Comments on draft-hinden-6man-hbh-processing-00
"C. M. Heard" <heard@pobox.com> Sun, 14 March 2021 00:37 UTC
Return-Path: <heard@pobox.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5CAA93A13D4 for <ipv6@ietfa.amsl.com>; Sat, 13 Mar 2021 16:37:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=pobox.com; domainkeys=pass (1024-bit key) header.from=heard@pobox.com header.d=pobox.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SZBKGDE5GMN3 for <ipv6@ietfa.amsl.com>; Sat, 13 Mar 2021 16:37:01 -0800 (PST)
Received: from pb-smtp20.pobox.com (pb-smtp20.pobox.com [173.228.157.52]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A03403A13FC for <ipv6@ietf.org>; Sat, 13 Mar 2021 16:37:01 -0800 (PST)
Received: from pb-smtp20.pobox.com (unknown [127.0.0.1]) by pb-smtp20.pobox.com (Postfix) with ESMTP id 238D9113F80 for <ipv6@ietf.org>; Sat, 13 Mar 2021 19:36:59 -0500 (EST) (envelope-from heard@pobox.com)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=pobox.com; h=mime-version :from:date:message-id:subject:to:cc:content-type; s=sasl; bh=zWn PNEz3w/q/3Hmjo6IVj8RtJWg=; b=HpTlh9aMq8p1Ks7Tgg9pjbYv690qjRZLHs/ TC3uEarqocSNDjZMM0+aFvUaDvHwBrl/LxOJKrJ/YKKlzuTRQyaPbXZbHHizLzxn 3Eu6tTaBov2FhPBOLx9VdxN9l7OlwEIt++x5RCT3iPWglJe4nbMFLBmID8KDI/L8 S20vRM4w=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=pobox.com; h=mime-version :from:date:message-id:subject:to:cc:content-type; q=dns; s=sasl; b= UJxMFNtP9eIbQYiWFTgd/bsXL925wLmkxf5KoeELRPUYfKLZCWePL6ElfGau1zKD dDkSUqU3Ra1N5eL/e75AP2LSWHg84aVV4OXqkGpT0Q7+EqZznN6VxyikHzmUhJfs vSW7Aqfnw5iv6KEDf6yZRF1tPBcmGUmh8kXX9D9HnRk=
Received: from pb-smtp20.sea.icgroup.com (unknown [127.0.0.1]) by pb-smtp20.pobox.com (Postfix) with ESMTP id 1B602113F7F for <ipv6@ietf.org>; Sat, 13 Mar 2021 19:36:59 -0500 (EST) (envelope-from heard@pobox.com)
Received: from mail-io1-f51.google.com (unknown [209.85.166.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp20.pobox.com (Postfix) with ESMTPSA id AE083113F6D for <ipv6@ietf.org>; Sat, 13 Mar 2021 19:36:56 -0500 (EST) (envelope-from heard@pobox.com)
Received: by mail-io1-f51.google.com with SMTP id 81so29750305iou.11 for <ipv6@ietf.org>; Sat, 13 Mar 2021 16:36:56 -0800 (PST)
X-Gm-Message-State: AOAM530K7ClMTWmaDqjmy1Kza3tiHVQn6OuhSsEnhZNgIOMFiLKBYMNO IT8v2jJm+zHhttfHZTBH3toeYrmK8h5On2y7N1E=
X-Google-Smtp-Source: ABdhPJzX3o2uAHrHwSmHag83Q+DtpjNlVkgRhe6BoZFpdTZL8/8LUtX/uVC/R7fN/e99XAk85LM4BTqXX5a9Z6FNE1Q=
X-Received: by 2002:a05:6602:722:: with SMTP id g2mr3592846iox.1.1615682215475; Sat, 13 Mar 2021 16:36:55 -0800 (PST)
MIME-Version: 1.0
From: "C. M. Heard" <heard@pobox.com>
Date: Sat, 13 Mar 2021 16:36:42 -0800
X-Gmail-Original-Message-ID: <CACL_3VEWhSyQt+uz5HyntJ_haYadNMHuCMQCiRY8FW-ntBoLAQ@mail.gmail.com>
Message-ID: <CACL_3VEWhSyQt+uz5HyntJ_haYadNMHuCMQCiRY8FW-ntBoLAQ@mail.gmail.com>
Subject: Comments on draft-hinden-6man-hbh-processing-00
To: Bob Hinden <bob.hinden@gmail.com>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>
Cc: 6man <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000086000505bd7454f7"
X-Pobox-Relay-ID: 617BF78E-845D-11EB-9530-E43E2BB96649-06080547!pb-smtp20.pobox.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/aXsOB227q0zhZM-uCD1Hnp1bBHM>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Mar 2021 00:37:03 -0000
Greetings authors and 6man, Following IETF 110, I read the draft and reviewed both the slides and the mailing list traffic in the first half of December 2020, and I am afraid that I must echo the following comments made by Tom Herbert on Fri, 04 December 2020 01:43 UTC: *I understand the motivation for this draft, but I don't believe that forcibly and retroactively restricting a feature in a well deployed protocol is the right approach to fix the problem.* It seems to me that the draft has chosen the most disruptive possible way to restrict the number of options in the HbH header. It seems to me that the objective could be accomplished in a much less disruptive fashion in either of the following ways: (a) specify that nodes that process the HbH options header MAY ignore all options after the first; (b) specify that nodes that process the HbH options header MAY ignore all options after the first non-PAD option Alternative (a) is somewhat simpler, but would require re-specifying any option that requires padding in front if it stands alone inside the HbH header, As best I am able to determine from a review of the existing HbH option specifications, IOAM is the only one that is so affected. Alternative (b) would avoid even that, but it would also require a bit more work from a compliant node. Either one of these alternatives keeps the specification the same EXCEPT for relaxing the minimum a node is required to meet. Nodes that can process more options would be allowed to to do. That avoids disruption of systems that are already deployed and could be useful in limited domains. I do not see what is gained by requiring nodes to enforce a one-option limit. I note in passing that the proposal to extend RFC 8504 (IPv6 Node Requirements) to apply to intermediate systems would have the same general effect, but would put the simplicity vs capability tradeoff at a different point. Mike Heard
- Comments on draft-hinden-6man-hbh-processing-00 C. M. Heard
- Re: Comments on draft-hinden-6man-hbh-processing-… Tom Herbert
- Re: Comments on draft-hinden-6man-hbh-processing-… Bob Hinden
- Re: Comments on draft-hinden-6man-hbh-processing-… C. M. Heard
- Re: Comments on draft-hinden-6man-hbh-processing-… Tom Herbert
- Re: Comments on draft-hinden-6man-hbh-processing-… Bob Hinden
- Re: Comments on draft-hinden-6man-hbh-processing-… Greg Mirsky
- Re: Comments on draft-hinden-6man-hbh-processing-… otroan