on supporting IOAM in IPv6

Haoyu Song <haoyu.song@futurewei.com> Wed, 15 July 2020 18:16 UTC

Return-Path: <haoyu.song@futurewei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45EA73A09B1; Wed, 15 Jul 2020 11:16:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.089
X-Spam-Level:
X-Spam-Status: No, score=-2.089 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RGFT1ri_9yXv; Wed, 15 Jul 2020 11:16:10 -0700 (PDT)
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2118.outbound.protection.outlook.com [40.107.236.118]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A6BE53A098B; Wed, 15 Jul 2020 11:16:10 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bS5bp8CT3YzFxavtpuYz3HVX05LIp4Yq+dOKxNmAs1wZ6+D5Hr51BK8sJURW5Z0HTTHv3ALZ6oW9QBJXrcNUiP6yKx70Pfb7q0Ta/YF8/U5imig7MYaDXlGwnL0zHtl0RCn+kdcurfNweslbkxfTl8wfLD5ox1+mQruVrRN4aoSZtHFaEAJP/Ogrs7AwvDD37ztNaU29ZDW5nj8+sONy5fVzFXpvlExBDHFUFUSdG6UEBONy3H6uTWouhpo8gohIG76SMDr6Fd+aFt/IHWNc/RAsGLyo2IvKzrE9ZgAECNShmPEUG0G2dLCMoQ2KedkQUAxXMthO6EvKbybkF59t8A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TbmEEqySx8ObsQheTmZCOWbvRYU2M13Zav3z77Sl75M=; b=kuOUEScntDd6981ccCdoGeye5DKOtdxUp4ZncenJeElMmrP3WYvYO64tu3ek2L5MjdsbWtlFUjmw3745SVIJPqf/9Igz+tyncEsoOI7hkh9+Vkj5CYfXRoe7J8tK5KBnnkUbay3l9G08BNKzHX0EFLs0s2qnPZ6Aa02LDmQtkuApVG9IiJQCCA2p2nPgxmjk818T+NL5OF0MfJ8JU8Mel3oqmFwdgdVYqmDl4hkityYXyUXi6rKaBLKnHgQaLaKF6iUkrRjr02HfgaMcQ21jNPiL6nzuj5t/XGRxU2rQMsdZgZxnTh4GkIYgjmiuDm8EtYqMzM28lUnmwJC8p2rXMA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TbmEEqySx8ObsQheTmZCOWbvRYU2M13Zav3z77Sl75M=; b=U1CJQhgpRyBqaQK/3iREHwsI6PfUffAjr2CIcxcZpoaEYvjuyFTsPbEgGfCFr7eLj2spONZQ+VtmQdYmLPawCB/RsqerjHFFH0pDbZKYcGq3aMv5m7+VeGgBOr4BZ2MstT3fj/jjbQ3uZdrnNeTmAGAeFk/ZUMeBmexuz6RI5YQ=
Received: from DM6PR13MB2762.namprd13.prod.outlook.com (2603:10b6:5:13c::13) by DM5PR13MB1324.namprd13.prod.outlook.com (2603:10b6:3:26::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3195.10; Wed, 15 Jul 2020 18:16:07 +0000
Received: from DM6PR13MB2762.namprd13.prod.outlook.com ([fe80::c8ec:7b96:52dd:ac11]) by DM6PR13MB2762.namprd13.prod.outlook.com ([fe80::c8ec:7b96:52dd:ac11%3]) with mapi id 15.20.3195.017; Wed, 15 Jul 2020 18:16:07 +0000
From: Haoyu Song <haoyu.song@futurewei.com>
To: "IETF IPPM WG (ippm@ietf.org)" <ippm@ietf.org>, 6man <6man@ietf.org>
Subject: on supporting IOAM in IPv6
Thread-Topic: on supporting IOAM in IPv6
Thread-Index: AdZa0hLmwf1lWFxQQA2Xg1+yIhEZvQ==
Date: Wed, 15 Jul 2020 18:16:07 +0000
Message-ID: <DM6PR13MB27626672DC0B7333B0FA69F99A7E0@DM6PR13MB2762.namprd13.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=futurewei.com;
x-originating-ip: [69.149.42.153]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 344ab57f-c1c8-4af4-4b22-08d828eb2505
x-ms-traffictypediagnostic: DM5PR13MB1324:
x-microsoft-antispam-prvs: <DM5PR13MB1324237A902652AF065C734D9A7E0@DM5PR13MB1324.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: gUUsRAMQ6q7Haee+acS4Z7TSbiE+1HXGfNXFDVbe6Mt30GRMviM4fvk7x210n1CEX2RRtWiWDHlIf6gUd9mNtmViTOcm5wP15J9Dnrrwugu/qZDy8l3XznbuMLhezDGEFDliAzmTchYyfcDfkK6Yss5F3hUl5dbO0ASD6D+jzBBOZz3Pm1GfbNS4p7fNS+1QsVyPOCNa7LazHnaDPkVc5C/ChCWMW8hjzuMemeq8/BqBFyMf4OJlZcqmL62xEpeO17NwIzmxRo+xTGdv6cPRwphvCi4TiKthfnSNCwPf/Oadn7JDZSBHehfbN+rpGznWMuE4JDlYp4903uN7pLdbTw+mYQezsBKKVHxXs36rwGXVbamhUyySf0ugj2TTR6Awg3v1brvqbIUS8+tOnykq3w==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR13MB2762.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(366004)(39850400004)(136003)(346002)(396003)(376002)(66476007)(316002)(71200400001)(52536014)(83380400001)(9686003)(5660300002)(966005)(110136005)(86362001)(26005)(186003)(44832011)(55016002)(8936002)(6506007)(66446008)(33656002)(66556008)(66946007)(64756008)(450100002)(76116006)(166002)(478600001)(7696005)(2906002)(4743002)(8676002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: dKDJaZ6kpznpWCCVli05j9MUbfeCD1I/bQtr7QTdYF0E+U03gSsZalUM10ux0Z8pqd8NXACnHw07xG3X75wA7U73XZfAjUz9YRHadNCUbi80U/8qqBFKFHbPKQAuqs6Or1ILASQ/Va5GdEzpaNwWwecZC/jSm9WwkDBPeSajAUho8VlSjddSY8MT55pk9g2d+aYUcSXT20fBIzb6dEcNrDjQf84LTvJlaUmtizZGsbZAgMoCvTqulJoOx4jaBvygeQsFFFe74iB5nOqq7dwpMqq+Bts8R/QwTFRX1uhjfA0fQzk1BzsHWpcB7KxvDWzJVSU5wXApE/bsXVotHOYD9U337H7xhGpOzIoSrUkFyy8SdW6QsvlRpGhSb1V2mzL6hqqj56Q5O1FNDpLYkKiED568uG/EI3zO6CFTz8B3/DDQpoQkFThDL8Q7rfRtmHIVln2y0PITDNmJvdG+kipQ0z5YxNodYn7wYxr/8lKAUgs=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_DM6PR13MB27626672DC0B7333B0FA69F99A7E0DM6PR13MB2762namp_"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR13MB2762.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 344ab57f-c1c8-4af4-4b22-08d828eb2505
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jul 2020 18:16:07.5875 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Gj/a/dkFJydy3S7VBdhKbDvD0JJja5BQVARTNhfSdQEdRlcVz5OxsnNFUUGl3wKvitYuAl55XW+xlCKBVr+ceg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR13MB1324
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/EuQZW7esBjcJe-1qomtNH3jY0Pc>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jul 2020 18:16:12 -0000

