Re: [Last-Call] [v6ops] Tsvart last call review of draft-ietf-v6ops-ipv6-ehs-packet-drops-05

Tom Herbert <tom@herbertland.com> Thu, 08 April 2021 00:31 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02DFC3A3054 for <last-call@ietfa.amsl.com>; Wed, 7 Apr 2021 17:31:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fe2N5bcyPczg for <last-call@ietfa.amsl.com>; Wed, 7 Apr 2021 17:31:11 -0700 (PDT)
Received: from mail-ej1-x62d.google.com (mail-ej1-x62d.google.com [IPv6:2a00:1450:4864:20::62d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18E4E3A304E for <last-call@ietf.org>; Wed, 7 Apr 2021 17:31:10 -0700 (PDT)
Received: by mail-ej1-x62d.google.com with SMTP id l4so45204ejc.10 for <last-call@ietf.org>; Wed, 07 Apr 2021 17:31:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=kqwLglt8pscW0tztezNklRrKZkuXJ0pbueZqtANcx5E=; b=kqGODvL8zxjNYBeDyFtIgwNVTAU1CPmHarM0p6YUupdqGLotDXeByPIpOaRuUGxMVw T7Qj5N75Tf+Y8x/8lyRnqbuaL8MlcjWe0GnJT1u7eIZrPen1wzQQqGnUnVyUSmrV89Sp ZORWi9NYZ2Qi+FVFKj0mN3oxQJZGdAPd/sGehT1q3Xc+SsrAp0GdCs+wio6/TbabfoJm u203/UUvOBpT3Zu7Ws+a/LexpZXKz3O8dJbD0oyGrt081/+3lDNoZTC4iVjIFs/dgyvd lrMz4pcL9iB8pL49UKJ6HImJzL71/A9tfapCV+/BP7mnICPVkHfUUrto7P9TTuQTeYHU pM9w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=kqwLglt8pscW0tztezNklRrKZkuXJ0pbueZqtANcx5E=; b=QECdeVliMIBokJTt8+LxL6YjT1ghsxVbhErcmHqe+KBFB3k/8+zMtaZM03maG/vSbq AuJmyy9RSHbgRnR0hZ9xuwhlgRQJ//moc2wYftLz28P3RlS2vYEdarY97HH2ayy0+ptP 7lP+PFxvuE95TMCNo0il5jcPP5ZJSiWIjBgmXO0siXXJgeosdPH9xHBL4ajC1EXj3xPJ T4LIEKEtxWkEhznemp2rJZg1+umFpGFFQtcOHBg8LW6LNHjjMjdcDTpZNlSZWuVBmGa7 fm32Z0/yz77GApFlhtGEwbmeovHKAnT9aoK2O8B2VlftcJnGgvt3yLRc5nComcenuAoF U6PQ==
X-Gm-Message-State: AOAM532NEGFIKZ+rPE673WtUV1Mv1Bh9bCGXB8OuESGeaeCPHrYDZqo6 QayMEadF0SJXIF92XBw/23WV3mCSZSgj0l3H35SGOA==
X-Google-Smtp-Source: ABdhPJyXurI38yu9o1Wtu1fpmXNBhDxLma50Ac1HL1ZrhpWMwmZn29sA1RZMkHFoNVEthxSIjmhFFc8uskZysRScU/Q=
X-Received: by 2002:a17:907:3e93:: with SMTP id hs19mr7158901ejc.272.1617841868767; Wed, 07 Apr 2021 17:31:08 -0700 (PDT)
MIME-Version: 1.0
References: <161366727749.10107.14514005068158901089@ietfa.amsl.com> <e41f3484-f816-e185-2d99-94323c8da732@si6networks.com> <CALx6S34qSxGijVcs229bAL5gMhMvMNYUXm3yEmrg6wxUiUAiaA@mail.gmail.com> <bf83d228-25bc-21bb-f984-d58ead6bf492@si6networks.com> <CALx6S35Kh-QAXJDAucuw5Wty37MBiwS=pqQknMZ+15b7D5Sn8A@mail.gmail.com> <34e78618-cb28-71a1-a9d3-7aec38032659@si6networks.com> <CAO42Z2zqD9_d2Fbr25Y2CV1GdzYKd167yf5DHeHna7V66pF65A@mail.gmail.com> <0bd316ac-1789-f4c6-d280-943ad6e60309@si6networks.com> <CALx6S34dMEEJ+OPUu_=FW1Y5AQuvAaHzBPEe448S7rfbMmHN_w@mail.gmail.com> <CEFDF511-9255-4913-840D-50CCBC2B7B17@gmail.com> <CALx6S36_w+zxyUt0DzQ9NKBs+SAPZDNhs_sqLBwi+qneOPSS5A@mail.gmail.com> <ef2bd4f5-3b1e-b88c-ec8f-dd9a2f9a60ba@si6networks.com> <CALx6S349X7fQR=9Dj+n5X7ovXsSjLYibv-C-+bL0nkWsYP5NGA@mail.gmail.com> <MN2PR11MB43668EDA6209CA6AF3BCC5EEB5759@MN2PR11MB4366.namprd11.prod.outlook.com> <CALx6S3447SJwdRPoG_BaXS=ihBe1xA84vxcCev1y2K4xqMYZaQ@mail.gmail.com> <a68c5a02-ad6b-1966-7fe4-678abf14af24@si6networks.com>
In-Reply-To: <a68c5a02-ad6b-1966-7fe4-678abf14af24@si6networks.com>
From: Tom Herbert <tom@herbertland.com>
Date: Wed, 07 Apr 2021 17:30:57 -0700
Message-ID: <CALx6S36pLpF8+Y_8oDiO+UQAnXFt5STSaB5fJgjWp9jFEFv3-A@mail.gmail.com>
To: Fernando Gont <fgont@si6networks.com>
Cc: "Rob Wilton (rwilton)" <rwilton@cisco.com>, Gorry Fairhurst <gorry@erg.abdn.ac.uk>, IPv6 Operations <v6ops@ietf.org>, "draft-ietf-v6ops-ipv6-ehs-packet-drops.all@ietf.org" <draft-ietf-v6ops-ipv6-ehs-packet-drops.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "tsv-art@ietf.org" <tsv-art@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/rvwWwHfUOaPoVvGclXpNg5RaKdc>
Subject: Re: [Last-Call] [v6ops] Tsvart last call review of draft-ietf-v6ops-ipv6-ehs-packet-drops-05
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Apr 2021 00:31:16 -0000

