Re: [Softwires] 4rd-U complement - e2e transparency to IPv4 TOS

Mark Townsley <mark@townsley.net> Tue, 18 October 2011 17:44 UTC

Return-Path: <mark@townsley.net>
X-Original-To: softwires@ietfa.amsl.com
Delivered-To: softwires@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C2A9C21F8C4B for <softwires@ietfa.amsl.com>; Tue, 18 Oct 2011 10:44:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.359
X-Spam-Level:
X-Spam-Status: No, score=-3.359 tagged_above=-999 required=5 tests=[AWL=-0.060, BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 12-c3g3rk1EW for <softwires@ietfa.amsl.com>; Tue, 18 Oct 2011 10:44:20 -0700 (PDT)
Received: from mail-wy0-f172.google.com (mail-wy0-f172.google.com [74.125.82.172]) by ietfa.amsl.com (Postfix) with ESMTP id 0156E21F8C49 for <softwires@ietf.org>; Tue, 18 Oct 2011 10:44:19 -0700 (PDT)
Received: by wyh22 with SMTP id 22so979789wyh.31 for <softwires@ietf.org>; Tue, 18 Oct 2011 10:44:18 -0700 (PDT)
Received: by 10.216.134.208 with SMTP id s58mr5740729wei.91.1318959858581; Tue, 18 Oct 2011 10:44:18 -0700 (PDT)
Received: from ams-townsley-8716.cisco.com (64-103-25-233.cisco.com. [64.103.25.233]) by mx.google.com with ESMTPS id fo7sm4825598wbb.20.2011.10.18.10.44.16 (version=TLSv1/SSLv3 cipher=OTHER); Tue, 18 Oct 2011 10:44:17 -0700 (PDT)
Mime-Version: 1.0 (Apple Message framework v1084)
Content-Type: text/plain; charset="iso-8859-1"
From: Mark Townsley <mark@townsley.net>
In-Reply-To: <DF8BF1B0-63DB-4F9B-BE96-4D214513C0DC@laposte.net>
Date: Tue, 18 Oct 2011 19:44:14 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <63DB920E-8768-47BD-8185-959C4165977B@townsley.net>
References: <85015B23-C124-43DB-913D-3829B895C2A9@laposte.net> <83A72484-7A54-4A30-AF9B-5FC9D97A9E14@gmail.com> <CAFUBMqWrw8e7sO80U74Q+UvJwW_sqxZZnnwTo7jhyayFBn5_Mg@mail.gmail.com> <6668E2F8-EEBA-4AF3-8110-2B0B43D3BC3E@gmail.com> <CAFUBMqVbZ7uTvHRpQDV1Y1eN9hJZ2tofzNvAM0hFHCrWZ_mA6g@mail.gmail.com> <596276A4-1C63-4A92-90FA-BC958DFB2053@gmail.com> <C7601B91-24ED-4C7F-A771-10F6AFE93F2F@laposte.net> <9D55CDB2-0DE1-441B-A622-22C3E2C66D4E@employees.org> <87BE3426-9B03-4D3E-AFBF-AB12923D2D84@laposte.net> <CAC8QAcd6TSnBkpE2+o0WS+QLdbEwRTO_NTgwqaN8ikWfmu2bpw@mail.gmail.com> <0A5AA31A-0A96-4D78-AC99-11FF58FDD217@laposte.net> <D2FC2906-23F3-4970-B35B-EECEBEBA1382@townsley.net> <49200DB8-5D14-46B7-A892-79262CFF6968@laposte.net> <C653042D-9AC3-4F2D-9F23-4061A1DD4377@townsley.net> <5F044EAF-A653-499B-86B1-993CA77D1071@laposte.net> <0B52D2A1-9938-48A8-A87C-27DE39405263@townsley.net> <DF8BF1B0-63DB-4F9B-BE96-4D214513C0DC@laposte.net>
To: Rémi Després <despres.remi@laposte.net>
X-Mailer: Apple Mail (2.1084)
Cc: Softwires WG <softwires@ietf.org>
Subject: Re: [Softwires] 4rd-U complement - e2e transparency to IPv4 TOS
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/softwires>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Oct 2011 17:44:20 -0000

On Oct 18, 2011, at 4:31 PM, Rémi Després wrote:

> 
> Le 18 oct. 2011 à 15:35, Mark Townsley a écrit :
>> On Oct 18, 2011, at 2:31 PM, Rémi Després wrote:
> ...
> 
>>> I do understand the inconvenience of having to adapt running codes based on encapsulation to a header mapping such as that of 4rd-U. 
>>> However, I have no doubt that this is technically easy.
>>> That's AFAIK the price to be paid to get a unique standard, with the nice bonus that existing IPv6-ACL tools, which weren't usable with encapsulation, become usable. 
> ...
> 
>> Bravo, your ingenuity has led you to something that lies perfectly in the middle of the two warring parties. The problem of course is that the solution has the full advantages of neither side,
> 
> It's not because a design has positive features of two other designs that it "lies in the middle".
> 
> Could you explain the important advantage of encapsulation that is missing in 4rd-U?

It's been specified and implemented for years, it is part of other softwires specifications, it is being implemented in CPE equipment today as part of ds-lite, it doesn't put payloads on the wire with mis-matching checksums.... Sure, tunneling doesn't play nice with some ACLs that only look at native IPv6, but at least this is a very well-understood attribute of tunneling that operators expect and in many cases are able to design around. FWIW, my crystal ball says that these limitations will will become less and less relevant if and when 4-in-6 operation becomes more and more prevalent, but that's just me.

Translation based on what's already defined in the behave WG is less conservative than simple encapsulation, but at least it is building on something that already exists, is well-specified and deployed, etc. We can expect to see IPv4 payloads with IPv6 headers on the network because of translators, but at least the checksums will be correct and there is a decent chance that a host will be able to digest the packet and get it to a working application after passing through one level of translation (or being redirected, subjected to DPI, etc). 

Again, no offense at all to the ingenuity of -U, but I simply have a hard time justifying that we need to cast a balance between these relatively well-known, specified, and implemented building-blocks with something new. 

If I believed for a microsecond that -U would wipe both encapsulation and translation from the planet so that we would have only one mechanism here, I would be more supportive. The problem is that the other two already exist in other closely related contexts such that there is no way that this doesn't become a 3rd method in the network without turning back time itself.

- Mark

> 
> 
> RD
> 
>