Re: Limited Domains:

Brian E Carpenter <brian.e.carpenter@gmail.com> Tue, 13 April 2021 23:39 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32D283A00E5; Tue, 13 Apr 2021 16:39:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Vn7hgYpiyee; Tue, 13 Apr 2021 16:39:25 -0700 (PDT)
Received: from mail-pf1-x42c.google.com (mail-pf1-x42c.google.com [IPv6:2607:f8b0:4864:20::42c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0FB913A00DB; Tue, 13 Apr 2021 16:39:24 -0700 (PDT)
Received: by mail-pf1-x42c.google.com with SMTP id w8so9015989pfn.9; Tue, 13 Apr 2021 16:39:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=7bu0wJljr8L1FtBU4Bc9euPkZm1DGGEqM5HV1Ef3qb0=; b=esPpDB6a3Ldja8S7Y9h1X7LTwdDQfWSamlYzg0tqQrn0R9wbQRavqEnloaBdYuAySN R9cmUnjhvlPo0ZLBd0FRdxoqbdI4MS/mjiIH+gTHSStAVbyjtzSdU1Z3l8wbgk5/jrfP 5p3ro8FkWlr9gBF+Sr7ZlqmRJHrhZ9C8Fc+FFaep67BypAexW0qlC+uCaUvPer3uApBO 5PSgZvYVLqO/woR5HaHMkC0q1birMFiO/uN2tbwfAsXcHpXtzbN2qEeuFtGIkEPezAEL plZQG7T3ocMpimysA9HF6b2M5pCX18aZmQsD5ycF8t/S+ofz3IKY6MQSUeQkZC1VI8QF JjKA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=7bu0wJljr8L1FtBU4Bc9euPkZm1DGGEqM5HV1Ef3qb0=; b=ljHh2+yjITXos5Iex4lGnIK9kK5Wvyz5xwTaxVyLfNfPpYWH2ihQKZNhkoKrCWabuN OUCpunyN4ZdrsdO8/NBlqad3CvLOL0iQdfLvnsFrlPREEeNlEFRkXb+AQJGwLMd9/K7Q pCevPMhMeGcs4ZpVEaOy7avRMq3RCEcR9c5Kb0aVG9fRhlXHVE4D9O7hkceeOfmM7/eg CSyDtBzCNybqt88zOk1O6F5MotV21sAH8DZ7qj9tJvWX8H8zRBIv65GPm+O3h5AO62jM m6JAW8nZxHlzSDuowPM4GaQXZMHI6UUBS/0/tqR4St4oNALwJ9iyeoqw8IA7PprrPlX8 dYhA==
X-Gm-Message-State: AOAM532e4aNUhU+mzPpRhwcJk+rfSgBmGUT1yYz37hfEiZY4YWGXXOvW bDGUkhnGVzUj9fsv6lRxifdhpLqSq/7K2g==
X-Google-Smtp-Source: ABdhPJyEe6cuUXubnz3EUu+46Ay4RzSAbaq3xjIUwTPTXX2+kQn8z5swAocK0j8tuGwoS3rZBFM58Q==
X-Received: by 2002:a62:aa19:0:b029:24f:46d6:1320 with SMTP id e25-20020a62aa190000b029024f46d61320mr8229703pff.65.1618357162963; Tue, 13 Apr 2021 16:39:22 -0700 (PDT)
Received: from [192.168.178.20] ([151.210.131.14]) by smtp.gmail.com with ESMTPSA id k15sm13617285pfi.0.2021.04.13.16.39.20 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 13 Apr 2021 16:39:22 -0700 (PDT)
Subject: Re: Limited Domains:
To: "Ahmed Abdelsalam (ahabdels)" <ahabdels@cisco.com>
Cc: Tom Herbert <tom@herbertland.com>, Nick Hilliard <nick@foobar.org>, "draft-filsfils-6man-structured-flow-label@ietf.org" <draft-filsfils-6man-structured-flow-label@ietf.org>, "6man@ietf.org" <6man@ietf.org>
References: <BL0PR05MB5316991D4124AD85BC69392AAE709@BL0PR05MB5316.namprd05.prod.outlook.com> <1697a0f8-b3cd-9f7d-d610-305b5305c9a1@gmail.com> <4077E736-0092-44C6-80D1-E094F468C00C@gmail.com> <12878114-5c26-86f9-89c3-bcfa10141684@gmail.com> <CALx6S35NBfVJmjqVwhNV3nui2avUOXn6ySMG3cxx2AvGkwr_Ow@mail.gmail.com> <08A6C3D2-A81C-413A-81B3-EFAAA9DBCCE5@cisco.com> <5b68beb6-a6f9-828b-5cca-9c5ec2bfbea7@foobar.org> <126B0A5E-B421-4B1F-AAEB-ABD48FFA4289@cisco.com> <CALx6S35yxqAqWJVhav-=+TB2ZyYttAFfsLNs6Btt+QUx__aQ1w@mail.gmail.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <9b22cfe4-22eb-3977-2d25-79eb61370291@gmail.com>
Date: Wed, 14 Apr 2021 11:39:17 +1200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <CALx6S35yxqAqWJVhav-=+TB2ZyYttAFfsLNs6Btt+QUx__aQ1w@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/n4PEg15x9c6P7AtMgBI9NbkDb1U>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Apr 2021 23:39:30 -0000

