Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-ospf-ospfv3-segment-routing-extensions-20: (with DISCUSS and COMMENT)

Benjamin Kaduk <kaduk@mit.edu> Tue, 08 January 2019 16:16 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A2718130ED6; Tue, 8 Jan 2019 08:16:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1CBsV5RCyC8q; Tue, 8 Jan 2019 08:16:39 -0800 (PST)
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (mail-eopbgr680097.outbound.protection.outlook.com [40.107.68.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99A00130ED8; Tue, 8 Jan 2019 08:16:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Z6lNPL7wXTE+7xktnOUQmVcNiXZShMN+d4PftYsEUFo=; b=vGmtOvWs6tBe/ob3mRMPoLtNX9VFMM4ZeCbBybTdYTElPt9LyRHO6sztdwrxPHwtwktU+k6d6o+Yb+UzzRhMYjcyCm48mGzaCtfhhKdkReTdg/GvvJwBl6OhZquDEKA/3TfIA7ui4Hqyw8vVFUc1Nrqk4rYj9zLuEF/UDq9Mg+A=
Received: from SN6PR0102CA0002.prod.exchangelabs.com (2603:10b6:805:1::15) by SN6PR01MB4111.prod.exchangelabs.com (2603:10b6:805:a6::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1516.14; Tue, 8 Jan 2019 16:16:36 +0000
Received: from DM3NAM03FT060.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e49::202) by SN6PR0102CA0002.outlook.office365.com (2603:10b6:805:1::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1516.13 via Frontend Transport; Tue, 8 Jan 2019 16:16:36 +0000
Authentication-Results: spf=pass (sender IP is 18.9.28.11) smtp.mailfrom=mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of mit.edu designates 18.9.28.11 as permitted sender) receiver=protection.outlook.com; client-ip=18.9.28.11; helo=outgoing.mit.edu;
Received: from outgoing.mit.edu (18.9.28.11) by DM3NAM03FT060.mail.protection.outlook.com (10.152.83.86) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1471.13 via Frontend Transport; Tue, 8 Jan 2019 16:16:28 +0000
Received: from kduck.kaduk.org (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x08GGLC6019957 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 8 Jan 2019 11:16:23 -0500
Date: Tue, 08 Jan 2019 10:16:21 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: Peter Psenak <ppsenak@cisco.com>
CC: "Acee Lindem (acee)" <acee@cisco.com>, The IESG <iesg@ietf.org>, "draft-ietf-ospf-ospfv3-segment-routing-extensions@ietf.org" <draft-ietf-ospf-ospfv3-segment-routing-extensions@ietf.org>, "aretana.ietf@gmail.com" <aretana.ietf@gmail.com>, "lsr-chairs@ietf.org" <lsr-chairs@ietf.org>, "lsr@ietf.org" <lsr@ietf.org>
Message-ID: <20190108161620.GY28515@kduck.kaduk.org>
