Re: [MBONED] [Bier] [Msr6] MSR6 BOF 3rd Issue Category: More details are requested about the large scale use cases, including issue 8-11

Toerless Eckert <tte@cs.fau.de> Fri, 04 November 2022 08:02 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1441EC152712; Fri, 4 Nov 2022 01:02:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.66
X-Spam-Level:
X-Spam-Status: No, score=-6.66 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 34_MWm0wD3ZY; Fri, 4 Nov 2022 01:02:30 -0700 (PDT)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [131.188.34.40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5BD44C152709; Fri, 4 Nov 2022 01:02:28 -0700 (PDT)
Received: from faui48e.informatik.uni-erlangen.de (faui48e.informatik.uni-erlangen.de [131.188.34.51]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTPS id 8A10C548548; Fri, 4 Nov 2022 09:02:24 +0100 (CET)
Received: by faui48e.informatik.uni-erlangen.de (Postfix, from userid 10463) id 79A474EBF10; Fri, 4 Nov 2022 09:02:24 +0100 (CET)
Date: Fri, 04 Nov 2022 09:02:24 +0100
From: Toerless Eckert <tte@cs.fau.de>
To: Dino Farinacci <farinacci@gmail.com>
Cc: "Gengxuesong (Geng Xuesong)" <gengxuesong@huawei.com>, Jeffrey Zhang <zzhang@juniper.net>, "Xiejingrong (Jingrong)" <xiejingrong=40huawei.com@dmarc.ietf.org>, BIER WG <bier@ietf.org>, "msr6@ietf.org" <msr6@ietf.org>, "mboned@ietf.org" <mboned@ietf.org>, "pim@ietf.org" <pim@ietf.org>
Message-ID: <Y2THEK1jDH7cGeyo@faui48e.informatik.uni-erlangen.de>
References: <03B2B681-FE16-4961-8932-1F3F29932837@gmail.com> <0d2e78fefe9e4cef87c52493b7fefc80@huawei.com> <BL0PR05MB56528FCEF7FDE262F633A24FD4329@BL0PR05MB5652.namprd05.prod.outlook.com> <C10FBD6A-E651-49BB-B2EC-0C04FC966C4A@gmail.com> <Y1/nUmnoYQhTn7OO@faui48e.informatik.uni-erlangen.de> <15F231E4-1D93-4531-AEA1-B4DC06F25A69@gmail.com> <c8fef4dfda8840d898b3bc01262ce97b@huawei.com> <A4F29DF0-147E-43A2-B8FF-E63A3D964FDC@gmail.com> <59db81efd80b475b976016dd19423eec@huawei.com> <D7874563-FE5F-405D-AF2C-003E1C9CD5FF@gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <D7874563-FE5F-405D-AF2C-003E1C9CD5FF@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/kj7Dqgt6ulwHArhHcJ7SYoe2B98>
Subject: Re: [MBONED] [Bier] [Msr6] MSR6 BOF 3rd Issue Category: More details are requested about the large scale use cases, including issue 8-11
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Nov 2022 08:02:32 -0000

On Thu, Nov 03, 2022 at 03:35:45PM -0700, Dino Farinacci wrote:
> > We have that with PIM and a boat load of hardware that supports RPF based forwarding (ditto for Bidir-PIM forwarding).
> > 
> > [Xuesong] Do you mean that RPF could bring more security through mechanism like " Source address verification"? 
> 
> I am saying that if you are going to require new hardware for a new forwarding plane, the problem you want to solve must be compelling. And I think existing methods DO work.

Indeed. But IPv4 multicast also did work for all customer
use cases and somehow they still wanted IPv6... and then MPLS.. 
BIER, BIER-TE, MSR6, ?RBS?, ... just normal customer driven
solution field evolution.

Especially the change of encapsulation header from rfc8296 to MSR6
should be painless for any router supporting BIER and SRv6 (unicast).
Would we ultimately also want MSR6 for networks not using SRv6,
such as IPv6 IoT network that may use no IPv6 source steering or
rfc6554 ? Absolutely. But those platforms would much more likely
adopt BIER bitstrings via an IPv6 MSR6 extension header, so i
think using the IPv6 extension header approach is also the right
way to proliferate the BIER model itself broader.

> >> But still, security consideration is necessary, maybe referring to the previous experience from BIER and SPRING.
> > The fact that an Internet host "does not ask for packets", means anyone can send it packets they don't want. 
> > With explicitly joined trees and IGMP, we default differently with IP multicast. A feature and not a bug.
> > [Xuesong] I think "host-initiated multicast" doesn't mean that the host could send the packet to any receiver it want. The 
> 
> I don't know what your reference to "host-initiated multicast" means. It sounds like it is something new you are referring to. But hosts have always sent multicast packets.

Technically, a PE-router being BFIR/BFER is of course also a host,
and if there are linux implementations, that too helps. But:
If we do not want to limit use of stateless multicast to very
specific software implementations such as router-VM software,
then we can easily learn from our experiences about how well
network features proliferated through all the variety of
host stack libraries.

Only IPv6 made it through all the important
programming language SDKs, including Java/Javastack and so many
more SDK. No other network protocol. And by being embedded
into IP, IP?IPv6 multicast could sneak into those host-stack/SDK/
programming languages too. Show me for example any support for
any of the 3G/4G multipoint services of mobile networks. At
some point in time i tried to hunt those down, but beside
one or two mobile network multicast demo services implemented
by the mobile operators, i think you won't find something. And
i think there was something like a faustian contract you had
to sign to get access to their SDK...

> > receiver of the multicast should be determined by the application layer (e.g., http request with the same content requirement) or a controller could gather the information about which receivers want the same content.
> 
> Yes and that happens today and hence signals the lower layer IGMP/MLD protocol to send a "join signal" on the network.

Btw: Even IEEE did introduce for TSN services new signaling protocols
that support the flexible/hybrid signaling. Aka: whatever the
app indicates through API can be passed either hop-by-hop
through the network, or redirected to an OOB controller for
further processing. In IETF we only did one-offs for this, such
as the overlaying of PIM signaling from egres PE to ingres PE,
but really nothing comprehensive that would more easily allow to
build multicast into networks more flexible. Even after 30 years for
example, we are still struggling with incremental/partial deployments,
not being able to esily automatically make PIM work across non-PIM
hops. In BIER (and MSR6, such incremental deployment is easy to use
fully automated.

Cheers
    Toerless

> Dino
> 

-- 
---
tte@cs.fau.de