RE: Fwd: New Version Notification for draft-voyer-6man-extension-header-insertion-07.txt

"Voyer, Daniel" <daniel.voyer@bell.ca> Sat, 21 September 2019 17:01 UTC

Return-Path: <prvs=160a0845b=daniel.voyer@bell.ca>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F6AA12004C; Sat, 21 Sep 2019 10:01:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MTm_7UQ_fKzz; Sat, 21 Sep 2019 10:01:50 -0700 (PDT)
Received: from ESA4-Wyn.bell.ca (esa4-wyn.bell.ca [67.69.243.182]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0533612000F; Sat, 21 Sep 2019 10:01:49 -0700 (PDT)
Subject: RE: Fwd: New Version Notification for draft-voyer-6man-extension-header-insertion-07.txt
Received: from dm5czo-d01.bellca.int.bell.ca (HELO DG1MBX03-WYN.bell.corp.bce.ca) ([198.235.102.33]) by esa04corp-wyn.bell.corp.bce.ca with ESMTP; 21 Sep 2019 13:01:45 -0400
Received: from DG1MBX04-WYN.bell.corp.bce.ca (2002:8eb6:120e::8eb6:120e) by DG1MBX03-WYN.bell.corp.bce.ca (2002:8eb6:120d::8eb6:120d) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sat, 21 Sep 2019 13:01:44 -0400
Received: from DG1MBX04-WYN.bell.corp.bce.ca ([::1]) by DG1MBX04-WYN.bell.corp.bce.ca ([fe80::39a2:98d1:477c:3365%22]) with mapi id 15.00.1473.003; Sat, 21 Sep 2019 13:01:44 -0400
From: "Voyer, Daniel" <daniel.voyer@bell.ca>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
CC: "Darren Dukes (ddukes)" <ddukes@cisco.com>, 6man <6man@ietf.org>, SPRING WG <spring@ietf.org>
Thread-Topic: [EXT]Re: Fwd: New Version Notification for draft-voyer-6man-extension-header-insertion-07.txt
Thread-Index: AQHVcDXuqJa+gsxFR0CM81LyTMm0Dqc10/IAgADKeoA=
Date: Sat, 21 Sep 2019 17:01:44 +0000
Message-ID: <96836B6A-DFBC-48F4-923E-4415FB1ED63D@bell.ca>
References: <156903961357.5092.16907354634703727132.idtracker@ietfa.amsl.com> <21D937AA-0B27-4E8D-BB6E-99452F72AC30@cisco.com> <41ca6fad-9e21-5d48-1f2c-0d9ce722920e@joelhalpern.com>
In-Reply-To: <41ca6fad-9e21-5d48-1f2c-0d9ce722920e@joelhalpern.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
Content-Type: text/plain; charset="utf-8"
Content-ID: <838544801D19704E836C81439576E8D0@exchange.bell.ca>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/uaNC_oImtbOGqgNHczh9kCSNh3Y>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Sep 2019 17:01:53 -0000

Hi Joel, 

Sent from my mobile

> On Sep 21, 2019, at 00:54, Joel M. Halpern <jmh@joelhalpern.com> wrote:
> 
> I see where the draft defines a set of constraints.
> The constraint that there be no other extension headers is a fairly drastic constraint, which would seem a cause for concern.
> 
> Putting that aside however, the draft does not seem to provide any explanation for why insertion rather than additional encapsulation is used.  Particularly given the assumption that the MTU is large enough, it seems the encapsulation could be used for all insertion cases.
> 
DV: correct, you can use encapsulations but at the cost of 40bytes overhead. Running an operators backbone, with a widespread among of use cases, you need those bytes..

> Yours,
> Joel
Regards
Dan
> 
>> On 9/21/2019 12:34 AM, Darren Dukes (ddukes) wrote:
>> Hello everyone, we’ve just submitted an updated draft that explains why SRH insertion is performed in an SR domain, how it is accomplished and why it is safe within the SR domain.
>> The authors look forward to your comments and suggestions on how to improve this document.
>> Thanks!
>>   Darren (on behalf of the authors)
>>> Begin forwarded message:
>>> 
>>> *From: *<internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>>
>>> *Subject: **New Version Notification for draft-voyer-6man-extension-header-insertion-07.txt*
>>> *Date: *September 21, 2019 at 12:20:13 AM EDT
>>> 
>>> 
>>> A new version of I-D, draft-voyer-6man-extension-header-insertion-07.txt
>>> has been successfully submitted by Darren Dukes and posted to the
>>> IETF repository.
>>> 
>>> Name:draft-voyer-6man-extension-header-insertion
>>> Revision:07
>>> Title:Insertion of IPv6 Segment Routing Headers in a Controlled Domain
>>> Document date:2019-09-20
>>> Group:Individual Submission
>>> Pages:13
>>> URL: https://www.ietf.org/internet-drafts/draft-voyer-6man-extension-header-insertion-07.txt
>>> Status: https://datatracker.ietf.org/doc/draft-voyer-6man-extension-header-insertion/
>>> Htmlized: https://tools.ietf.org/html/draft-voyer-6man-extension-header-insertion-07
>>> Htmlized: https://datatracker.ietf.org/doc/html/draft-voyer-6man-extension-header-insertion
>>> Diff: https://www.ietf.org/rfcdiff?url2=draft-voyer-6man-extension-header-insertion-07
>>> 
>>> Abstract:
>>>   Traffic traversing an SR domain is encapsulated in an outer IPv6
>>>   header for its journey through the SR domain.
>>> 
>>>   To implement transport services strictly within the SR domain, the SR
>>>   domain may require insertion or removal of an SRH after the outer
>>>   IPv6 header of the SR domain.  Any segment within the SRH is strictly
>>>   contained within the SR domain.
>>> 
>>>   The SR domain always preserves the end-to-end integrity of traffic
>>>   traversing it.  No extension header is manipulated, inserted or
>>>   removed from an inner transported packet.  The packet leaving the SR
>>>   domain is exactly the same (except for the hop-limit update) as the
>>>   packet entering the SR domain.
>>> 
>>>   The SR domain is designed with link MTU sufficiently greater than the
>>>   MTU at the ingress edge of the SR domain.
>>> 
>>> 
>>> 
>>> 
>>> 
>>> Please note that it may take a couple of minutes from the time of submission
>>> until the htmlized version and diff are available at tools.ietf.org <http://tools.ietf.org>.
>>> 
>>> The IETF Secretariat
>>> 
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
> ------------------------------------------------------------------------------
> External Email: Please use caution when opening links and attachments / Courriel externe: Soyez prudent avec les liens et documents joints