Re: I-D Action: draft-voyer-6man-extension-header-insertion-02.txt

Mark Smith <markzzzsmith@gmail.com> Fri, 01 December 2017 22:08 UTC

Return-Path: <markzzzsmith@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 246A41293D8; Fri, 1 Dec 2017 14:08:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.498
X-Spam-Level:
X-Spam-Status: No, score=-1.498 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_LOCAL_NOVOWEL=0.5, HK_RANDOM_ENVFROM=0.001, HK_RANDOM_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hu03vAe8N6pD; Fri, 1 Dec 2017 14:08:24 -0800 (PST)
Received: from mail-vk0-x243.google.com (mail-vk0-x243.google.com [IPv6:2607:f8b0:400c:c05::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7093912922E; Fri, 1 Dec 2017 14:08:24 -0800 (PST)
Received: by mail-vk0-x243.google.com with SMTP id 138so6423447vko.13; Fri, 01 Dec 2017 14:08:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=MT3QILLA69KlqJvQraM7K7rMsy6aWUYCLfxMNbSqEM8=; b=GqjaXuaJ5rEZiWPW74O4+JDuJtl+krntsSiBFwjbMszYepMCoQCU2BX1+Dyk6OD3fx qWFWr52DKdOoPL/OB1i3ytz601oHPOHuNP18eNgHKLh8/fkDXC05urmn/aorS+wvs/iF E1VBgR3+LMWlSN3A5ztQ1ojFtB8yds/wJgdaZl+EoWTuAba1IZ/E33MeNe95W0GHCzwF q7xvrbGQnJ8BGtSDFYN5TxOHOrgQd+HLdu8RrzXeW3LWB1ORsKFhPqJrbmaoa6rxdPKW DDpMck4prxAGMk0TTsWiCYsS2/1Npg8i27cai/NBwyApkwfV7oyrQTcQL5116mKDJznE iLRQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=MT3QILLA69KlqJvQraM7K7rMsy6aWUYCLfxMNbSqEM8=; b=m2n1B+DNnU0m5DE1U1Og9+QqSE/IHbYpvQO7+j4+JZa+B/uP1gLdwcRWbb7oI4tAry nK+aA+SM2PkuLBxWCmFeLpx99J0lA4a3DN2SBMZXQsAiH6+DrNNvBmLnTTqoNG74+Lci u/Jbjf9+u/8lRVdQ2P5KIKgY1X2XKQT/PpkIa+EEDcsiwg01sZWfXNT3Ibnwo3ABim5E 3oISP39RdWAgdem8RO+P/5Rfc01aKZzz+ArnD4s7HS88/fLXZMbVTPJlytrcRx3KwkRV W8LzIEDPFNAlvaVYArfKUNhudWK41IPSqPvcdq8vxLzZ8A/QJBd2ytxvBOuMu+KtXx38 Eqaw==
X-Gm-Message-State: AKGB3mJcV9Ko3HVev7qyOi8uVlJpwXhS5l84KC4him/jheiLzeTIyXS/ FBAjzpLDWHu/enm/NXDkZZcHY6Ke2G3l44XCsiI=
X-Google-Smtp-Source: AGs4zMbEYJy7hddw2NRivMGSXRa+5tKGGcuuAPVNAdLkxtCiWVqYpMTt2aq9c5rq1y/kqvYWKWABTGnwE5oxXmQkID8=
X-Received: by 10.31.135.197 with SMTP id j188mr5522170vkd.34.1512166103322; Fri, 01 Dec 2017 14:08:23 -0800 (PST)
MIME-Version: 1.0
Received: by 10.159.56.218 with HTTP; Fri, 1 Dec 2017 14:07:52 -0800 (PST)
In-Reply-To: <e41ee3ae-05ef-0a1a-505e-968323b07625@gmail.com>
References: <151120281628.21912.1099097760493570225@ietfa.amsl.com> <4ca3fd6b-4cd6-f6ac-ce03-415c2c9a4c3c@gmail.com> <f4425076-2f76-5713-2819-9d26671d56bb@si6networks.com> <4E92F160-C586-4C7B-BAEF-97C204856A8A@employees.org> <bc9d7f57-8687-7f85-8ac3-49751683232b@si6networks.com> <CA+b+ERnKbRXgFycgKd7EXMVvS1Mu_RTC5tfPbNE781TDZ49rYA@mail.gmail.com> <CAO42Z2wWSucKNouo0RxNf7pmyPErNk1bVny43qTLY6E333mpcQ@mail.gmail.com> <e41ee3ae-05ef-0a1a-505e-968323b07625@gmail.com>
From: Mark Smith <markzzzsmith@gmail.com>
Date: Sat, 02 Dec 2017 09:07:52 +1100
Message-ID: <CAO42Z2x2-WFyxYKpcwtm_z4WiFFf1M5oiW2=j6fXnqgUG1F8DQ@mail.gmail.com>
Subject: Re: I-D Action: draft-voyer-6man-extension-header-insertion-02.txt
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Cc: Robert Raszuk <robert@raszuk.net>, Fernando Gont <fgont@si6networks.com>, draft-voyer-6man-extension-header-insertion@ietf.org, 6man WG <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/xZxw3Q0hpfNlddAMxumnPrffBQY>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Dec 2017 22:08:26 -0000

