Re: We don't seem to be following our processes (Re: Network Programming - Penultimate Segment Popping)

Fernando Gont <fgont@si6networks.com> Fri, 06 December 2019 23:28 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D1D812011F for <ipv6@ietfa.amsl.com>; Fri, 6 Dec 2019 15:28:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0lAQ2Q0zpzPu for <ipv6@ietfa.amsl.com>; Fri, 6 Dec 2019 15:28:08 -0800 (PST)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83B3F12013A for <ipv6@ietf.org>; Fri, 6 Dec 2019 15:28:08 -0800 (PST)
Received: from [192.168.4.77] (unknown [190.179.35.56]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id E88CD85219; Sat, 7 Dec 2019 00:28:05 +0100 (CET)
Subject: Re: We don't seem to be following our processes (Re: Network Programming - Penultimate Segment Popping)
To: Brian E Carpenter <brian.e.carpenter@gmail.com>, ipv6@ietf.org
References: <BN7PR05MB56998A05469327E759B5B671AE5D0@BN7PR05MB5699.namprd05.prod.outlook.com> <3AD3BD11-8C34-41FE-B88F-49A9F2561D78@cisco.com> <BN7PR05MB569946D6AA5C6B78AFC05F6BAE5C0@BN7PR05MB5699.namprd05.prod.outlook.com> <8DEDE597-B7B0-48F5-959E-69757315C2AC@employees.org> <BN7PR05MB56996FFC117F512EEA04AFC8AE5C0@BN7PR05MB5699.namprd05.prod.outlook.com> <4FAB68A3-C533-471D-94D0-3F6EB1F32FC1@employees.org> <1e36a492-5931-02de-cf85-63339522b13a@si6networks.com> <F6DD2C7C-DBBF-4B48-B890-3C86005FB9CF@employees.org> <bb3be82d-8ea7-6c29-ad0a-61b491ee997d@si6networks.com> <8A9BC46E-A018-41C0-BE47-4BABC30EFE79@employees.org> <20191205222740.GA9637@ernw.de> <C7BCB0CF-1CA3-4CA8-9E71-13A013955938@employees.org> <430da027-07a7-42f9-60d0-bbb3f3306222@joelhalpern.com> <7c8494a7-9d3c-bd0e-953e-b6dfbb5c5512@gmail.com> <1e721684-0962-4e75-06dc-242cbae74378@si6networks.com> <17b7768e-0a48-61a2-f05a-f6c49ee5f0ff@gmail.com>
From: Fernando Gont <fgont@si6networks.com>
Autocrypt: addr=fgont@si6networks.com; prefer-encrypt=mutual; keydata= mQINBE5so2gBEACzBQBLUy8nzgAzSZn6ViXT6TmZBFNYNqTpPRvTVtUqF6+tkI+IEd9N2E8p pXUXCd0W4dkxz6o7pagnK63m4QSueggvp881RVVHOF8oTSHOdnGxLfLeLNJFKE1FOutU3vod GK/wG/Fwzkv9MebdXpMlLV8nnJuAt66XGl/lU1JrNfrKO4SoYQi4TsB/waUQcygh7OR/PEO0 EttiU8kZUbZNv58WH+PAj/rdZCrgUSiGXiWUQQKShqKnJxLuAcTcg5YRwL8se/V6ciW0QR9i /sr52gSmLLbW5N3hAoO+nv1V/9SjJAUvzXu43k8sua/XlCXkqU7uLj41CRR72JeUZ4DQsYfP LfNPC98ZGTVxbWbFtLXxpzzDDT8i3uo7w1LJ2Ij/d5ezcARqw01HGljWWxnidUrjbTpxkJ9X EllcsH94mer728j/HKzC9OcTuz6WUBP3Crgl6Q47gY5ZIiF0lsmd9/wxbaq5NiJ+lGuBRZrD v0dQx9KmyI0/pH2AF8cW897/6ypvcyD/1/11CJcN+uAGIrklwJlVpRSbKbFtGC6In592lhu7 wnK8cgyP5cTU+vva9+g6P1wehi4bylXdlKc6mMphbtSA+T3WBNP557+mh3L62l4pGaEGidcZ DLYT2Ud18eAJmxU3HnM8P3iZZgeoK7oqgb53/eg96vkONXNIOwARAQABtCVGZXJuYW5kbyBH