Re: [IPv6] FW: New Version Notification for draft-ls-6man-ipcomp-exclude-transport-layer-00.txt

"Shihang(Vincent)" <shihang9@huawei.com> Mon, 24 October 2022 13:11 UTC

Return-Path: <shihang9@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0841AC14F74A for <ipv6@ietfa.amsl.com>; Mon, 24 Oct 2022 06:11:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4QALCec0fwwH for <ipv6@ietfa.amsl.com>; Mon, 24 Oct 2022 06:11:43 -0700 (PDT)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2F7FC14F6EC for <ipv6@ietf.org>; Mon, 24 Oct 2022 06:11:43 -0700 (PDT)
Received: from fraeml703-chm.china.huawei.com (unknown [172.18.147.226]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4MwwNs0z3Vz689Rs for <ipv6@ietf.org>; Mon, 24 Oct 2022 21:08:13 +0800 (CST)
Received: from kwepemi100020.china.huawei.com (7.221.188.48) by fraeml703-chm.china.huawei.com (10.206.15.52) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2375.31; Mon, 24 Oct 2022 15:11:40 +0200
Received: from kwepemi500020.china.huawei.com (7.221.188.8) by kwepemi100020.china.huawei.com (7.221.188.48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Mon, 24 Oct 2022 21:11:38 +0800
Received: from kwepemi500020.china.huawei.com ([7.221.188.8]) by kwepemi500020.china.huawei.com ([7.221.188.8]) with mapi id 15.01.2375.031; Mon, 24 Oct 2022 21:11:38 +0800
From: "Shihang(Vincent)" <shihang9@huawei.com>
To: Nick Hilliard <nick@foobar.org>
CC: "ipv6@ietf.org" <ipv6@ietf.org>
Thread-Topic: [IPv6] FW: New Version Notification for draft-ls-6man-ipcomp-exclude-transport-layer-00.txt
Thread-Index: AQHY5Cl8xUyq1I1GpUi/POpOtUKdpa4c7V3Q///JRgCAANCqgA==
Date: Mon, 24 Oct 2022 13:11:38 +0000
Message-ID: <c113eda7697c4293ac6ae1fd0a5cd247@huawei.com>
References: <166623196798.53565.15728669594489380137@ietfa.amsl.com> <14cee747bfbb464686a840996116a6c7@huawei.com> <e207dff1-b960-5f09-ccf4-e0ea38c87ef3@foobar.org>
In-Reply-To: <e207dff1-b960-5f09-ccf4-e0ea38c87ef3@foobar.org>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.112.41.128]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/_ZbLbDLjLYMOmupa-5SiDcB4gQg>
Subject: Re: [IPv6] FW: New Version Notification for draft-ls-6man-ipcomp-exclude-transport-layer-00.txt
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2022 13:11:45 -0000

Hi Nick,
Thanks for your comments. Reply inline.

Best,
Hang Shi
-----Original Message-----
From: Nick Hilliard <nick@foobar.org> 
Sent: Monday, October 24, 2022 4:28 PM
To: Shihang(Vincent) <shihang9@huawei.com>
Cc: ipv6@ietf.org
Subject: Re: [IPv6] FW: New Version Notification for draft-ls-6man-ipcomp-exclude-transport-layer-00.txt

Shihang(Vincent) wrote on 24/10/2022 04:51:
> Hi 6MAN,
> I submitted a new draft about extensions to IPComp which compresses IP payload excluding transport layer and handles the out-of-order processing of compressed and un-compressed IP packet.
> 
> Looking forward to your review and comments.

couple of things on this draft:

- it's not clear that there is a need for a transport layer compression mechanism.  Application layer compression has been around for a long time and works well.
[HS] It is not about the transport layer compression. The IPComp(see RFC2713) will compress the IP payload, including the transport layer information. We propose an extension of IPComp to exclude the 4bytes of transport layer header out of the compression range.

- as you identified in the draft, the mechanism proposed in this case will cause breakage:

>    [...]  Therefore, the
>    transport layer information such as source port and destination port
>    is compressed. [...]   If IPComp compressed those
>    transport layer information, the nodes along the packet's delivery
>    path can not obtain the source port and destination port.  Therefore
>    the IPComp is not compatible with the network functions requiring the
>    transport layer information which makes it harder to deploy.

Examples of things which require transport layer information: ECMP/LAG, filtering, control plane protection, etc.  If this information cannot be inspected, then this creates a serious regression for normal network function.

- in some cases, the output of a compression algorithm will be longer than the input. There is no indication in the draft how this would be handled.
[HS] Indeed, the compression algorithm may produce longer result. RFC3173 talks about the problem in section 2.2 and I quote it here:
	" If the total size of a compressed payload and the IPComp header, as
   defined in section 3, is not smaller than the size of the original
   payload, the IP datagram MUST be sent in the original non-compressed
   form.  To clarify: If an IP datagram is sent non-compressed, no
   IPComp header is added to the datagram."

	Basically, if the compression can not produce short packet, the packet is not compressed and no IPComp header is added.
	However, the packet with IPComp header and without IPComp header will go through different process in the receiver end and cause out-of-order. That is why we are proposing add IPComp header even if the packet is sent uncompressed.


Nick