References: <154398144445.4943.7198735398003216566.idtracker@ietfa.amsl.com> <5C079200.1030701@cisco.com> <20181217055358.GC94620@kduck.kaduk.org> <69190220-4994-f9c9-4adf-5016abf3a39b@cisco.com> <03e6354b-c606-fc4a-bbf2-3d59fa1cb774@cisco.com> <20181222042939.GW94620@kduck.kaduk.org> <8D31ADF0-FA83-4B23-805E-76145BF914C1@cisco.com> <f3dff5f1-434c-431d-15a3-5fa7462f5572@cisco.com> <20190108143354.GX28515@kduck.kaduk.org> <a014f4fc-f730-a3a6-f169-b5d1fbc133d6@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <a014f4fc-f730-a3a6-f169-b5d1fbc133d6@cisco.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.9.28.11; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(396003)(136003)(346002)(376002)(39860400002)(2980300002)(199004)(189003)(104016004)(75432002)(93886005)(2906002)(356004)(5660300001)(88552002)(2870700001)(55016002)(8936002)(86362001)(4326008)(478600001)(229853002)(47776003)(26826003)(6916009)(8676002)(76176011)(486006)(6246003)(186003)(14444005)(305945005)(246002)(53546011)(50466002)(336012)(106002)(786003)(316002)(36906005)(23676004)(2486003)(39060400002)(9686003)(1076003)(426003)(7696005)(446003)(126002)(106466001)(26005)(33656002)(956004)(53416004)(58126008)(476003)(54906003)(11346002)(18370500001); DIR:OUT; SFP:1102; SCL:1; SRVR:SN6PR01MB4111; H:outgoing.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-auth-1.mit.edu; A:1; MX:1;
X-Microsoft-Exchange-Diagnostics: 1; DM3NAM03FT060; 1:T8YKw80CjYhH9NckfjTkZ3L9+bGPIHxHri/OOTNjeim6yrCImkOPh9qiofja70OyCx3j4OucozqzWIQnq3ZZNMXhcwbc/QQrKvaMOv7b4zmKb1PYxEnsA7B7nHxrSjIx
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: bbea4bb3-7b39-411d-cf7c-08d67584a973
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600109)(711020)(4608076)(4709027)(2017052603328)(7153060); SRVR:SN6PR01MB4111;
X-Microsoft-Exchange-Diagnostics: 1; SN6PR01MB4111; 3:GqG9YulCf+4cku1wgxV2YJnc3B9LoVU48WPKtX6pHJB9KFH2KIg/MZSDeqVYMDyXGjOGk0IZnOqy6xKX9lg/SfyGmYApKD2G8FeDKnuJDc4onYQv5K6b0LSkS1GcQvFxFEGEdsnIjtHAdWzC+QcH13tll5HXVq8Kb2evS2u6h1ZkL7Y7ZfCVhQ8kXsjQPbec7fArkRM7Qt88tmVcYWbT9Csz3ftZfKdrCI3ofaXTHn0vRQNEAfesG1hKeYkRi8YBJdh/56rIXty2dfljtrXJGHHhX98ql4qVfcFS44zT38UzVyW9FYHMBSesqShJc3lCTK7lhfkRLZY/g49ITxwpflc6FezvkL2hYFF7HDz9+cwDVmuD25WdERHSPn91OVyZ; 25:i6XB4f7AdKMTuu4MUQ46OrFEadbEnblOy5VGafzxg4rw1xtxYretAqcHJ2/rpC0PVFLZKIY8sya/2hJgxfyurw34mnn3J4mDm3RcaFCeuH2xBw7lKJNE01Sucz/Df3vk/reI0QD21EIQR0LJwpPf6X0P4FwdgcuxKUpv8opPaYjU9frSxqqfzkZ3xPRZOb6x1zD6zfNZ2Av3NsxUvv5qqeQ0cAoo+dr/dFGCxAuUS+v7fp3opd+4o/ZLhDQwdvDpdwGiWTXJCImv5qa6omIXCjU4jw+4Ty3elQ7dfXG7LeOMgQ+IJFitbparYN4mcMO4DIX6yxPIgGIUCSA7M0LjuQ==
X-MS-TrafficTypeDiagnostic: SN6PR01MB4111:
X-Microsoft-Exchange-Diagnostics: 1; SN6PR01MB4111; 31:+Nh9+tiedl3cu6sZl8UByTV77TpvYiImu/jaO5znuNPzwbP2tKCfJgdNgupVq+TqPft5RogHyP7QY7Q4HAKSfsy2DeOvOnFpYO1eyXrub7mLDdJNgrsmoMfSlwGzk8BF+cvmjYIdLDr32sfuARuHRNRWlp7fH5wapf3dhIYukBWJqhWEfw7/If43Cwj8vmhHTSvqOQn5zMSHW21V/MGR+i0tLOwQ5qxniQH74Pl28Ic=; 20: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
X-Microsoft-Antispam-PRVS: <SN6PR01MB4111C4716CDE963DEE27BE10A08A0@SN6PR01MB4111.prod.exchangelabs.com>
X-Microsoft-Exchange-Diagnostics: 1; SN6PR01MB4111; 4:J2bk4QtbHE1Cez/eA86VKp9JC8DmxbCHadY2oul01Ny8Bbu04x0PPmNWeYF1eUz5v0DnMkuQICx2UK5DABDvOrZJpcAFw3cRL/Sqg8Y75WjoSpeaxh6FpHIKwbA4vEJ742sl18SNP+JKQcAIk61O6gwMcd3Tf0WyJRyzbi+jtC5MkRTR2xvyV4nB9f5gkvH6z7KtW3I8s/3w41HMfbkltiuYxqEXA17E3CkSD+IHTv70HzEQyvwmzBO7IDA5BqXS2E5GdpzJpJ3E+iuCAciqDgzgrS5NUcvcfdpVZv5SA0ZZXcoCt4+xPqewsEmQctQx
