Re: Comments on draft-hinden-6man-hbh-processing-00
Bob Hinden <bob.hinden@gmail.com> Thu, 18 March 2021 22:53 UTC
Return-Path: <bob.hinden@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A869A3A0CFE for <ipv6@ietfa.amsl.com>; Thu, 18 Mar 2021 15:53:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.098
X-Spam-Level:
X-Spam-Status: No, score=-7.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U9BmrBhTibNP for <ipv6@ietfa.amsl.com>; Thu, 18 Mar 2021 15:53:57 -0700 (PDT)
Received: from mail-wm1-x32b.google.com (mail-wm1-x32b.google.com [IPv6:2a00:1450:4864:20::32b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E81553A0CFA for <ipv6@ietf.org>; Thu, 18 Mar 2021 15:53:56 -0700 (PDT)
Received: by mail-wm1-x32b.google.com with SMTP id d8-20020a1c1d080000b029010f15546281so3996739wmd.4 for <ipv6@ietf.org>; Thu, 18 Mar 2021 15:53:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=dK3+p+usJt2iEjAxdzaBUrjSbUAv7RtFI2bLYjuKmTY=; b=ayRin2ZG2Moyxg+0nVcNg+mTW7oHLvGIgH3NFXtKcyDZHZ2m8fypnrFthxcPidzlJ+ GSv+w/Lrwxm64ZdL8/4s+KpJgZjRLnmva9xg/In6/MwTOk+L/dTIFGsYZ+bJkc5mHbDg mUfJ7UBR0VMinYVowxwxWywEVyEve+xalvHdl0pRz8Jvgy1mlczM87KrEX4+H7PevmEM GVNv4WAeiGUYIrMGTon27j0vr6qOtqGm8rQdyGDmUEnSpi1Er/BfJiHVdpyA6uIEBb9Y U6/HMPdTzJgxS/yKSIpUZ7KIrhTEtAZNZBalRa1MkNqQdFWSdQw765Mse+DFEJTjmC7X lXGA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=dK3+p+usJt2iEjAxdzaBUrjSbUAv7RtFI2bLYjuKmTY=; b=PT1PsJbH2VgBmiJ1LgabEs8dOech0X2D59UNW3y8mJutfOrEzunHBEKXg5c935bojH mJV8/vYRg2OPjaVvUElj1WP6+f5aXzsLueI0anTIiU+SeZDBB8IRzqUenkr1b7eexM6a Xz057mndRk+gw1Py1XQNVTKdutR2PuRfmk4GTv7JvkF0JlpTDs6UMDjvqmcNJRcobjwY jIE7ZsKcICuobf4EQ7jNnhWLwITCfhTHAe5H0lUZp85baAvRgPTGiXKv+EgsgaJPVH8V KZapyj2Yf4P3LsUFi4jKaKdyKbNmjri8YYSaoOCqgn5mWwPRuCUN6j1sVBjA6q4oKRD6 e2aw==
X-Gm-Message-State: AOAM532HfsKGBSOyLoCLAgKEqkdi0Y0xR24s3An6heGbmmrhxaeNqHok uMOSp5CjeFVOG8enX318jTk=
X-Google-Smtp-Source: ABdhPJwrcZdRIfc4L6VH/xek0CdEqImkYh1KCHgMe07temui3/tJpgr1NuEBcpY/wwtZnSXlTEQGXA==
X-Received: by 2002:a05:600c:19ce:: with SMTP id u14mr1087305wmq.109.1616108030308; Thu, 18 Mar 2021 15:53:50 -0700 (PDT)
Received: from [10.0.0.199] (c-24-5-53-184.hsd1.ca.comcast.net. [24.5.53.184]) by smtp.gmail.com with ESMTPSA id q19sm4890634wrg.80.2021.03.18.15.53.48 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 18 Mar 2021 15:53:49 -0700 (PDT)
From: Bob Hinden <bob.hinden@gmail.com>
Message-Id: <B2208374-C92D-46C4-8AFA-7CFAF3EFE6B8@gmail.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_2729B5B0-BE67-4674-A3C4-1A0A186D97E3"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.17\))
Subject: Re: Comments on draft-hinden-6man-hbh-processing-00
Date: Thu, 18 Mar 2021 15:53:45 -0700
In-Reply-To: <CACL_3VEWhSyQt+uz5HyntJ_haYadNMHuCMQCiRY8FW-ntBoLAQ@mail.gmail.com>
Cc: Bob Hinden <bob.hinden@gmail.com>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>, IPv6 List <ipv6@ietf.org>
To: "C. M. Heard" <heard@pobox.com>
References: <CACL_3VEWhSyQt+uz5HyntJ_haYadNMHuCMQCiRY8FW-ntBoLAQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.104.17)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/p3-NNQP_dBZY_ymA3DK2G8Ouxpc>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Mar 2021 22:53:59 -0000
Mike, > On Mar 13, 2021, at 4:36 PM, C. M. Heard <heard@pobox.com> wrote: > > Greetings authors and 6man, > > Following IETF 110, I read the draft and reviewed both the slides and the mailing list traffic in the first half of December 2020, and I am afraid that I must echo the following comments made by Tom Herbert on Fri, 04 December 2020 01:43 UTC: > > I understand the motivation for this draft, but I don't believe that > forcibly and retroactively restricting a feature in a well deployed > protocol is the right approach to fix the problem. Understood, but