/W080SIZI0aBSlTzsLWErGJP6cKM>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Oct 2021 13:46:30 -0000

Hi Lars,
Thank you for your review.
Please find my replies inline tagged as [GF].

Regards,

Giuseppe

-----Original Message-----
From: Lars Eggert <lars@eggert.org> 
Sent: Monday, October 11, 2021 12:08 PM
To: draft-ietf-6man-ipv6-alt-mark@ietf.org
Cc: The IESG <iesg@ietf.org>; Bob Hinden <bob.hinden@gmail.com>; otroan@employees.org; ipv6@ietf.org; 6man-chairs@ietf.org
Subject: Re: Lars Eggert's Discuss on draft-ietf-6man-ipv6-alt-mark-08: (with DISCUSS and COMMENT)

Hi,

I looked at the diff between versions -08 and -10 to see if my DISCUSS was addressed:

On 2021-8-6, at 12:36, Lars Eggert via Datatracker <noreply@ietf.org> wrote:
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> Section 2.1. , paragraph 4, discuss:
>>   Therefore, the IPv6 application of the Alternate Marking Method MUST
>>   NOT be deployed outside a controlled domain.
> 
> That's not what Section 6 says, which allows use outside a controlled 
> domain (across the Internet) if protection is applied?
> 
> Section 2.1. , paragraph 4, discuss:
>>   Some scenarios may imply that the Alternate Marking Method is applied
>>   outside a controlled domain, either intentionally or unintentionally,
>>   but in these cases, IPsec authentication and encryption MUST be used.
> 
> How can one require use of IPsec for an unintentional use outside of a 
> controlled domain? If the header leaks by accident, surely it's 
> unreasonable to expect that IPsec had been set up to catch any and all such possible leakage?

the way I understand the additions in -10 is that a "controlled domain" is supposed to be some networks that either directly peer or interconnect with VPNs (like IPsec). I consider this part of my DISCUSS addressed.

[GF]: Thanks.

> Section 5.3.1. , paragraph 2, discuss:
>>   It is important to note that if the 20 bit FlowMonID is set
>>   independently and pseudo randomly there is a chance of collision.
>>   Indeed, by using the well-known birthday problem in probability
>>   theory, if the 20 bit FlowMonID is set independently and pseudo
>>   randomly without any additional input entropy, there is a 50% chance
>>   of collision for 1206 flows.  So, for more entropy, FlowMonID can
>>   either be combined with other identifying flow information in a
>>   packet (e.g. it is possible to consider the hashed 3-tuple Flow
>>   Label, Source and Destination addresses) or the FlowMonID size could
>>   be increased.
> 
> It seems odd to define a dedicated FlowMonID, but make it so short 
> that it is basically not usable in many realistic scenarios. If other 
> parts of the packet headers need to be inspected to disambiguate 
> FlowMonID collisions, this (1) should at least be more carefully 
> specified in this document (since every node will need to do it in the 
> same way) but (2) probably argues for a much longer FlowMonID - why not make it 64 bits or longer?

Some changes were made with regards to the FlowMonID, but I don't think they address my points above.

First, the ID is still too short to be useful by itself in moderately busy networks, even when centrally assigned (with the overheads that that entails) - it can only distinguish ~1M concurrent flows, and much less than that with random assignment.

[GF]: An option can be to make FlowMonID longer, but we are now following a conservative approach. In this regard, RFC6437 mentioned the 3-tuple of Flow Label, Source Address and Destination Address for efficient IPv6 flow classification. In case of Alternate Marking, as said in the document, it is not possible to use the Flow label, but the usage of the 3-tuple of the FlowMonID, Source Address and Destination Address fields is a viable solution also to solve disambiguation issues.


Second, doing lookups based on the FlowMonID together with other fields still seems underspecified. There is text that all devices in a domain need to use the same lookup mode (FlowMonID only or combined with other fields), but nothing is specified with regards to how a combined lookup needs to be implemented everywhere. Doesn't this measurement scheme rely on consistent hashing of such fields everywhere?

[GF]: A simple logical AND operation of the fields can work. The alternate marking method can be applied to both single path (RFC8321) and multipoint path (RFC8889). For this reason the flow selection rules, used to select the flows to be monitored, may vary in order to change the pattern of the monitored network. The FlowMonID can identify not only a point-to-point flow but, in general, it can be assigned to a multipoint-to-multipoint flow. Since this document only aims to define the IPv6 Option for Alternate Marking, we could mention that the type of lookup can be configured but outside the scope of this document. Indeed we are working on control plane I-Ds (draft-ietf-idr-sr-policy-ifit, draft-chen-pce-pcep-ifit) and plan to work on a YANG Model as well.


Thanks,
Lars