Re: I-D Action: draft-voyer-6man-extension-header-insertion-07.txt

Tom Herbert <tom@herbertland.com> Mon, 21 October 2019 14:04 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E36071200C4 for <ipv6@ietfa.amsl.com>; Mon, 21 Oct 2019 07:04:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gA4Rq7qEsuQS for <ipv6@ietfa.amsl.com>; Mon, 21 Oct 2019 07:04:12 -0700 (PDT)
Received: from mail-ed1-x52a.google.com (mail-ed1-x52a.google.com [IPv6:2a00:1450:4864:20::52a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7BE4A1200A3 for <ipv6@ietf.org>; Mon, 21 Oct 2019 07:04:12 -0700 (PDT)
Received: by mail-ed1-x52a.google.com with SMTP id p59so1690288edp.7 for <ipv6@ietf.org>; Mon, 21 Oct 2019 07:04:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=742GjL1OHkCQngHKlHfIy50Q3iUD7OOEagr6pgIvZLI=; b=VH2jdrDBDnEN/iqJy4/A6Utl6p6J74WGGt5iSIjyuiFKM/u7lG09D8501xamqO9HOK xuaSo3JLIo5V2u2M51BBmGK7PSDFqj10oAMgBqi3gOy4e0mm8UtwtmmpD2y9orNNBpsO PgX86kHRz8gaoVouaQH0xKMKGbyL4SfK9xauwXQT8Vg3tVFsj1W7H51T9Wv/ioCSDOWV 3bSP2kQU9uH1ML+CVMdXG7jyZQugOatLTwozed5iJRUeADghmazu2B3bGGLawIuTgGc7 Itu/w1LBZiM+D74+4QX4q0P81Tl3s0gsUlLEiZ0gafuUFJpIeYIb6m744ogUH2BpCo4F vPcQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=742GjL1OHkCQngHKlHfIy50Q3iUD7OOEagr6pgIvZLI=; b=VTNBpMUvR7wdjDR0wAjBUrONfgVghyLVTZ9GwIS30e++Oe/VjyFN+rOVEyMDtx6J77 5MRycsqkJyMMQ6pg9sDTu12jWWDe2IcqykHbuTJbQmbflNW3r+9qkBH9mAg5iFLKFf2p VI4xfq3ruD88U94l1g2RnqFZAFQuZciq/TEjGN1fkW1TAshdZwkruGtj9hxcxWddxBWA NpQ5qAsTSPfwdKjzj1VNLX8sACdR04q8kpHeDqZstMSjDJvY0qG0NzB3MGCMY6TpyfOx ZI12vymEyhvO4tdTC1mT7dkofnANtXIdwM5M/fqFTKGitkgubjIkCtFrLGBKBRJ2C9xx mb3g==
X-Gm-Message-State: APjAAAUBYu7Ri85dNDDE01/zhf13GATN/3FpJy1NdrbnmPYUjr7SaZu6 KkIKqQlL3yUBD8Jx2dzldP8YunEjHz1HtMX5fmtz3g==
X-Google-Smtp-Source: APXvYqx8eCcZtmpSE7zpqO3BLCE2enwYhycuo9/be6U4ZwO4F+KPr5wYiIOzUaVIYU8CGFpt1B6J8DbbWZiSGyHxuJI=
X-Received: by 2002:a17:906:d971:: with SMTP id rp17mr22598479ejb.42.1571666650845; Mon, 21 Oct 2019 07:04:10 -0700 (PDT)
MIME-Version: 1.0
References: <156903961333.5092.16807379687598480151@ietfa.amsl.com> <c9702ec2-61d9-66e4-1d2c-d462eaf00f21@gmail.com> <9d3652bd-4659-809c-c5fe-03496042bc95@si6networks.com> <94378713-fc8a-82eb-fdc8-6658a1b980ca@gmail.com> <CALx6S34kA-i2Nmn6JzyicwNyLBJo-CYEo2H_9eWn2sqUAEmQJA@mail.gmail.com> <e7f23c2d-d27f-75cb-2135-f60b256fa8da@gmail.com> <CALx6S34538CNnw50KnmFaoQRLuRBMut2gFgueeASZR1DuYSVUg@mail.gmail.com> <00db812c-29d1-87e0-35ee-a15abface80a@gmail.com>
In-Reply-To: <00db812c-29d1-87e0-35ee-a15abface80a@gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Mon, 21 Oct 2019 07:03:58 -0700
Message-ID: <CALx6S36209ZsprE2+3nbGqua6Lv=CO+S7YXorbnSrPNwKP-DHA@mail.gmail.com>
Subject: Re: I-D Action: draft-voyer-6man-extension-header-insertion-07.txt
To: Alexandre Petrescu <alexandre.petrescu@gmail.com>
Cc: 6man <ipv6@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006de93705956c28b5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/c8CvIeIm_wZlKqYU8-LmGaf7Sno>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Oct 2019 14:04:16 -0000

On Mon, Oct 21, 2019, 1:34 AM Alexandre Petrescu <
alexandre.petrescu@gmail.com> wrote:

