Re: I-D Action: draft-voyer-6man-extension-header-insertion-07.txt

Gyan Mishra <hayabusagsm@gmail.com> Fri, 18 October 2019 03:58 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8D7712080A for <ipv6@ietfa.amsl.com>; Thu, 17 Oct 2019 20:58:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xEYjvPxDDo6M for <ipv6@ietfa.amsl.com>; Thu, 17 Oct 2019 20:58:48 -0700 (PDT)
Received: from mail-qt1-x82d.google.com (mail-qt1-x82d.google.com [IPv6:2607:f8b0:4864:20::82d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 777DA1207FC for <ipv6@ietf.org>; Thu, 17 Oct 2019 20:58:48 -0700 (PDT)
Received: by mail-qt1-x82d.google.com with SMTP id r5so7229371qtd.0 for <ipv6@ietf.org>; Thu, 17 Oct 2019 20:58:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:mime-version:subject:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=dJpsg2N41xYeQAhoNUT1uif8hMJXHoezFImTWqp1PsA=; b=idEy0ekmpf5wfeDEgIdXtli10xTklBi85Swk7GftZEDp++Ex1cbjrjPZV8lTS9xeID o8+3XzMxBzHeau5fTu6ZElFByIdPHOXYtRwI7w7KljFvgS9gAdOeBhoblsb9MioQdV+5 Lf7js5I/Xj4lO2UcxSQLZzWj62X3DAPGpZE0c3bf7iu0v3QnVHmPiHgO8P+oKAXXn66f KCVbFZxLR5a2Q8DhR20/fxYHy3Ic/jWwxybc+7WJsoESuPkG2FDiKMzqrNSbXWsLD/RE w2YtRVoiP9OS5RvewU8uXt/v7JVXwfusTfFjR2hWCqvLerhoQ6Qb3o08nlO1sWCx+xyz HRhQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=dJpsg2N41xYeQAhoNUT1uif8hMJXHoezFImTWqp1PsA=; b=Zkmlvm/dKlwxhbi5cBKzTToSSHJ56eCKRsRq95BIinKWJTnpWcQbTEltH9rUgsMZiB gDGWoJu/7Uicy4xREBdOA9ohirq3TuiFI0kALTLF7+bGcbxmEIurGZU21LxbN6vCu9NB BssDp+zpBylvk3rTT9wTXmOTVzUv6tQABoO+vpS9AY127JP19eFRd7U+2SDcGQhd+r/3 ApK8GkMuXDH+2euJ1e+b51V5KLMtWuHmNbbHAN7kMn4JwzuBTLGBl2cSlo7oEwyCzXn8 BUqeFXbD2eDyEZqr1WIM+Kp0+QQoE7KPmhh7BFZeqxCWEPPW2syM3dIzGunUATQXc9AM Lbsw==
X-Gm-Message-State: APjAAAUfIOCIEcgIgvwV/12X6EUBNfNcw3oV5zP7cis2R6ZcvTljOV0/ f8eUZcMbWEAIigTvA36ptXHrfQG6OEQ=
X-Google-Smtp-Source: APXvYqxby+E9V01JdW+7EZoFIAoxyJhE9bxgrEmhLKxj96tZtDvYdqqlOG9hBfY9l6g0nH2FbHtbyQ==
X-Received: by 2002:a0c:c392:: with SMTP id o18mr7572042qvi.75.1571371126914; Thu, 17 Oct 2019 20:58:46 -0700 (PDT)
Received: from [192.168.1.213] (pool-72-83-194-140.washdc.fios.verizon.net. [72.83.194.140]) by smtp.gmail.com with ESMTPSA id l3sm3464071qtc.33.2019.10.17.20.58.46 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 17 Oct 2019 20:58:46 -0700 (PDT)
From: Gyan Mishra <hayabusagsm@gmail.com>
X-Google-Original-From: Gyan Mishra <hayabusaGSM@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail-DA2B619A-47D3-4FB9-A0A7-CF65367DCEC2"
Mime-Version: 1.0 (1.0)
Subject: Re: I-D Action: draft-voyer-6man-extension-header-insertion-07.txt
X-Mailer: iPhone Mail (16G102)
In-Reply-To: <CALx6S34kA-i2Nmn6JzyicwNyLBJo-CYEo2H_9eWn2sqUAEmQJA@mail.gmail.com>
Date: Thu, 17 Oct 2019 23:58:45 -0400
Cc: Alexandre Petrescu <alexandre.petrescu@gmail.com>, 6man <ipv6@ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <20F729B4-1D68-451B-A758-8228825C5EE1@gmail.com>
References: <156903961333.5092.16807379687598480151@ietfa.amsl.com> <c9702ec2-61d9-66e4-1d2c-d462eaf00f21@gmail.com> <9d3652bd-4659-809c-c5fe-03496042bc95@si6networks.com> <94378713-fc8a-82eb-fdc8-6658a1b980ca@gmail.com> <CALx6S34kA-i2Nmn6JzyicwNyLBJo-CYEo2H_9eWn2sqUAEmQJA@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/dt6g0GY7sDhgg80lQJjhHZWqBLQ>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Oct 2019 03:58:52 -0000