On Wed, Apr 7, 2021 at 5:03 PM Fernando Gont <fgont@si6networks.com> wrote:
>
> Hi, Tom,
>
> On 7/4/21 12:20, Tom Herbert wrote:
> [....]
> > Given that hosts are the ones creating extensions headers and other
> > packet formats, hosts have a vested interest in how routers are
> > dealing with their packets. Even before this document was created, we
> > have long known that extensions headers might be dropped and have been
> > working on mitigations to reduce the number of drops which are already
> > addressing some of the reasons that packets with EH. For instance,
> > consider draft-hinden-6man-hbh-processing-00; this is a proposal to
> > limit the number of HBH options to exactly one. The idea is that
> > routers will make it feasible for routers packets that have HBH
> > options, with the trade off of specifically limiting the extensibility
> > of the protocol. The problem is there is no data that indicates this
> > proposal would have the desired effect; we don't if routers would
> > start accepting packets that are limited to one HBH option.
>
> What does that proposal have to do with this document?

Because that proposal is ostensibly addressing a perceived reason for
packets being dropped. If it's not really a problem, then by all means
please chime in on 6man list where the draft is under discussion.

>
>
>
> > So my fundamental concern with this draft is that it is an entirely
> > qualitative description of a well known problem, however a qualitative
>
> No. It is not a well known problem. If you look at
> draft-hinden-6man-hbh-processing, itś clear that their assumption is
> that limiting the number of EHs or options solves the problem. Whereas
> our document essentially notes that to a large extent the problem has to

What exactly does "large extent " mean? Does that mean that at least
50% or some greater than that percentage of drops of packets with EH
were dropped precisely because the header chains were too long?

> do with the overall EH-chain length -- it doesn't matter if the
> EH-chain: it doesn matter whether you have one long EH, multiple small
> ones, one large EH with one large option, one large EH with many small
> options, or any combination of them.

Perhaps, but again I ask for either data or references from vendors to
verify that supposition.

>
> The fact that youŕe raising this issue and that thereś a belief that
> there'ś a clear and easy way to make EHs work probes that itś certainly
> not a well known problem.
>
That is not the only issue that is being addressed. There are also the
suggested limits in RFC8504 for host processing, the mitigation in
RFC8200 to allow intermediate nodes to ignore HBH options, and ICMP
errors in RFC8883 that intermediate nodes drop packets including if
header chains are too long.

> I can also say that I have consulted for different operators, and they
> were not even aware about this issue.
>
>
>
> > analysis is insufficient input for moving extension headers forward.
>
> Please read the Abstract:
>     This document summarizes the operational implications of IPv6
>     extension headers specified in the IPv6 protocol specification
>     (RFC8200), and attempts to analyze reasons why packets with IPv6
>     extension headers are often dropped in the public Internet.
>
> and the disclaimer:
>
> 2.  Disclaimer
>
>     This document analyzes the operational challenges represented by
>     packets that employ IPv6 Extension Headers, and documents some of the
>     operational reasons why these packets are often dropped in the public
>     Internet.  This document is not a recommendation to drop such
>     packets, but rather an analysis of why they are dropped.
>
>
> If you want to embark in the project of "moving Ehs forward", getting
> whatever data you need for that, etc., thatś totally fine.
>
>
>
> > In the draft, there are several reasons suggested as to why routers
> > might drop packets, however there is no indication of the relative
> > occurrence frequency of these. Also, there are parameterizations
> > mentioned such as in the state that routers might drop if the chain is
> > "too long", there is no analysis on exactly what "too long" commonly
>
> We discussed this one to death: Thatś impossible to tell. Itś
> implementation dependent, and the information may not even be public.
>
>
>
> > and deployment thereby providing actionable data. Note this is not the
> > same as making recommendations, I am just asking for the operational
> > data as part of the analysis from which we could derive guidance or
> > new protocol requirements.
>
> You are asking for a different document. If you want that data, I
> encourage you to start the experiment, and submit an I-D with the results.
>
> Some of us did that homework for the data that we considered useful, and
> provided it to the community in RFC7872. If that data is not enough, I
> certainly encourage you to work on that. But thatś a project thatś
> totally unrelated to this document.
>
> Thanks,
> --
> Fernando Gont
> e-mail: fgont@si6networks.com
> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
>
>
>
>