Re: IPv6 header insertion in a controlled domain

otroan@employees.org Sun, 08 December 2019 10:21 UTC

Return-Path: <otroan@employees.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2D8B1200B2 for <ipv6@ietfa.amsl.com>; Sun, 8 Dec 2019 02:21:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6tkYGnmzTdZc for <ipv6@ietfa.amsl.com>; Sun, 8 Dec 2019 02:21:00 -0800 (PST)
Received: from clarinet.employees.org (clarinet.employees.org [198.137.202.74]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B073512000F for <ipv6@ietf.org>; Sun, 8 Dec 2019 02:21:00 -0800 (PST)
Received: from astfgl.hanazo.no (unknown [IPv6:2a01:79c:cebd:47d8:a132:2dc:5bc7:9ba]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by clarinet.employees.org (Postfix) with ESMTPSA id 118324E11AC6; Sun, 8 Dec 2019 10:21:00 +0000 (UTC)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by astfgl.hanazo.no (Postfix) with ESMTP id 03E3C254E177; Sun, 8 Dec 2019 11:20:58 +0100 (CET)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3601.0.10\))
Subject: Re: IPv6 header insertion in a controlled domain
From: otroan@employees.org
In-Reply-To: <b1d8ce77-25b6-be24-6b58-ea9117f5d762@si6networks.com>
Date: Sun, 08 Dec 2019 11:20:57 +0100
Cc: Mark Smith <markzzzsmith@gmail.com>, 6man WG <ipv6@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <75EC23CA-A703-4095-859C-A489E9158722@employees.org>
References: <CALx6S3588ja9AZzBQ0dqwx0j-ki6A5tusye+odQKPyAyF+hEww@mail.gmail.com> <10E890EA-3278-44EE-881E-EBC91D419587@employees.org> <88287cb0-c0c3-f990-4dd7-338df87c7fb2@joelhalpern.com> <4E76C386-FB1E-4E48-814D-BB626466BEE3@employees.org> <CAO42Z2ze7tmkGh=E-YrPuJHMeD8V6EuxgjjaJ33iz+Ms3abNsA@mail.gmail.com> <ED9B7C60-ACDE-4107-A121-AE2DAEA6B640@employees.org> <b1d8ce77-25b6-be24-6b58-ea9117f5d762@si6networks.com>
To: Fernando Gont <fgont@si6networks.com>
X-Mailer: Apple Mail (2.3601.0.10)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/sbj9nqPWFsJ8GzwVnfp9WojPpiI>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 08 Dec 2019 10:21:02 -0000

Fernando,

Please stop hijacking every thread for your own purposes.

Ole

> On 8 Dec 2019, at 11:02, Fernando Gont <fgont@si6networks.com> wrote:
> 
> On 8/12/19 06:24, otroan@employees.org wrote:
>> Mark,
>> 
>> [...]
>> [renamed thread]
>> 
>>> Take an example of 3 routers A, B and C that is under the same control.
>>> Traffic travels from left to right.
>>> 
>>> A -- B -- C
>>> 
>>> A has a tunnel to C using ULA source and destination.
>>> A packet ingresses on A, is encapsulated and forwarded towards C.
>>> A has for reasons unknown to us outsourced a function to B. Where B insert an extension header in the packet originated by A.
>>> C is also in on the game, being a tunnel end-point, removing the encapsulating header and extension header.
>>> 
>>> If you can leave the nuances of SR and the whatever they propose on the shelf for a minute.
>>> 
>>> Do you agree in principle that this approach of "header insertion in a controlled domain" can be made to work,
>>> and should be indiscernible from A inserting the extension header itself?
>> 
>> Yes, there are obviously many ways of skinning this cat.
>> In this thread I don't want to try solve whatever problem the EH insertion camp wants solved. I don't think I understand it well enough.
> 
> That's a good thing. If you don't understand the problems that folks
> argue in order to do EH insertion solved, that's an indication that we
> should stay safe, and stick to consensus.
> 
> In fact, I'd believe that it's quite interesting that we're even
> bothering to talk about EH insertion when the folks proposing it didn't
> even bother to do a proper analysis, and argue why they need it, and why
> the problem can't be solved in any other way.
> 
> 
> Datapoint: As a measure of process fairness: when we were doing RFC7217,
> we were kind of required to do RFC7721 in order to eventually do
> RFC8064. (and we were talking about a host-local policy thing).
> 
> So it is quite nice to see that now you are open to screw up the
> architecture just because a big vendors wants it, with the only
> rationale for doing it, "the operator community want it".
> 
> Thanks,
> -- 
> Fernando Gont
> SI6 Networks
> e-mail: fgont@si6networks.com
> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492