>
>
> Le 18/10/2019 à 16:56, Tom Herbert a écrit :
> > On Fri, Oct 18, 2019 at 2:23 AM Alexandre Petrescu
> > <alexandre.petrescu@gmail.com> wrote:
> >>
> >>
> >>
> >> Le 17/10/2019 à 18:19, Tom Herbert a écrit :
> >>>
> >>>
> >>> On Thu, Oct 17, 2019, 6:20 AM Alexandre Petrescu
> >>> <alexandre.petrescu@gmail.com <mailto:alexandre.petrescu@gmail.com>>
> wrote:
> >>>
> >>>
> >>>
> >>>      Le 15/10/2019 à 00:12, Fernando Gont a écrit :
> >>>       > On 12/10/19 16:57, Brian E Carpenter wrote:
> >>>       >> Hi,
> >>>       >>
> >>>       >> I'd like to comment on this version. It is in fact a complete
> >>>       >> rewrite compared to its predecessors and I thank the authors
> for
> >>>       >> that. The tone is now purely technical, and that's a great
> >>>       >> improvement.
> >>>       >
> >>>       > It is somewhat frustrating that the draft still fails to argue
> why
> >>>       > EH insertion instead of encapsulation.
> >>>
> >>>      As usual, I think one of the reasons is a difficulty in
> qualifying what
> >>>      it means 'encapsulation'.
> >>>
> >>>      There is IP-in-IP encapsulation.
> >>>
> >>>      But there is also encapsulation like in transporting, or
> carrying, by
> >>>      means of other intermediary headers, layer2, MPLS, security
> headers and
> >>>      future internet shims and GRE and routing headers.
> >>>
> >>>      IP-in-IP encapsulation is clearly an alternative to EH insertion.
> >>>
> >>>      But all the other encapsulations are so messy that one may
> legitimately
> >>>      think that a new EH insert/delete standardized according to good
> WG
> >>>      principles would be proper, universal, and solve all  problems of
> GRE
> >>>      for example.
> >>>
> >>>
> >>> Alex,
> >>>
> >>> What are the problems of GRE to which you referring?
> >>
> >> Tom,
> >>
> >> If I remember correctly, on the negative side, GRE does not work with
> >> IPsec security, GRE has no IPv6-GRE-IPv6 deployment, GRE is for
> >> limited-domains and does not work across the Internet contrary to VPN.
> >>
> > Alex,
> >
> > I guess maybe you're only considering GRE/Ethernet, but for GRE/IP I
> > don't believe any of these negatives are valid. In fact, an IPv6
> > packet that contains next header 47, a 4 byte GRE header with first 16
> > bits set to zero and Protocol type set to 0x86dd, followed by an IPv6
> > packet-- is functionally equivalent to ip6ip6 encapsulation. Also, if
> > you want to increase the probability of successful traversal through
> > the Internet then GRE/UDP can be used (RFC8086).
>
> One may wonder whether IP/GRE/Ethernet, or GRE/UDP/IP, represents
> encapsulation that avoids the necessity of EH insertion, or does not
> represent such.
>
> >> On the positive side, thanks to its key field, only with GRE it is
> >> possible to link together several tunnels such as to increase available
> >> bandwidth by aggregating, whereas with IP-in-IP it is not possible.
> >>
> > Yes an advantage of GRE over just ipip encapsulation is that it's
> > extensible, albeit limited in its extensibility which is why we
> > developed GUE.
>
> I meant an advantage more issued from implementation, not from
> specification.
>
> The implementation of ip-in-ip tunnelling in linux is with virtual
> interfaces.  These interfaces have only two parameters: local and remote
> address.  The GRE implementation uses a  key behind the scenes, in
> addition to these same two parameters.  That key is what helps a
> bandwidth augmenting implementation to keep up  two tunnels at the same
> time (same 'remote' addresses, but different 'local' addresses), to
> distinguish between them, and to distribute IP packets between the two
> (round-robin is one such fashion).  The ip-in-ip tunnel implementations
> do not allow such distribution, because when you put the same 'remote'
> address on two ip-in-ip interfaces it will use just one such interface.
>
> In such a context, one could imagine using EH insertion with IP-in-IP
> tunnelling: insert a key (in an EH) dynamically, by the endpoints.  This
> could help IP-in-IP classic tunnelling to act like GRE tunnelling, with
> respect to the apps that need to maintain two tunnels at the same time.
>

Alex,

You're conflating protocol specification with protocol implementation. It's
much better to change the implementation to leverage the protocols, rather
than to change the protocols to suit the implementation.

Tom


> Alex
>
> >
> > Tom
> >
> >> Alex
> >>
> >>>
> >>> Tom
> >>>
> >>>
> >>>      Alex
> >>>
> >>>       >
> >>>       >
> >>>
> >>>
> --------------------------------------------------------------------
> >>>      IETF IPv6 working group mailing list
> >>>      ipv6@ietf.org <mailto:ipv6@ietf.org>
> >>>      Administrative Requests:
> https://www.ietf.org/mailman/listinfo/ipv6
> >>>
> --------------------------------------------------------------------
> >>>
>