[IPv6] Comments on draft-ietf-6man-enhanced-vpn-vtn-id

Ketan Talaulikar <ketant.ietf@gmail.com> Thu, 21 March 2024 17:16 UTC

Return-Path: <ketant.ietf@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24C64C14CF1C; Thu, 21 Mar 2024 10:16:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fESmIfk1VYG5; Thu, 21 Mar 2024 10:16:07 -0700 (PDT)
Received: from mail-lf1-x131.google.com (mail-lf1-x131.google.com [IPv6:2a00:1450:4864:20::131]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 34227C14CF15; Thu, 21 Mar 2024 10:16:07 -0700 (PDT)
Received: by mail-lf1-x131.google.com with SMTP id 2adb3069b0e04-513d599dbabso1563722e87.1; Thu, 21 Mar 2024 10:16:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1711041365; x=1711646165; darn=ietf.org; h=cc:to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=66SfAGC5mWNR9NT946mVlVk/3MHqXxqFwoof+jxPmho=; b=C+qEWFQKSQx9VTE6raFwtY27YN7ypS9bEIIRpE7HhoxYskgiKo00ksJH/7op11+iYJ NZW5TGzPQv0bqHbllLbkWhm53JY+PEootHwe5jycd9DCrhILxHQN8SLJvmT0TiDyk0NW 7dU8fDfufI/zgwTaJUnIH1bo+V/+4VaOkCAIBloDdNwQuKUA+gf3P3glKaM+UAt2JQEy 0zlCsRQvUPIeG6UbQ7ElGKvWSqeN67xrykvPMZkMSB3dpPfT8kj5P5dLkIePV9sEN/eN wBsWzEFsO7pVJuvGw9cfQcqTQkD/++JoXvo2C3QbQSIEvzYQwU5TN4ajqyAtKhKOSh1Q sgsA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1711041365; x=1711646165; h=cc:to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=66SfAGC5mWNR9NT946mVlVk/3MHqXxqFwoof+jxPmho=; b=kmGgmzUdttei/vXugj8yi7za6wEOUenlxctaKnjRGRfscSrp/PFPxYCixMb49pDHtH DCaSJqjEjaWGyoZSNGEESYh1R5khWhhrr2ZjPN0JQCXSz2gaAwqeYfnWXnY9BsuOumpW IM7Ff1gP9KSVgsDT7uumQV7FKZWaotZzQ/z+yZGd+neJtKhagvdhVZYu4/IEsSe9w3ru WoshIm+qvdUP4istGZzs19gigpI8KcYbqvusJKBAD0a2H9lC2EET5bI2wDHKrERkusiT 7kcc0JooxobtHq0IyJ3h5Fhyh5E/OFN0kULo1tr5D8kwlTlwwbK89D7drbdA5H2CHsaF L1jA==
X-Forwarded-Encrypted: i=1; AJvYcCW7bI40/4wYhB5IUrJRfkG561Znyul4kFOz3/qvFyOe4XaPwuHgwZLz79bi4pHwcBOZPBOouZDjokoutwGa
X-Gm-Message-State: AOJu0YzCQQ+B+ZNQMKfCMKjKY9I0lsyENbjcc1jxeTSR+S92dgpZt2ie +mKi6VZU32pX8a9mLRPlW1Bb8IwZyu1c80ShUSTxwYiU3rdB01aE1t24/0s9vqSRu+lhpF2CV02 5y0P/j7H1QLRNFbd88uMmm6M/lEJ3zKlcdtE=
X-Google-Smtp-Source: AGHT+IH9xL+iMAYYScgCAvki6RfK5Hdm9bmGu3k6h4OpfCxUPZpTkgp/tm1egQ7hou3hyqt8GFiXqNqgLhAoYglYnFI=
X-Received: by 2002:ac2:4c97:0:b0:513:e17d:cf41 with SMTP id d23-20020ac24c97000000b00513e17dcf41mr7137452lfl.21.1711041364713; Thu, 21 Mar 2024 10:16:04 -0700 (PDT)
MIME-Version: 1.0
From: Ketan Talaulikar <ketant.ietf@gmail.com>
Date: Thu, 21 Mar 2024 22:45:51 +0530
Message-ID: <CAH6gdPyrc=YuQAoWCwTdpgs4j6BSOb+ZNO600XcLSJsHRe64XA@mail.gmail.com>
To: teas@ietf.org, IPv6 List <ipv6@ietf.org>
Cc: draft-ietf-6man-enhanced-vpn-vtn-id@ietf.org
Content-Type: multipart/alternative; boundary="000000000000bd6f4206142edc9d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/itVkccA4CXIBQHOa_YbeuNahccs>
Subject: [IPv6] Comments on draft-ietf-6man-enhanced-vpn-vtn-id
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Mar 2024 17:16:11 -0000

Hello All,

I am sharing the comments that I made at the mic during the 6man WG session
today to start a list discussion. Also copying TEAS WG where the main
framework is being worked on and perhaps the place where perhaps most of
these points should be debated.

1) My feedback to the authors is to keep the IPv6 NRP HBH extension header
as short and simple as possible. This is something that needs to be
processed in hardware at line rate by all IPv6 routers in a provider
network "limited domain". Let us make it as efficient as possible for it to
be successful. So a simple header with a fixed length NRP-ID in it is
sufficient. Note that there will be similar extensions for other data
planes (I am aware of one for MPLS
https://datatracker.ietf.org/doc/draft-li-mpls-mna-nrp-selector/) and we
need to ensure some level of consistency across them.

2) Next point is the size of this NRP-ID. It seems like there is the desire
to keep it as 32-bit, and this seems to stem from the desire to map this to
a 3GPP slice (see text below from sec 2) ? However, it is for the TEAS WG
to check if there is a desire for such 1:1 mapping. My understanding, and I
could be wrong, is that the number of NRPs is intended to be a much smaller
number than the network slices that are layered on top of an NRP.
Shorter/smaller size that is more practically aligned to the framework
would be desirable.

Note that, in the context of 5G network slicing, if a deployment found it
useful, the four-octet NRP ID field may be derived from the four-octet
Single Network Slice Selection Assistance Information (S-NSSAI) defined in
3GPP [TS23501
<https://www.ietf.org/archive/id/draft-ietf-6man-enhanced-vpn-vtn-id-06.html#TS23501>
].

3) The flags defined in the extension header only complicate the
processing, especially as new ones are introduced. Even so, for the S flag
currently defined, I am not convinced of the rationale/argument. My
understanding is that the NRP is intended as a guarantee of network
resources that are partitioned - this needs actual QoS resources to be
provisioned on the node. If some traffic flow is routed over a node/link
where the NRP and its resources are not provisioned, then the "guarantee"
is broken? This seems to be more like a local policy thing. For years we
have been able to do QoS PHB with a fixed size DSCP/TOS/EXP bits, is this
not similar?

4) And finally, there was a discussion on the chat about extensibility for
carrying other information/identifiers. If this HBH EH is meant for
carrying NRP, then let it carry only NRP. I don't think we want some other
identifiers being carried around in this HBH for some other purposes -
there are bound to be concerns.

I hope this helps us converge towards a simple and consistent EH for NRP.

Thanks,
Ketan