Hi all,

We will present this draft in the lighting talk session of IPPM WG meeting in IETF108
https://datatracker.ietf.org/doc/draft-song-ippm-ioam-ipv6-support/

Since there is usually no time for any discussion for the short talk in the meeting, we'd like to start this email discussion thread, also involving the relevant 6man WG, to solicit suggestions and comments.
Below is a quick summary:

The draft is related to another WG draft https://datatracker.ietf.org/doc/draft-ietf-ippm-ioam-ipv6-options/ in which the IOAM trace option is proposed to be carried as an IPv6 HBH option.

However, using HBH, the mandatory first extension header,  to carry the large and potentially variable size IOAM trace option can be very challenging for implementations,
especially when some other extension headers, such as SRv6 RH, must be accessed.

This draft discuss several alternatives to avoid or mitigate the problem, including:

  1.  Separate the header part and data part of the IOAM trace option, and move the data part to a later extension header while keeping the header part in HBH
  2.  Using the IOAM DEX option instead to avoid carrying data in packet
  3.  Using the segment IOAM trace method to ensure the IOAM data will be stripped off and exported at some specific nodes (e.g., SRv6 segments),  so the IOAM option header can remain short and constant at these nodes.
     *   Flavor 1: Fixed segment size encoded in IOAM option header
     *   Flavor 2: Configurable by network controller

Please see more detailed description in the draft. The draft only covers the IOAM-related methods, although other methods are also possible.

Please let us know what you think. Thank you very much!

Best regards,
Haoyu