Re: Comments on draft-herbert-ipv6-update-dest-ops

Ole Troan <otroan@employees.org> Mon, 20 August 2018 19:07 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FE7112F1A5 for <ipv6@ietfa.amsl.com>; Mon, 20 Aug 2018 12:07:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FgG8tx-XreqP for <ipv6@ietfa.amsl.com>; Mon, 20 Aug 2018 12:07:12 -0700 (PDT)
Received: from accordion.employees.org (accordion.employees.org [198.137.202.74]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F2DB129619 for <ipv6@ietf.org>; Mon, 20 Aug 2018 12:07:12 -0700 (PDT)
Received: from astfgl.hanazo.no (77.16.73.30.tmi.telenormobil.no [77.16.73.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by accordion.employees.org (Postfix) with ESMTPSA id AF6CD2D5298; Mon, 20 Aug 2018 19:07:10 +0000 (UTC)
Received: from [IPv6:::1] (localhost [IPv6:::1]) by astfgl.hanazo.no (Postfix) with ESMTP id 2CF89432E3D; Mon, 20 Aug 2018 21:07:07 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Subject: Re: Comments on draft-herbert-ipv6-update-dest-ops
From: Ole Troan <otroan@employees.org>
In-Reply-To: <CALx6S35mZQ1HyDS3EWLZXJtT0ViXNJt1L_v3QqrKH9n7zDOM1g@mail.gmail.com>
Date: Mon, 20 Aug 2018 21:07:07 +0200
Cc: "C. M. Heard" <heard@pobox.com>, 6man WG <ipv6@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <837265C7-AF4A-4E78-A7B4-5D4AE5C38C8A@employees.org>
References: <CACL_3VF+EoKOEF-TkB3179UsmN_Yhaqt60jh_h2d2GLnE0EWDA@mail.gmail.com> <CALx6S356TVnbnZ_zp5+aK_x-DmMJUTidw0Wzbc3Tn=cscTd7VA@mail.gmail.com> <CACL_3VGUUs1FS4Qog6pzJ2WZyir2-keEVZTU6opzXQ4t0M-XUw@mail.gmail.com> <CALx6S35q5EqZt26KSPTGHBXZpzaNYyFBO9UxVNsi4is1BxUHrQ@mail.gmail.com> <CACL_3VGfMj6DjAWsxib6Hw_x=5X3CWASKU1oiGqvFdksDuFXDw@mail.gmail.com> <CALx6S37c_WCa+A3aD7X-rq-kj_RTGfGur8HVekt_LWTg6Os18g@mail.gmail.com> <F01E55CE-0E88-47BF-A30B-B83A0B7F5F0F@employees.org> <CALx6S35mAnjCw=0Jmz7Niacobw2QmKkUxNJPJ-CNVok_4dAOeQ@mail.gmail.com> <EDE97FE5-B72A-4ED5-A4B0-F143A0F23C3A@employees.org> <CALx6S35mZQ1HyDS3EWLZXJtT0ViXNJt1L_v3QqrKH9n7zDOM1g@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/_o-9l79g1nnXUnhzV7MBl3SjM2E>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Aug 2018 19:07:14 -0000

Tom,

> Consider the folling scenario:
> 
> Someone is developing a new Destination Option that might be of
> interest for use with tunnels and might even become one of those
> options "that makes sense to support" . Maybe it's an option for the
> aforementioned insitu-OAM, or maybe a general packet CRC, etc. The
> developer dutifully uses experimental option type 0x1e for the type
> value of their option to test it. In particular, the action taken if
> the option is unknown to a receiver is to skip over it. They made that
> choice because that allows incremental deployment of the support for
> the option in any combination supporting sending side or receivers. In
> other words, they don't want a flag day for the option that requires
> all nodes to support the new option.
> 
> Now they go to test backwards comapatbility of the option by sending
> it to a node that hasn't been updated to receive it. If the receiving
> node is a Linux system, then the option is ignored and the tunneled
> packet is processed as before-- expected behavior per the spec.
> However, if it's sent to a VPP node then the packet is dropped-- not
> expected. Even if this doesn't lead to incorrectness, it does breaks
> interoperability and violates "be liberal in what you receive". This
> net effect is that this makes development, test, and pilot deployment
> of new options really hard. Just implementing the TLV loop, even if
> the implementation doesn't process any of them, would resolve this.

Absolutely. The set of _optional_ destination options would benefit from this approach.
Of which we have none. I’d much rather just implement new options as they come available (if they ever will).
If I get time, I’ll try to do some performance measurements on what the actual cost is for a software based system.

Best regards,
Ole