On 14-Apr-21 04:46, Tom Herbert wrote:
> On Tue, Apr 13, 2021 at 9:18 AM Ahmed Abdelsalam (ahabdels)
> <ahabdels@cisco.com> wrote:
>>
>> Hi Nick,
>> Please find my answers inline [AA]
>>
>> -----Original Message-----
>> From: Nick Hilliard <nick@foobar.org>
>> Date: Tuesday, 13 April 2021 at 11:58
>> To: ahabdels <ahabdels@cisco.com>
>> Cc: Tom Herbert <tom@herbertland.com>, Brian E Carpenter <brian.e.carpenter@gmail.com>, "draft-filsfils-6man-structured-flow-label@ietf.org" <draft-filsfils-6man-structured-flow-label@ietf.org>, "6man@ietf.org" <6man@ietf.org>
>> Subject: Re: Limited Domains:
>>
>>     Ahmed Abdelsalam (ahabdels) wrote on 13/04/2021 09:59:
>>     > [AA] I don't think we need a new codepoint.
>>     > The operator explicitly configures the routers under his
>>     > administrative domain to support Structured Flow Label.
>>
>>     a codepoint is a marker to cause something to be interpreted in a
>>     specific and different way.  Moving this flag to the configuration
>>     domain is essentially admitting that the semantics of a codepoint are
>>     necessary, except that it removes the possibility of having these
>>     semantics interpreted automatically on a per-packet basis, and turns it
>>     into a per-router or possibly per-interface flag.  This is an unusual
>>     type of regression in terms of a protocol where so much work has been
>>     put into auto-configuration, and where the syntactic mechanism has been
>>     created for protocol extensions.
>> [AA] This is a domain wide config applied to all nodes of the domain. So either you decide to do on all routers or not. It doesn’t on per packet treatment.

But what happens if a packet sourced inside the domain has a destination
outside the domain, where flow labels are 20 bits? What happens when a
packet from outside the domain with a 20 bit flow label arrives inside
the domain?

The only model I can imagine is that every router in the domain (not just
the border routers) would need to check every packet and, if either
the source or the destination prefix is outside the domain, then apply
the rules of RFC6437. That's mathematically possible, I suppose, but
it absolutely requires a per-packet treatment.

If you're going to steal codepoints for local use, steal them from the
DSCP. That is potentially rewritten at the domain boundary, and what's
more it's IP-version independent and belongs to another WG.

(Fair warning: this would be contentious too.)

Regards
     Brian

>>
> Ahmed,
> 
> So this is all or nothing then, replete with a so-called "flag day".
> What is the protocol that guarantees that every router in the domain
> is properly configured, that no one ever inadvertently brings up a
> router without proper configuration? And if configuration fails, which
> even in a moderately sized domain will inevitably happen at some
> point, how will the user detect the issue and debug it?
> 
> Tom
> 
>>
>>     As a separate issue, if a regular ip packet from the outside
>>     accidentally enters into this administrative domain, how does a router
>>     on the inside of the domain know not to attempt to interpret the flow
>>     label as a SFL, as it could end up effectively parsing random junk?
>>
>> [AA] All packet coming from external interfaces will be encapsulated in outer IPv6 header as explained the in section 3. The outer IPv6 is what matters for forwarding inside the domain. If a packet from outside accidentally enters into this administrative domain, then that is a bigger problem than SFL.
>>
>>     Nick
>>
> .
>