X-Forefront-PRVS: 0911D5CE78
X-Microsoft-Exchange-Diagnostics: 1;SN6PR01MB4111;23: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
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: BsfSfCEGL0wpOXUpjsbhpkidvqnGjMQs2Ve4VE9HlvX4NKdiEJ2xb5A7KxNi5EDU12rSCERsfmanEHfuhWtipb/MrVV+DleEyOcZvIbwXH7RChh2aECqq/j+WCKDgCShOo+8vJtGsjG6igjvnnpg6zDFXl4PHX8/UmB8iLDL5M8MLJT7Q+D7ecoFxtVyroCjGs1AZN98uSpd9RwYClFBttxnrvNAv9rCGq5q4KH4tlLSRgvs0HUoeV71c4kcH1+Yn7JgWsiyN4dKfO+sq2rCqk61ZbD3LyszAMbl5wuSTrknlUowWBDzaNauvDU4Kba2
X-Microsoft-Exchange-Diagnostics: 1; SN6PR01MB4111; 6:APyjbm0YagVhJRApYxBxhd9IDwSG5C/Bb/enCwBtQ5GTJ+/v1AlraPvAUPsOYo6znXW2WjSMOg5xS1xEar1CfPkB/9eUKHyMqiVDyZHnXMmcxfrj9ppTOBYIomiI2+nT1Id90Xp33Rf8P6obH+8MgalFs8TpBElWFMw7aH7KYeXktbcANdo4VTwkIg4iWoot9/TWTlKICq2zSjyAeLLpuHdWaJqYXWwM1LWQVkQVoxjMbnrCIm3VLp++aj57CyUyaE1lrWSnHhqmFEN/+m6YmgZwnVyykjdh6QvRyOVE0aXoS/v6wXnBdHitt7zPjBiTh7RusxkR3wmT4T6oKcywpMtZhSyMfoY+L1c+Oha3T+2c9U5NRfuak3hzzowxFsZ1mmmGs5CjapPQv5iRhfPmHtr1/NGc1OELNZBhXOveix4Ih7ys7r2WTMKDW00RKEQT6/YWt7jp+yhS2QYWiR7G5A==; 5:/eyDdszT5XP0UNhc53lLZq6jJIrBG7kqOiMV2Dva5mUNNVAMyoCIJm77WWxpvFdxaw8wrXaNEkcHepBRU7S+1/99UVBCHAtUDWVLpjK7id0hj3hzVjb5mXkgSajs0myZIEy8RFACJUUQb6LvpT9nl7Rtqsatxaf4ZzOF0L9lDjLkrfZ+LgcTpLvJtlBRI4Inxn6riesO1rcGyKfnXrUTQg==; 7:lnELkpsvCrF9qCGE6G7PYWE0CJIYelzaevyk6ko2HUKz3dGYT/65aEjVA+f57CHaYdFetQlBRvFmPRk8qaLzh17FOrPF7O+ELDk8ThMnrP5v05QeJn9qJu/Nr7InERqotmA2V0obqkTRbyPpf5WyGg==
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Jan 2019 16:16:28.4512 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: bbea4bb3-7b39-411d-cf7c-08d67584a973
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.9.28.11]; Helo=[outgoing.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR01MB4111
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/HROfE9FJV8erwlA6JYJX2ajjhPw>
Subject: Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-ospf-ospfv3-segment-routing-extensions-20: (with DISCUSS and COMMENT)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Jan 2019 16:16:42 -0000

On Tue, Jan 08, 2019 at 05:09:01PM +0100, Peter Psenak wrote:
> Hi Benjamin,
> 
> Happy New Year!
> 
> Please see inline:
> 
> On 08/01/2019 15:33 , Benjamin Kaduk wrote:
> > Hi Peter,
> >
> > Happy new year, and my apologies to all for the heavy overlap between this
> > message and the reply to Acee sent just a few moments ago.
> > (inline)
> >
> > On Tue, Jan 08, 2019 at 09:13:52AM +0100, Peter Psenak wrote:
> >> Hi Benjamin,
> >>
> >> please see inline:
> >>
> >>
> >> On 22/12/2018 15:34 , Acee Lindem (acee) wrote:
> >>> Hi Ben,
> >>>
> >>> See inline.
> >>>
> >>> On 12/21/18, 11:29 PM, "Benjamin Kaduk" <kaduk@mit.edu> wrote:
> >>>
> >>>     On Thu, Dec 20, 2018 at 01:07:59PM +0100, Peter Psenak wrote:
> >>>     > Hi Benjamin,
> >>>     >
> >>>     > are you ok with my responses and proposed changed text for the range?
