Re: I-D Action: draft-voyer-6man-extension-header-insertion-02.txt

Stefano Salsano <stefano.salsano@uniroma2.it> Sat, 02 December 2017 07:15 UTC

Return-Path: <stefano.salsano@uniroma2.it>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1445B1276AF; Fri, 1 Dec 2017 23:15:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RYWc0ZwhUkVL; Fri, 1 Dec 2017 23:15:21 -0800 (PST)
Received: from smtp.uniroma2.it (mysmtp.uniroma2.it [160.80.6.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68A68120713; Fri, 1 Dec 2017 23:15:19 -0800 (PST)
Received: from smtpauth.uniroma2.it (smtpauth.uniroma2.it [160.80.6.47]) by smtp-2015.uniroma2.it (8.14.4/8.14.4/Debian-8) with ESMTP id vB27F8a8015113 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Sat, 2 Dec 2017 08:15:14 +0100
Received: from [192.168.1.127] (93-41-116-249.ip81.fastwebnet.it [93.41.116.249]) (authenticated bits=0) by smtpauth.uniroma2.it (8.14.3/8.14.3/Debian-9.4) with ESMTP id vB27F41B007835 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NOT); Sat, 2 Dec 2017 08:15:05 +0100
Subject: Re: I-D Action: draft-voyer-6man-extension-header-insertion-02.txt
To: Mark Smith <markzzzsmith@gmail.com>
Cc: draft-voyer-6man-extension-header-insertion@ietf.org, 6man WG <ipv6@ietf.org>
References: <151120281628.21912.1099097760493570225@ietfa.amsl.com> <4ca3fd6b-4cd6-f6ac-ce03-415c2c9a4c3c@gmail.com> <f4425076-2f76-5713-2819-9d26671d56bb@si6networks.com> <4E92F160-C586-4C7B-BAEF-97C204856A8A@employees.org> <bc9d7f57-8687-7f85-8ac3-49751683232b@si6networks.com> <CA+b+ERnKbRXgFycgKd7EXMVvS1Mu_RTC5tfPbNE781TDZ49rYA@mail.gmail.com> <CAO42Z2wWSucKNouo0RxNf7pmyPErNk1bVny43qTLY6E333mpcQ@mail.gmail.com> <e41ee3ae-05ef-0a1a-505e-968323b07625@gmail.com> <CAO42Z2x2-WFyxYKpcwtm_z4WiFFf1M5oiW2=j6fXnqgUG1F8DQ@mail.gmail.com>
From: Stefano Salsano <stefano.salsano@uniroma2.it>
Message-ID: <8ecf3590-5313-551e-fbb3-f95aada87a67@uniroma2.it>
Date: Sat, 02 Dec 2017 08:15:04 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0
MIME-Version: 1.0
In-Reply-To: <CAO42Z2x2-WFyxYKpcwtm_z4WiFFf1M5oiW2=j6fXnqgUG1F8DQ@mail.gmail.com>
Content-Type: text/plain; charset="iso-8859-15"; format="flowed"
Content-Language: it-IT
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: clamav-milter 0.99.2 at smtp-2015
X-Virus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/ycCHnQO12fvdiNBBOwnEYOkST80>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Dec 2017 07:15:25 -0000

Il 2017-12-01 23:07, Mark Smith ha scritto:

<snip>
> 
> I asked numerous times (at least 3 from memory), what is wrong with
> exclusively using tunnelling for this. I think eventually Robert said
> because of the tunnelling overhead.
> 
> The trouble with this argument is that this draft doesn't exclusively
> propose extension header insertion, it also describes using
> tunnelling. The only distinction between which method to use is
> whether the packet originates within the SR domain ("Source Domain and
> Packet Journey") or originates externally to it ("Transit through a
> Source Domain"). So tunnelling overhead is apparently quite acceptable
> as long packets happen to come from outside the SR domain. I can't see
> anything that explains why packets that originate internally can't or
> must not be tunnelled.

Hi Mark,

with the first tunneling operation you create a new packet that 
originates in your SR domain.

We definitely want it, so the further SR insertion will only be applied 
to such packets (and hosts outside the domain will not receive 
unexpected ICMP...) and we believe that it is worth paying the tunneling 
overhead here.

We think that for further operations that require adding of SRH 
information to such packets originating in your SR domain, the SR 
insertion is more efficient than tunnelling into a new packet.

This is both from the point of view of the packet size (and increase of 
packet headers size) and from the point of view of the cost of packet 
manipulation operations.

There can be scenarios in which you have more than one such operation to 
be applied to the packet, let us assume two. If you go for tunnelling 
you have the first encapsulation, then two more IPv6-in-IPv6 
encapsulation in the same packet, for a total of 3 encapsulations. If 
you go for tunneling + SR insertion you only have the first 
encapsulation and then "simple" mangling of SRH header.

ciao
Stefano

> 
> So the example SR domains in the draft, which is presumably the same
> domain, support both insertion and tunnelling to achieve the same and
> single goal of adding SRH information to a packet. Seems unnecessarily
> complex to support two methods that achieve the same functional
> outcome. More prone to vendor bugs, harder to troubleshoot, more
> things to learn and then forget if not used often.

> 
> More broadly, I assume the reason to try to use IPv6 for this, rather
> than either sticking just with MPLS or inventing something new, is to
> leverage IPv6's existence, widely available implementations and pretty
> close to current and definite future commoditisation. Leveraging what
> already exists for the cost and time benefit may mean making some
> compromises to gain from commoditisation.
> 
> RFC8200 IPv6 forwarding and IPv6-in-IPv6 tunnelling are commodity,
> because they're methods as old as RFCs 1883 and 2473, and are widely
> implemented and deployed. Extension Header insertion is not, and
> therefore using it is de-commodifying IPv6. The commodity benefits of
> IPv6 disappear if fundamental changes are or need to be made to IPv6's
> operation. EH insertion is a fundamental change.
> 
> I think the objection to tunnelling is really be because the IPv6 SRH
> header is too large, because of the use of 128 bit IPv6 addresses as
> segment identifiers. "Scrounging" bits somewhere else to try to
> minimise overhead is avoiding solving the problem where it is caused.
> 
> The TRILL people had this problem, as they considered 7 octet IS-IS
> IDs to be too large to include in the TRILL header. They solved it be
> using 16 bit "nicknames".
> 
> 
> "3.7.  RBridge Nicknames
> 
>     Nicknames are 16-bit dynamically assigned quantities that act as
>     abbreviations for RBridges' IS-IS IDs to achieve a more compact
>     encoding ..."
> 
> https://tools.ietf.org/html/rfc6325#section-3
> 
> 
> Regards,
> Mark.
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
> 


-- 
*******************************************************************
Stefano Salsano
Professore Associato
Dipartimento Ingegneria Elettronica
Universita' di Roma Tor Vergata
Viale Politecnico, 1 - 00133 Roma - ITALY

http://netgroup.uniroma2.it/Stefano_Salsano/

E-mail  : stefano.salsano@uniroma2.it
Cell.   : +39 320 4307310
Office  : (Tel.) +39 06 72597770 (Fax.) +39 06 72597435
*******************************************************************