[nvo3] Carrying entropy, was: draft-ietf-nvo3-encap-00 should add considerations of traversing NAPT

worley@ariadne.com (Dale R. Worley) Fri, 14 July 2017 01:34 UTC

Return-Path: <worley@alum.mit.edu>
X-Original-To: nvo3@ietfa.amsl.com
Delivered-To: nvo3@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BC151316F7 for <nvo3@ietfa.amsl.com>; Thu, 13 Jul 2017 18:34:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.934
X-Spam-Level:
X-Spam-Status: No, score=-1.934 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_SOFTFAIL=0.665] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uSz75--7ny4b for <nvo3@ietfa.amsl.com>; Thu, 13 Jul 2017 18:34:11 -0700 (PDT)
Received: from resqmta-ch2-10v.sys.comcast.net (resqmta-ch2-10v.sys.comcast.net [IPv6:2001:558:fe21:29:69:252:207:42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 618ED131690 for <nvo3@ietf.org>; Thu, 13 Jul 2017 18:34:11 -0700 (PDT)
Received: from resomta-ch2-13v.sys.comcast.net ([69.252.207.109]) by resqmta-ch2-10v.sys.comcast.net with ESMTP id VpUDd8L4dFHTdVpUgdbdCv; Fri, 14 Jul 2017 01:34:10 +0000
Received: from hobgoblin.ariadne.com ([IPv6:2601:192:4603:9471:222:fbff:fe91:d396]) by resomta-ch2-13v.sys.comcast.net with SMTP id VpUfdRQDWgBaEVpUfdbv3u; Fri, 14 Jul 2017 01:34:10 +0000
Received: from hobgoblin.ariadne.com (hobgoblin.ariadne.com [127.0.0.1]) by hobgoblin.ariadne.com (8.14.7/8.14.7) with ESMTP id v6E1Y8ZO032312 for <nvo3@ietf.org>; Thu, 13 Jul 2017 21:34:08 -0400
Received: (from worley@localhost) by hobgoblin.ariadne.com (8.14.7/8.14.7/Submit) id v6E1Y8qC032309; Thu, 13 Jul 2017 21:34:08 -0400
X-Authentication-Warning: hobgoblin.ariadne.com: worley set sender to worley@alum.mit.edu using -f
From: worley@ariadne.com
To: nvo3@ietf.org
In-Reply-To: <07212cff-8dbd-8ae9-3ca7-35244007ad6b@isi.edu> (touch@isi.edu)
Sender: worley@ariadne.com
Date: Thu, 13 Jul 2017 21:34:08 -0400
Message-ID: <874luf3ipb.fsf@hobgoblin.ariadne.com>
X-CMAE-Envelope: MS4wfAHNyMprQIRLiZUSU9pudHM6fysN4ImUOQpo1E1MUW99XG9vhw1lUgmHOwlQ+Ul6hFroE03qF4yk+mQTPHVCZcHtEnG194OIhJ4DNkBLsnSUd/BTr0ZA ml+rEz6mfUCrQc0zxB8Y8MrMw/xehhZHqUA0rkaMfJ9opa1CenslQleE
Archived-At: <https://mailarchive.ietf.org/arch/msg/nvo3/zt4v6mnlnIZeAxk2wHyOPrQPe8s>
Subject: [nvo3] Carrying entropy, was: draft-ietf-nvo3-encap-00 should add considerations of traversing NAPT
X-BeenThere: nvo3@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Network Virtualization Overlays \(NVO3\) Working Group" <nvo3.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nvo3>, <mailto:nvo3-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/nvo3/>
List-Post: <mailto:nvo3@ietf.org>
List-Help: <mailto:nvo3-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nvo3>, <mailto:nvo3-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jul 2017 01:34:12 -0000

Joe Touch <touch@isi.edu> writes:
> FWIW, why not just add the entropy in the IPv6 flow ID rather than
> expecting it at the transport layer? Intermediate network devices should
> be relying only on the flow ID for that entropy anyway.
>
> (and yes, that doesn't solve the problem for IPv4, but perhaps that's a
> good reason to encourage use of IPv6)

Given that we're talking about encapsulations, I see that Geneve has a
"Virtual Network Identifier" field that can be treated as part of the
entropy.  If it isn't needed to identifiy a virtual network, it can
loaded with entropy from the encapsulated packet.  In any case, packets
with different NVI values can be freely reordered.

And there is an 8-bit reserved field which could be defined to be
entropy.

These fields are at a fixed location relative to the containing headers,
so they're easy to find.

It might also be useful to define an option entirely for containing flow
identifiers or entropy -- the essential definition being that packet
routing is allowed to treat it as entropy, two packets with different
values for this field may be reordered freely.  And recommend that if
this option is used, it should be the first one, so routers could find
it easily if it is present.

Dale