> >>>     >
> >>>     > thanks,
> >>>     > Peter
> >>>     >
> >>>     > On 17/12/2018 12:32 , Peter Psenak wrote:
> >>>     > > Hi Benjamin,
> >>>     > >
> >>>     > > please see inline (##PP):
> >>>     > >
> >>>     > > On 17/12/2018 06:53 , Benjamin Kaduk wrote:
> >>>     > >> Sorry for the slow reply -- you caught me right as I was leaving for
> >>>     > >> vacation.
> >>>     > >>
> >>>     > >> On Wed, Dec 05, 2018 at 09:53:20AM +0100, Peter Psenak wrote:
> >>>     > >>> Hi Benjamin,
> >>>     > >>>
> >>>     > >>> please see inline:
> >>>     > >>>
> >>>     > >>> On 05/12/18 04:44 , Benjamin Kaduk wrote:
> >>>     > >>>> ----------------------------------------------------------------------
> >>>     > >>>> DISCUSS:
> >>>     > >>>> ----------------------------------------------------------------------
> >>>     > >>>>
> >>>     > >>>> What is the extensibility model for the "AF" (address family) field
> >>>     > >>>> in the
> >>>     > >>>> OSPFv3 Extended Prefix Range TLV?  That is, what do we need to say
> >>>     > >>>> about
> >>>     > >>>> current implementations' behavior to allow future changes?  (I also a
> >>>     > >>>> little bit wonder if we really need a full eight bits, but that's
> >>>     > >>>> basically
> >>>     > >>>> aesthetic.)
> >>>     > >>>
> >>>     > >>> I don't think OSPFv3 will ever support other then IPv6 or IPv4 AF. Also
> >>>     > >>> the text says:
> >>>     > >>>
> >>>     > >>> "Prefix encoding for other address families is beyond the scope
> >>>     > >>>   of this specification."
> >>>     > >>
> >>>     > >> Perhaps it would be better encoded in a 1-bit field (rather than an 8-bit
> >>>     > >> one), then?  That would at least make the (lack of) semantics of the
> >>>     > >> other
> >>>     > >> 7 bits more clear, as the usual "MUST set to zero on transmit and
> >>>     > >> ignore on
> >>>     > >> receipt".
> >>>     > >
> >>>     > > ##PP
> >>>     > > it's too late now to change the encoding. This draft has several years
> >>>     > > of history and there are implementation shipping. Changing the encoding
> >>>     > > would cause the backward compatibility issues.
> >>>
> >>>     I didn't think I was suggesting changing the bits on the wire -- in an
> >>>     8-octet field, we're encoding the values 0 and 1 as:
> >>>
> >>>     00000000
> >>>     00000001
> >>>
> >>>     I'm proposing to change the eight bits to be specified as "the first seven
> >>>     bits are always set to 0 but should be ignored on receipt; the eighth bit
> >>>     represents the 0 or 1 value".  This makes it clear what needs to happen if
> >>>     there's a need to use any of those seven bits (an Update to this document)
> >>>     and also makes it more clear that there are not expected to be any
> >>>     additional AFs defined anytime soon.
> >>
> >> currently the draft only supports 0 and 1. It says:
> >>
> >> "Prefix encoding for other address families is beyond the scope of this
> >> specification."
> >
> > Well, that would seem to imply that even though this specification doesn't
> > touch them, there is a possibility of using this for future additional
> > address families.  So I think you need to say more about where it would be
> > in scope to do that work; this could involve making a registration in an
> > IANA registry for new family types, or a future IETF document that updates
> > this one, or probably some other mechanisms that I'm not thinking of right
> > now.
> 
> The document says:
> 
> "Prefix encoding for other address families is beyond the scope
> of this specification."
> 
> So we do allow new specification to define a new AF if needed for the 
> Range TLV. Although we do not see that happening very likely.
> 
> >
> >> Given that we have other RFCs where 8-bit field is used for AF, can we
> >> leave it as we have it please?
> >
> > There are ways to resolve my discuss position that do not involve changing
> > the encoding or its description, yes.  But see above.
> 
> so what exactly would help to resolve the discuss?

Well, there's a few options, and I don't want to try to dictate my
preferences onto your document.  What seems simplest to me would be to just
bite the bullet and establish an IANA registry for these AF values, but if
you wanted to do something else like saying that they are "beyond the scope
of this specification but may occur in future standards-track work" that
would also be fine.  I'm just trying to avoid some reader seeing "beyond
the scope of this specification" and thinking they can do whatever they
want and pick their own codepoint value to squat on.

> >
> > (And it would make the discussion of how to proceed easier if we had a
> > clear and solid answer about whether future extensions should be permitted
> > or not.)
> 
> We are not precluding future extensions to AF if they happen.

Okay, thanks for confirming.

-Benjamin