Re: IPv6 header insertion in a controlled domain

"jmh.direct@joelhalpern.com" <jmh.direct@joelhalpern.com> Sun, 08 December 2019 21:20 UTC

Return-Path: <jmh.direct@joelhalpern.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 811911200E9 for <ipv6@ietfa.amsl.com>; Sun, 8 Dec 2019 13:20:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3kYiqXJYqpHA for <ipv6@ietfa.amsl.com>; Sun, 8 Dec 2019 13:20:25 -0800 (PST)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B5A44120059 for <ipv6@ietf.org>; Sun, 8 Dec 2019 13:20:25 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 47WK3s4dP0z6G7fN; Sun, 8 Dec 2019 13:20:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1575840025; bh=MaI3TmBk0jKs+EXtJpC3cDrZH5o58gp8S5Y0FcC4NIU=; h=Date:Subject:In-Reply-To:From:To:Cc:From; b=ZVbPAnWYau8khZr3PrmW4nKnSaxgrtkeKff7RaeZUJGS3fuDd4+apK0uf2Kn6xqds 3hrAT0vTmMSaF1rwJD/2nTsCCZGW452VQ5ky/mt30oKUNERH/ANb5vIcxmiBASl2pr C1YagtRVTWVX+xlPaZSbOpLDWbpqKdwo8DqYbWcw=
X-Virus-Scanned: Debian amavisd-new at a2.tigertech.net
Received: from [IPv6:2600:380:923d:b4af:f1c7:efa9:b6b0:1c70] (unknown [IPv6:2600:380:923d:b4af:f1c7:efa9:b6b0:1c70]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 47WK3r4s3fz6G7bk; Sun, 8 Dec 2019 13:20:24 -0800 (PST)
SavedFromEmail: jmh.direct@joelhalpern.com
Date: Sun, 08 Dec 2019 16:20:21 -0500
Subject: Re: IPv6 header insertion in a controlled domain
In-Reply-To: <CAHw9_iKZC3Xw5JuTYoY1s8EFYoSeRWsjRw-XrXwJPY-XYKbc_Q@mail.gmail.com>
Importance: normal
From: "jmh.direct@joelhalpern.com" <jmh.direct@joelhalpern.com>
To: Warren Kumari <warren@kumari.net>, "Joel M. Halpern" <jmh@joelhalpern.com>
Cc: Ole Troan <otroan@employees.org>, 6man WG <ipv6@ietf.org>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="--_com.samsung.android.email_271554712238550"
Message-Id: <20191208212025.B5A44120059@ietfa.amsl.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/WKO1kbGPaeeou2XdQ7jyX7_n-XI>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Dec 2019 21:20:27 -0000

Thank you Warren.  That seems an appropriate and useful addition.Yours,JoelSent via the Samsung Galaxy S7, an AT&T 4G LTE smartphone
-------- Original message --------From: Warren Kumari <warren@kumari.net> Date: 12/8/19  16:14  (GMT-05:00) To: "Joel M. Halpern" <jmh@joelhalpern.com> Cc: Ole Troan <otroan@employees.org>, 6man WG <ipv6@ietf.org> Subject: Re: IPv6 header insertion in a controlled domain [no-hats]On Sun, Dec 8, 2019 at 11:10 AM Joel M. Halpern <jmh@joelhalpern.com> wrote:>> Ole, as far as I can tell, to answer the apparently simple quesiton you> propose "is there a s safe way to do header insertion?" we would need> o a clear definition of the domain in which it is to be doneJoel, can I make a small addition to this?o a clear definition of the domain in which it is to be done, and howthe domain boundary is enforced (I'm not sure if you would have viewedthis as 2 bullets or just one).Defining the domain might be (somewhat) easy, but it's also importantthat the boundary is enforceable - requiring the operator take actionto *block* traffic leaving the boundary is a very different thing tohaving the operator intentionally opt devices into the boundary.W> o a clear definition of the participants> o and a full re-examination of the discussion which led to the> prohibition against doing so in RFC 8200>> We do not have in front of us a document which achieves either of the> first two bullets. Without that, it is very hard for us to perform the> third bullet.>> I note for example that the presentation in Sngapore did not disucss the> implications or behaviors of hosts inside the Segment Routing v6 domain.>   But the rfc-to-be explicitly includes hosts inserting the information> in the original header.> the presentation in Singapore did not discuss how SR header creators> will deal with errors caused by in=-path header insertion, when the> errors arrive at places that did not perform the insertion.>> But there is a more important issue.  The usual IETF practice (not the> rule, but a practice we have found to be good) is to ask what problem is> being solved BEFORE we evaluate solutions.  There are many good reasons> why we have found this helpful.  You seem to be asking for the opposite.>> I find myself forced to repeat my question:  what benefit is header> insertion bringing to justify working group consideration.> I understand your earlier request not to repeat points.  But for me at> least, it is very hard to answer your question without that.>> Yours,> Joel>> On 12/8/2019 4:24 AM, otroan@employees.org wrote:> > Mark,> >> > [...]> > [renamed thread]> >> >> Take an example of 3 routers A, B and C that is under the same control.> >> Traffic travels from left to right.> >>> >> A -- B -- C> >>> >> A has a tunnel to C using ULA source and destination.> >> A packet ingresses on A, is encapsulated and forwarded towards C.> >> A has for reasons unknown to us outsourced a function to B. Where B insert an extension header in the packet originated by A.> >> C is also in on the game, being a tunnel end-point, removing the encapsulating header and extension header.> >>> >> If you can leave the nuances of SR and the whatever they propose on the shelf for a minute.> >>> >> Do you agree in principle that this approach of "header insertion in a controlled domain" can be made to work,> >> and should be indiscernible from A inserting the extension header itself?> >> > Yes, there are obviously many ways of skinning this cat.> > In this thread I don't want to try solve whatever problem the EH insertion camp wants solved. I don't think I understand it well enough.> > And I'm unconvinced the 6man group in general understands the underlaying routing problems leading to the proposed solution.> > What I was interested in exploring in this thread was if we could reach agreement that there in principle is a safe way of doing header insertion.> >> > In my simple example above.> > Do you agree that in a controlled distributed system there is no perceivable difference between node A inserting the header or node B doing it?> > Conceptually you could think of it as a tunnel with muliple endpoints (although that's a bit hard to visualize ;-)).> >> > Can we agree that inserting headers and changing the packet size among participating nodes in a distributed system is not inherently unsafe?> > As far as I can think of the only complication to be considered is that node A must be aware of packet size changes when doing PMTU estimation.> > (typically though in these types of networks, one simply declares that "MTU must be well managed. i.e. large enough".> >> > Cheers,> > Ole> >> >>> --------------------------------------------------------------------> IETF IPv6 working group mailing list> ipv6@ietf.org> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6> ---------------------------------------------------------------------- I don't think the execution is relevant when it was obviously a badidea in the first place.This is like putting rabid weasels in your pants, and later expressingregret at having chosen those particular rabid weasels and that pairof pants.   ---maf