In-line 

Sent from my iPhone

> On Oct 17, 2019, at 12:19 PM, Tom Herbert <tom@herbertland.com> wrote:
> 
> 
> 
>> On Thu, Oct 17, 2019, 6:20 AM Alexandre Petrescu <alexandre.petrescu@gmail.com> wrote:
>> 
>> 
>> Le 15/10/2019 à 00:12, Fernando Gont a écrit :
>> > On 12/10/19 16:57, Brian E Carpenter wrote:
>> >> Hi,
>> >> 
>> >> I'd like to comment on this version. It is in fact a complete
>> >> rewrite compared to its predecessors and I thank the authors for
>> >> that. The tone is now purely technical, and that's a great
>> >> improvement.
>> > 
>> > It is somewhat frustrating that the draft still fails to argue why
>> > EH insertion instead of encapsulation.
>> 
>> As usual, I think one of the reasons is a difficulty in qualifying what
>> it means 'encapsulation'.
>> 
>> There is IP-in-IP encapsulation.
>> 
>> But there is also encapsulation like in transporting, or carrying, by
>> means of other intermediary headers, layer2, MPLS, security headers and
>> future internet shims and GRE and routing headers.
>> 
>> IP-in-IP encapsulation is clearly an alternative to EH insertion.
>> 
>> But all the other encapsulations are so messy that one may legitimately
>> think that a new EH insert/delete standardized according to good WG
>> principles would be proper, universal, and solve all  problems of GRE
>> for example.
> 
> 
> Alex,
> 
> What are the problems of GRE to which you referring?
> 
> Tom
> 
> -[Gyan] Good old protocol 47.  GRE is the Swiss Army knife of every network designers toolbox that I have used countless times to solve routing issues where traditional native routing was not possible and GRE tunneling was the savior.  Hats off to GRE for being with us all these years.  The main caveat In my experience have seen with GRE is accounting for the GRE/IP 20-IP 4-GRE = 24 overhead bytes and having to adjust the MTU to accommodate bumping the MTU along the path or lowering the GRE tunnel MTU to prevent fragmentation which most vendor platforms punt to software path to the RP impacting CPU utilization.

> GRE can be very handy from a routing perspective to solve routing issues and can also be used in transition or migration strategy or to fix an issue or allow routing islands to communicate such as with transition technology tunnels. The big down side with GRE  example is using IPv6 transition technology 6to4 tunnels to provide routing reachability over between IPv6 islands over an IPv4 backbone which works for small use cases but can become unmanageable as the tunnel grow to any to any for very large use cases not practical.


> There are a number of protocol specification which adopted GRE as the transport mechanism such as Net to Net IPSEC VPN DMVPN MGRE VTI tunnel mode is handing for running a  routing protocol over the VTI.  Another good protocol specification using GRE is MVPN Rosen MT tunnel P-instance default and Data MDT PIM enabled mpls core for inclusive default MDT      I-PMSI or Selective Data MDT S-PMSI. GRE has also been used for vxlan evpn NVGRE tunnel to anycast VTEP for VNIs.  


> The main reason for using GRE encapsulation which requires termination endpoint is if you are going to run a routing instance over that tunnel.

> If not requiring a routing instance a similar analogy is IPEC VPN transport mode is used if you don’t need a routing instance and if you do then you use tunnel mode and have a VTI for the routing instance.  


> With SRv6 just as with mpls an encapsulation is what we are adding similar to IPSEC transport mode since we don’t need a routing instance there is not need to have to terminate the A and Z end and you can then add as many encapsulations as you want similar to an mpls label stack.  I think it does add complexity since you have to terminate the endpoints but also now to support Ti-LFA backup paths additional encapsulation for the new EH insertion for the SRH header routing type 4 I think it’s better to just do the 6in6 encapsulation and not add GRE 4 byte header protocol 47.  


> I read the link but I did not see where it stated you can stack GRE tunnels. 

https://tools.ietf.org/html/draft-ietf-intarea-tunnels-10
>> 
>> Alex
>> 
>> > 
>> > 
>> 
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------