b250IDxmZ29udEBzaTZuZXR3b3Jrcy5jb20+iQJBBBMBAgArAhsjBQkSzAMABgsJCAcDAgYV CAIJCgsEFgIDAQIeAQIXgAUCTmylpQIZAQAKCRCuJQ1VHU50kv7wD/9fuNtTfxSLk3B3Hs3p ixTy8YXVjdkVwWlnJjFd7BOWmg7sI+LDhpjGfT6+ddOiwkumnvUZpObodj4ysH0i8c7P4C5t F9yu7WjklSlrB5Rth2CGChg5bKt541z2WHkFFxys9qBLmCSYDeKQkzLqhCjIUJizY2kOJ2GI MnSFDzJjhSFEh//oW830Y8fel1xnf/NVF+lBVtRMtMOfoWUqDjvP3sJ1G4zgkDCnF0CfncLx +hq2Mv26Uq9OTzvLH9aSQQ/f067BOkKAJKsfHdborX4E96ISTz57/4xECRSMr5dVsKVm4Y// uVIsb+L5z+a32FaiBZIAKDgnJO7Z8j6CV5e5yfuBTtX52Yi9HjYYqnYJGSDxYd6igD4bWu+7 xmJPHjkdqZgGV6dQIgiUfqkU+s5Cv350vK48CMaT/ZLo2BdsMhWsmaHmb+waePUMyq6E4E9x 9Js+EJb9ZiCfxS9exgieZQpet1L36IvhiwByvkQM009ywfa30JeMOltUtfLi5V06WQWsTzPL 5C+4cpkguSuAJVDTctjCA0moIeVDOpJ8WH9voQ4IeWapQnX35OIoj1jGJqqYdx65gc1ygbyx b8vw+pJ9E5GLse5TQnYifOWpXzX9053dtbwp/2OVhU4KLlzfCPCEsoTyfu9nIZxdI2PMwiL5 M85BfjX4NmwBLmPGoLkCDQRObKNoARAAqqXCkr250BchRDmi+05F5UQFgylUh10XTAJxBeaQ UNtdxZiZRm6jgomSrqeYtricM9t9K0qb4X2ZXmAMW8o8AYW3RrQHTjcBwMnAKzUIEXXWaLfG cid/ygmvWzIHgMDQKP+MUq1AGQrnvt/MRLvZLyczAV1RTXS58qNaxtaSpc3K/yrDozh/a4pu WcUsVvIkzyx43sqcwamDSBb6U8JFoZizuLXiARLLASgyHrrCedNIZdWSx0z0iHEpZIelA2ih AGLiSMtmtikVEyrJICgO81DkKNCbBbPg+7fi23V6M24+3syHk3IdQibTtBMxinIPyLFF0byJ aGm0fmjefhnmVJyCIl/FDkCHprVhTme57G2/WdoGnUvnT7mcwDRb8XY5nNRkOJsqqLPemKjz kx8mXdQbunXtX9bKyVgd1gIl+LLsxbdzRCch773UBVoortPdK3kMyLtZ4uMeDX3comjx+6VL bztUdJ1Zc9/njwVG8fgmQ+0Kj5+bzQfUY+MmX0HTXIx3B4R1I1a8QoOwi1N+iZNdewV5Zfq+ 29NlQLnVPjCRCKbaz9k6RJ2oIti55YUI6zSsL3lmlOXsRbXN5bRswFczkNSCJxJMlDiyAUIC WOay7ymzvgzPa+BY/mYn94vRaurDQ4/ljOfj6oqgfjts+dJev4Jj89vp8MQI3KJpZPEAEQEA AYkCJQQYAQIADwUCTmyjaAIbDAUJEswDAAAKCRCuJQ1VHU50km4xEACho45PZrUjY4Zl2opR DFNo5a6roTOPpgwO9PcBb3I5F8yX2Dnew+9OhgWXbBhAFq4DCx+9Gjs43Bn60qbZTDbLGJ/m 8N4PwEiq0e5MKceYcbetEdEUWhm5L6psU9ZZ82GR3UGxPXYe+oifEoJjOXQ39avf9S8p3yKP Diil0E79rn7LbJjMcgMLyjFg9SDoJ6pHLtniJoDhEAaSSgeV7Y745+gyMIdtQmrFHfqrFdjq D6G0HE+Z68ywc5KN67YxhvhBmSycs1ZSKAXv1zLDlXdmjHDHkU3xMcB+RkuiTba8yRFYwb/n j62CC4NhFTuIKOc4ta3dJsyXTGh/hO9UjWUnmAGfd0fnzTBZF8Qlnw/8ftx5lt4/O+eqY1EN RITScnPzXE/wMOlTtdkddQ+QN6xt6jyR2XtAIi7aAFHypIqA3lLI9hF9x+lj4UQ2yA9LqpoX 6URpPOd13JhAyDe47cwsP1u9Y+OBvQTVLSvw7Liu2b4KjqL4lx++VdBi7dXsjJ6kjIRjI6Lb WVpxe8LumMCuVDepTafBZ49gr7Fgc4F9ZSCo6ChgQNLn6WDzIkqFX+42KuHz90AHWhuW+KZR 1aJylERWeTcMCGUSBptd48KniWmD6kPKpzwoMkJtEXTuO2lVuborxzwuqOTNuYg9lWDl7zKt wPI9brGzquUHy4qRrA==
Message-ID: <472003e4-327f-be45-8567-9e20a22f30f9@si6networks.com>
Date: Fri, 06 Dec 2019 20:27:37 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.1
MIME-Version: 1.0
In-Reply-To: <17b7768e-0a48-61a2-f05a-f6c49ee5f0ff@gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/i-92x2ILFsGHelXDuqv6ftmzVkw>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Dec 2019 23:28:13 -0000

