Re: End-to-end (was Re: Non-Last Small IPv6 Fragments)

Brian E Carpenter <brian.e.carpenter@gmail.com> Wed, 16 January 2019 19:25 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 43AB6130EDB for <ipv6@ietfa.amsl.com>; Wed, 16 Jan 2019 11:25:03 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id icphSeCJjfUG for <ipv6@ietfa.amsl.com>; Wed, 16 Jan 2019 11:25:00 -0800 (PST)
Received: from mail-pg1-x532.google.com (mail-pg1-x532.google.com [IPv6:2607:f8b0:4864:20::532]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B9592130EEF for <ipv6@ietf.org>; Wed, 16 Jan 2019 11:25:00 -0800 (PST)
Received: by mail-pg1-x532.google.com with SMTP id v28so3240345pgk.10 for <ipv6@ietf.org>; Wed, 16 Jan 2019 11:25:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=2N9m6qTBzDawOIsg/EOKEW4ZS/HO7f7znLI6hP3b5rw=; b=Hq/8aMO3DFo5gmxC/Dr8pfa7k/nllBfbevXOmtWsh0eNDCxssig5zdr/Vhb+RzIz8U jOMYDCoAAgPKh0lfQ/SYkYMz0RMR8Z5vCgrqTofQ+fH9ZCe1i2nJbL5qDzL9HWOx5OMs umMMpH8hvqNKNalSM/vePBd8P3JLaec2QXvPcqApMtrFk5yzswzuRhqMA8MuGW8Hogke SAjdocS8+FXudiwioie4VYBUDhu1X10egzbwhRbCneomNAbndBL10Pp2CIJihp0NI8vC ocygEY0ZEjKmPO6XX1s8WtX3o/gCVeRPdenOvp3vo8YCmE2h/66lug/oscpreF5Yrwdc 8qCg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=2N9m6qTBzDawOIsg/EOKEW4ZS/HO7f7znLI6hP3b5rw=; b=EZK85A7udyEW4EfD7qXFGYbfvN4DyBWnivnYrLYv2i/6IovhFlmfe4npFGPO3cfGVQ 7tlDs3nx8ppjAZUtnKeeRsBvbBoF0zIWKkhMG+wMDhZEY5+60MKAkTZahKDMQinH7KI1 AMNQQ2sHDcN/rALXUXejW7RM3czwJg5lyYcSPOXNTqsguxdoL0anQ7JB5oREEeMhcMrC R24gDwE8W5fnkpuHxjj2ZsCL7P+UFKV1K7fRbJhtvJXM+Wr0Y0CazBgkdCSRASseDwoH AAzdcjVrq5kBbHFg/Bla2q8paBK/hucka0ERuPapFQwWdrKLiA74SIiRe7DQ8KQpXOsG MVXg==
X-Gm-Message-State: AJcUukffRcJyckBzqg+qKaJKV0pGHbb7a542KEhQdYFM7ffmAbLH2adW icL403q8cz6HyTbWCcEJiil854In
X-Google-Smtp-Source: ALg8bN4tk+LeRVMen5IFn/49ldMg4Ml+drHnZeeWllOHrSTmGunxyegvFUtDGthwvKrxfw1NUruKhQ==
X-Received: by 2002:a63:9d05:: with SMTP id i5mr9660318pgd.98.1547666699167; Wed, 16 Jan 2019 11:24:59 -0800 (PST)
Received: from [192.168.178.30] ([118.148.79.176]) by smtp.gmail.com with ESMTPSA id z62sm10730550pfl.33.2019.01.16.11.24.55 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 16 Jan 2019 11:24:57 -0800 (PST)
Subject: Re: End-to-end (was Re: Non-Last Small IPv6 Fragments)
To: Tom Herbert <tom@herbertland.com>, Fernando Gont <fgont@si6networks.com>
Cc: "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net>, Christian Huitema <huitema@huitema.net>, IPv6 List <ipv6@ietf.org>
References: <CAOSSMjV0Vazum5OKztWhAhJrjLjXc5w5YGxdzHgbzi7YVSk7rg@mail.gmail.com> <78a8a0e0-8808-364c-41f7-f81f90362432@gont.com.ar> <CALx6S37YnSbOUgVoWEA46aN88a3CfERWemhQKi_GOrP_g+=rFQ@mail.gmail.com> <308d9dff-87c4-cc63-6792-fcbfce722d1e@gont.com.ar> <CALx6S34kseXuKrrbB44=wz7OQBysUmbJh++N79Da9Kx1rseAUw@mail.gmail.com> <3f87c4ec-636a-790e-0a6a-0a6b4c2f3a35@foobar.org> <046F449C-E19E-4891-968E-975A03162364@lists.zabbadoz.net> <e7a1d5d2-7d7d-00fd-a178-fc2c7f25a167@foobar.org> <251b73fd-d08b-018c-4a24-c524dafbe25b@gmail.com> <e8786213-b1ac-0a8d-093d-579ce84dc126@foobar.org> <9b0c0ead-752f-fa8a-56b5-1a400ba16d22@huitema.net> <CALx6S35H0QYo6cs+7c0gFoysxhL7fmQSNW=BOrya_A4AY6H3JA@mail.gmail.com> <2db935ba-36e1-93b8-08d5-4a0c1e902d71@si6networks.com> <CALx6S34C4UuQWK2fzdkZ7F0ZaEgmaLWzH582PVpEx-XN6FywNA@mail.gmail.com> <028f01e0-8639-ded4-049b-54a976877bf3@si6networks.com> <CALx6S35Csx6cS3Bi7QzUz5FH8dRq1V7tP0yAhgPs-yY19eVFAA@mail.gmail.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <cfed34c9-4c0e-f1df-feee-f0546aac98c5@gmail.com>
Date: Thu, 17 Jan 2019 08:24:51 +1300
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0
MIME-Version: 1.0
In-Reply-To: <CALx6S35Csx6cS3Bi7QzUz5FH8dRq1V7tP0yAhgPs-yY19eVFAA@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/gN6xbi9L2Q1Hxt2GaMlRlvN4Gcw>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Jan 2019 19:25:03 -0000