I don’t think anything will change regarding support for HBH options unless we do something. I think there is a common quote about doing the same thing and expecting different results. > > It seems to me that the draft has chosen the most disruptive possible way to restrict the number of options in the HbH header. Yes as compared to what was in RFC2460, but I note that RFC8200 basically said that HBH only have to be supported if a node was configured to support them. My thinking that supporting one option is much better than none. > It seems to me that the objective could be accomplished in a much less disruptive fashion in either of the following ways: > > (a) specify that nodes that process the HbH options header MAY ignore all options after the first; > (b) specify that nodes that process the HbH options header MAY ignore all options after the first non-PAD option I think I would be OK with something like (a). It’s possible to do this because the HBH header has the information that would enable a node can easily skip the rest. I don’t think that (b) is that helpful, if a node can skip, it can skip PAD options too. The proposal would be something like a node SHOULD process the first HBH option in the “fast path”, if there is more than one HBH option, the node MAY process or skip the remaining options. I note, this change would eliminate the need for 8-octet alignment and would simplify the proposal. > > Alternative (a) is somewhat simpler, but would require re-specifying any option that requires padding in front if it stands alone inside the HbH header, As best I am able to determine from a review of the existing HbH option specifications, IOAM is the only one that is so affected. I wasn’t aware of that. Please explain. > Alternative (b) would avoid even that, but it would also require a bit more work from a compliant node. Might be better to rework the IOAM option. > Either one of these alternatives keeps the specification the same EXCEPT for relaxing the minimum a node is required to meet. Nodes that can process more options would be allowed to to do. That avoids disruption of systems that are already deployed and could be useful in limited domains. I do not see what is gained by requiring nodes to enforce a one-option limit. I think are suggesting the proposal be written as a minimum requirement. A node could do more, but isn’t required to. I think the biggest issue with anything other than only process one HBH option or any number, is how does the node creating the packets know how many to include in a packet? I don’t see much use for HBH if the sender puts in more than are liekly be processed. I suppose, we could create an IANA registry that defines a value for the minimum number of HBH options that SHOULD be processed by all nodes. Over time if the capabilities of routers increased the number could be increased by an IETF specification. This would be for Internet wide usage, limited domains could do more with local configuration. Bob > > I note in passing that the proposal to extend RFC 8504 (IPv6 Node Requirements) to apply to intermediate systems would have the same general effect, but would put the simplicity vs capability tradeoff at a different point. > > Mike Heard
- Comments on draft-hinden-6man-hbh-processing-00 C. M. Heard
- Re: Comments on draft-hinden-6man-hbh-processing-… Tom Herbert
- Re: Comments on draft-hinden-6man-hbh-processing-… Bob Hinden
- Re: Comments on draft-hinden-6man-hbh-processing-… C. M. Heard
- Re: Comments on draft-hinden-6man-hbh-processing-… Tom Herbert
- Re: Comments on draft-hinden-6man-hbh-processing-… Bob Hinden
- Re: Comments on draft-hinden-6man-hbh-processing-… Greg Mirsky
- Re: Comments on draft-hinden-6man-hbh-processing-… otroan