Hi, Brian,

On 6/12/19 19:57, Brian E Carpenter wrote:
> On 07-Dec-19 10:22, Fernando Gont wrote:
>> On 6/12/19 17:55, Brian E Carpenter wrote:
>>> Joel,
>>>
[....]
>>
>>
>>
>>>> While there are standards that are designed for specific deployments, 
>>>> they do not to date use that as an excuse to violate existing RFCs.
>>>
>>> I'm not sure that statement is literally 100% correct, because some instances
>>> may well have passed unnoticed or without controversy. SRH insertion
>>> has not tried to pass unnoticed, and has become controversial.
>>
>> My own impression is that it did try to pass unnoticed. 
> 
> draft-voyer-6man-extension-header-insertion-00, a document that I strongly
> criticised, came out March 28, 2017 and its first sentence read "The network
> operator and vendor community has clearly indicated that IPv6 header insertion
> is useful and required." I *really* think that your impression is wrong. This
> has been public for almost 3 years now.

Sorry, what I meant was that "it did try to pass its violation of
RFC8200 unnoticed" -- hence e.g. my comment that even the latest version
does not reference RFC8200.




>> Even the latest
>> rev of the EH insertion draft doesn't even have a reference to RFC8200.
> 
> Well, the current document editor already said that will be fixed.

I would imagine that would be the first thing I would have included in
version -00 of the document, as opposed to try to pretend there are
reasons for which RFC8200 is not really being violated (which seems to
have been the strategy here).



>>>> Hence, as far as I can tell, the assertion that SRv6 is for limited 
>>>> domains does not justify or excuse violating RFC 8200.  And "I want to 
>>>> save some bytes", while very nice, is not a sufficient reason to violate 
>>>> an approved RFC, must less a Full Standard.
>>>
>>> On the other hand, running code in a variety of real and deployed
>>> products is something that we have a long tradition of documenting forEven the latest rev of the        
>>> informational purposes. RFC1094 or RFC3954 for example.
>>
>> Major difference: None of the two protocols you've reference do an
>> outright violation of an IETF standard --- even less an Internet Standard.
> 
> That wasn't my point. (If you want an example that does violate an IS, try RFC1631.)
> 
> My point is that we have often document reality.

I'd have a few comments here:

1) I'm in a way amused that some folks (not you) are more keen to
violate or post a spec that clearly violates a specification, even
without a proper justification, that things' like measurements (RFC7872,
which only got published after dodging way too many bullets), or even
draft-gont-v6ops-ipv6-ehs-packet-drops (probably a good example of
reality being neglected at the IETF). The only explanation that I have
is that in some cases, there's a bit of NIH (Not Invented Here)
syndrome, and/or that there are vendors with big pockets and more power
involved than some of us mere individual participants.

2) The example you reference (RFC1631) is of course a good one. NATs
have been, at the very least, an unavoidable reality. And there's no
nice way to do NAT44. It is what it is. Now, it has been mentioned a few
times here and other lists that the right way to avoid EH-insertion is
encapsulation. I believe that the proponents of EH-insertion could have
tried to take advantage of such advice, and try to build consensus in
that direction. If they explicitly decided to violate the existing
specs, and dismiss the input that was provided by this group, what would
be the point of rubber-stamping their "EH insertion thing" -- "we are a
big vendor, and have the power to publish our spec whether there's
consensus or not?"  -- the fact that they have running code doesn't
obviate the "rough consensus" requirement.

3) Besides the technical arguments against EH insertion (which have been
codified in draft-smith-6man-in-flight-eh-insertion-harmful, I have
asked *lots* of times what's the technical motivation for doing EH
insertion. It boils down to "to save 40 bytes", which doesn't seem to me
as a compelling argument to violate the spec -- even less in a design
that employs 128-bit waypoints and is claimed to be operated in a
limited domain.

-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492