Hi Brian,

On 1 December 2017 at 11:15, Brian E Carpenter
<brian.e.carpenter@gmail.com> wrote:
> On 01/12/2017 10:27, Mark Smith wrote:
>> On 1 Dec. 2017 6:35 am, "Robert Raszuk" <robert@raszuk.net> wrote:
>>

<snip>

>
> What I'm seeing in this thread are rational arguments for and against
> the proposal. I agree about the logical fallacy in the abstract of the
> current draft, but that's fixable with a few seconds use of the cursor
> and Delete key. I'd like to see the rational arguments in the next version
> of the draft.
>

While they may have perhaps been lost in the discussion before, they
were asked for in the previous discussions of the -00 draft.

I asked numerous times (at least 3 from memory), what is wrong with
exclusively using tunnelling for this. I think eventually Robert said
because of the tunnelling overhead.

The trouble with this argument is that this draft doesn't exclusively
propose extension header insertion, it also describes using
tunnelling. The only distinction between which method to use is
whether the packet originates within the SR domain ("Source Domain and
Packet Journey") or originates externally to it ("Transit through a
Source Domain"). So tunnelling overhead is apparently quite acceptable
as long packets happen to come from outside the SR domain. I can't see
anything that explains why packets that originate internally can't or
must not be tunnelled.

So the example SR domains in the draft, which is presumably the same
domain, support both insertion and tunnelling to achieve the same and
single goal of adding SRH information to a packet. Seems unnecessarily
complex to support two methods that achieve the same functional
outcome. More prone to vendor bugs, harder to troubleshoot, more
things to learn and then forget if not used often.

More broadly, I assume the reason to try to use IPv6 for this, rather
than either sticking just with MPLS or inventing something new, is to
leverage IPv6's existence, widely available implementations and pretty
close to current and definite future commoditisation. Leveraging what
already exists for the cost and time benefit may mean making some
compromises to gain from commoditisation.

RFC8200 IPv6 forwarding and IPv6-in-IPv6 tunnelling are commodity,
because they're methods as old as RFCs 1883 and 2473, and are widely
implemented and deployed. Extension Header insertion is not, and
therefore using it is de-commodifying IPv6. The commodity benefits of
IPv6 disappear if fundamental changes are or need to be made to IPv6's
operation. EH insertion is a fundamental change.

I think the objection to tunnelling is really be because the IPv6 SRH
header is too large, because of the use of 128 bit IPv6 addresses as
segment identifiers. "Scrounging" bits somewhere else to try to
minimise overhead is avoiding solving the problem where it is caused.

The TRILL people had this problem, as they considered 7 octet IS-IS
IDs to be too large to include in the TRILL header. They solved it be
using 16 bit "nicknames".


"3.7.  RBridge Nicknames

   Nicknames are 16-bit dynamically assigned quantities that act as
   abbreviations for RBridges' IS-IS IDs to achieve a more compact
   encoding ..."

https://tools.ietf.org/html/rfc6325#section-3


Regards,
Mark.