Hi,

A small comment at the end...

On 2019-01-17 06:28, Tom Herbert wrote:
> On Wed, Jan 16, 2019 at 8:36 AM Fernando Gont <fgont@si6networks.com> wrote:
>>
>> On 16/1/19 12:41, Tom Herbert wrote:
>>> On Tue, Jan 15, 2019 at 11:52 PM Fernando Gont <fgont@si6networks.com> wrote:
>>>>
>>>> On 15/1/19 19:42, Tom Herbert wrote:
>>>> [....]
>>>>> packets. This uses a modifiable HBH options and is completely
>>>>> idependent of the transport layer.
>>>>
>>>> You cannot use HBH in the public Internet. Well, you can... but there
>>>> high chances your packets will be dropped.
>>>>
>>> Fernando,
>>>
>>> By that same thinking we can't use any extension headers at all,
>>
>> Indeed.
>>
>>
>>
>>> any
>>> transport protocol other then TCP (and maybe UDP), ICMP, the TCP
>>> authentication option, TCP fast open, UDP options, or even IPv6 on the
>>> Internet.
>>
>> I assume that such options focus on specific scenarios (e.g. TCP-AO for
>> BGP), or they have fall-back options (e.g. traditional open for TCP-FO).
>> Otherwise they are doomed to fail.
>>
>>
>>
>>> As for HBH, RFC8200 relaxed the requirement that intermediate nodes
>>> need to process them. If a node just wants to get to the transport
>>> layer it can skip over the EH very with a few simple operations. I see
>>> no excuse for new devices being deployed to systematically drop HBH or
>>> destination options EHs. If they are  doing that then their
>>> implementation does not comply with the IPv6 standard and we shouldn't
>>> have any compunction about publically calling them out on that.
>>
>> See https://tools.ietf.org/html/draft-gont-v6ops-ipv6-ehs-packet-drops
>>
>> The folks running the networks have work to do. And will certainly not
>> pay extra money for functionality that somehow is currently not
>> required. Vendors will not invest extra to sell devices at the same price.
>>
> I'm not sure what you mean by "functionality that somehow is currently
> not required.". Who determines what is required?
> 
>> We can call them out. Vendors for selling boxes that perform very badly
>> for packets that contain EHs, and operators for "looking into packets in
>> the middle of the network, breaking the sacred e2e principle (or some
>> interpretation of it)".
>>
>> Then I guess *we* will be called out to pretend doing engineering, while
>> doing stuff that doesn't work in practice.
>>
> There is engineering happening. The requirement that every node needs
> to process HBH options where there could be hundreds of options in a
> single packet was, in retrospect, completely impractical to expect to
> be supported. So, RFC8200 relaxed the nodes must process requirement,
> and we can define some reasonable limits as to how many options can be
> processed. These are examples of updating standards that make
> engineering feasible.
> 
>> We burying our heads into sand doesn't help the situation, either...
>>
> 
> Agreed. If someone were to *prove* conclusively that it is impossible
> to support even the minimum requirement that allows device to skip
> over HBH options, then I would agree that it may make sense to give up
> and deprecate them. But until we have that proof in hand, the problem
> is real and needs to be dealt with.

My conclusion about what we should do is a bit different, and is
expressed in draft-carpenter-limited-domains (preferred list for
discussion is int-area@ietf.org).

   Brian

    Brian