Re: [spring] RFC8200 update?

Sander Steffann <sander@steffann.nl> Fri, 28 February 2020 16:04 UTC

Return-Path: <sander@steffann.nl>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAFC43A1AE6; Fri, 28 Feb 2020 08:04:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=steffann.nl
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O_nA9e0m9Avg; Fri, 28 Feb 2020 08:04:27 -0800 (PST)
Received: from mail.sintact.nl (mail.sintact.nl [83.247.10.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 21C133A1B28; Fri, 28 Feb 2020 08:04:23 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mail.sintact.nl (Postfix) with ESMTP id 8970849; Fri, 28 Feb 2020 17:04:21 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=steffann.nl; h= x-mailer:references:in-reply-to:date:date:subject:subject :mime-version:content-type:content-type:message-id:from:from :received:received; s=mail; t=1582905859; bh=38mgndnxPmi0p1bkHh4 DFjWxdhMuR9ihDG3/N5hxpnk=; b=FxQXhy6ejILJlB1Zhrt7XS58bEpF5PqZC/Z 5DZThDH9Krh+i34P/ioB+e75MMVhfGZevWkOOnnHHMNQXvdErUYdgJjXndy+4TWG goaDPYFlkUgthYH7R58ITBl57XZNzAXeN+47Hb87n+opfgh4pNszeUfN8HJKo4VB 4kwEozbY=
X-Virus-Scanned: Debian amavisd-new at mail.sintact.nl
Received: from mail.sintact.nl ([127.0.0.1]) by localhost (mail.sintact.nl [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id iOOZhJwU7GHk; Fri, 28 Feb 2020 17:04:19 +0100 (CET)
Received: from [IPv6:2a02:a213:a300:ce80:d99f:7257:bc1b:f895] (unknown [IPv6:2a02:a213:a300:ce80:d99f:7257:bc1b:f895]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail.sintact.nl (Postfix) with ESMTPSA id 2FD533C; Fri, 28 Feb 2020 17:04:19 +0100 (CET)
X-Clacks-Overhead: GNU Terry Pratchett
From: Sander Steffann <sander@steffann.nl>
Message-Id: <305F6F9B-C3C5-493A-990C-DC94A5BE1065@steffann.nl>
Content-Type: multipart/signed; boundary="Apple-Mail=_344B6170-0FAD-478F-BF06-4A444D9B8BC0"; protocol="application/pgp-signature"; micalg="pgp-sha256"
Mime-Version: 1.0 (Mac OS X Mail 13.0 \(3594.4.19\))
Date: Fri, 28 Feb 2020 17:04:17 +0100
In-Reply-To: <CALx6S34SFkVqwCNL0-hYNMT6viV1_KYf7b=iNGFK3PPtPsdAKQ@mail.gmail.com>
Cc: SPRING WG List <spring@ietf.org>, 6man WG <ipv6@ietf.org>
To: Tom Herbert <tom@herbertland.com>
References: <D20C2322-8420-416A-90C4-6A2401825FBD@steffann.nl> <CALx6S34SFkVqwCNL0-hYNMT6viV1_KYf7b=iNGFK3PPtPsdAKQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3594.4.19)
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/7SCxUErj-sZ93ujiyB-KULY0-8Q>
Subject: Re: [spring] RFC8200 update?
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Feb 2020 16:04:37 -0000

Hi,

> Please take a look at draft-herbert-6man-eh-attrib-00, I think it is
> very much in line with what you're thinking.
> 
> The basic idea is that we create a new "Attribution" Hop-by-Hop
> option. The option serves two purposes:
> 
> 1) If the source host sets the option in a packet then it is giving
> permission to intermediate nodes to insert extensions headers (and
> Hop-by-Hop options which need to be handled specially). Presumably,
> when the source includes the option it is capable of dealing with ICMP
> errors with inserted extension headers.
> 2) The option indicates the extension headers (and Hop-by-Hop options)
> that have been inserted by intermediate nodes. So it's modified by
> intermediate nodes when insertion happens. The effect is that for any
> given packet at any time it is clear which data is attributed to the
> source node, and which is attributed to intermediate nodes.
> 
> The option would also allow intermediate nodes to remove inserted
> headers (ones attributed to intermediate nodes)

I haven't read the draft yet, but that sounds about right :)

> Receiver handling of inserted headers needs to be considered.
> 
> For making AH work, it would be straightforward simply not include any
> inserted headers in the computation, the necessary information to do
> that is in the HBH option. In this case, the option can't be ignored
> so second high order bit of option type would need to be set.
> 
> If AH isn't present, I believe the HBH option could safely be ignored
> if unknown at the receiver. Other than AH, I don't see any other cases
> where ignoring the HBH option and processing inserted options leads to
> incorrect behavior (if there are possible cases please point them
> out).

I think both variants would have to be defined, one with the high order bit set and one with it unset. When AH is used then the one with the high order bit set has to be used, in other cases the sender can choose what is most appropriate for them (probably the other one).

Sounds like a way forward! I think something like this HbH option would be required before SRv6 NP PSP can move forward.

Cheers,
Sander