Re: [spring] Spirit and Letter of the Law (was: Question about SRv6 Insert function)

Tom Herbert <tom@herbertland.com> Thu, 05 September 2019 19:42 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 454D3120B31 for <spring@ietfa.amsl.com>; Thu, 5 Sep 2019 12:42:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LMB7HNQqnXpD for <spring@ietfa.amsl.com>; Thu, 5 Sep 2019 12:42:43 -0700 (PDT)
Received: from mail-ed1-x541.google.com (mail-ed1-x541.google.com [IPv6:2a00:1450:4864:20::541]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E4EB120B2D for <spring@ietf.org>; Thu, 5 Sep 2019 12:42:43 -0700 (PDT)
Received: by mail-ed1-x541.google.com with SMTP id c19so3880637edy.10 for <spring@ietf.org>; Thu, 05 Sep 2019 12:42:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=ZT1W6XNjodsQAd0T3bDs8PZ2fELayH1nxDzx2hBlTJE=; b=1tTYUAPOno0hLE9E9cw++tUynbXNvQDKtgs7kJA1aPxwHtTNQqcyxnrziOy8afsY2y G9PTuXzgiUkO8WvGqudfQwyLl9cJV85bUiHgZ3lcfWp744v6SmKhR7CzherexNwUP6no W8rOuSWHzi8n+hMojL9dE8+kANRnPTTAvYvUNOvTHUkVoEXJu5GYyIl6LfG+3SKng9RS 15eyiJT0pQHcdpkt6XaJDtf2qbxA4y4lkH0aL/U7mt4U/kltmYcfqcV6pJOi9Zp9CWSy QrCOEntrkbesohhphI52696A88jJ/IWMFOFeWKRI5alnrKLB0pjR8BOA8bxSyJMyrfol K+kA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=ZT1W6XNjodsQAd0T3bDs8PZ2fELayH1nxDzx2hBlTJE=; b=Ep8reyM/1Kfl1Ynay8/kCiH0dhgaPA7kXX0/2g81OUn5rrxIbkH6tntjhU6M5sDxOp EoTZlSVQBOscXzM5ctnoqme5uEgd+PMSChovloQWn0FRSSqPQDS1u+/LNvGYvL3nuCRF nPCz7PyhqCQVV/KXfsP5ZV8ecOxCFjGXCD6HNFqhMLiop0qPNLIsAqUoowja5rpiJvdd 3992haB6fKRKfogwTpyWePY7bxJVDUANmG7ks/LRZd2fEFsF/mFYbLpNIn3aBsY1gQ3z 0tQO7pyN7o0D+5XBSS3fQv3DgXTw160oX7F1qMEAqziKGO7UpIgmytB5nZV8jI2r4EDt hRWg==
X-Gm-Message-State: APjAAAU0/r3hTpxq+fsthdBUIf2Bo2AYwXNkxi5S4z1qhcj4RVPuBxnr Zm3QSmqyhql8U/zyYx8tHzenedBmpGzqMuki9mB6hg==
X-Google-Smtp-Source: APXvYqzVdpE1obpsbYV2OSB9MKdopgH67jmorrhkk1e+iwyXjLCt97tAhXqhDbAYBcM832xlwb8a6+QznX3LkiVGxfA=
X-Received: by 2002:a17:907:2102:: with SMTP id qn2mr4369850ejb.266.1567712561495; Thu, 05 Sep 2019 12:42:41 -0700 (PDT)
MIME-Version: 1.0
References: <BYAPR05MB54637FEAE1518F83977D274FAEB80@BYAPR05MB5463.namprd05.prod.outlook.com> <538732E2-915B-4952-A439-F4678FCC21B2@employees.org> <4c6b2456-db05-0771-5b98-bfd9f07b220b@si6networks.com> <34AB9F0F-614B-45C2-BD84-7DD53A1D5188@employees.org> <ea9557e5-9025-db78-8862-18454dd549c3@joelhalpern.com> <5200FFA0-E2F1-4491-8D06-0DC6BF87F77A@employees.org> <cdc190f4-315f-f716-951c-6d4ba1f4888d@si6networks.com> <CA+b+ERn6KMGCboERKOMeKAwM3y=1p=sc8j2LnEGYa7h5mz_xxw@mail.gmail.com> <BYAPR05MB5463F429E6AA307D0F313B9AAEBB0@BYAPR05MB5463.namprd05.prod.outlook.com> <CAOj+MMGH25AoQ6hvoKa4jVonPcauD6xY2pgwnZFtwvF559V+vQ@mail.gmail.com> <CALx6S35WeoZs=cOmP0CA0K2Wj_Oc1H_YZr+Ky1W=UL=nF1x4rg@mail.gmail.com> <CA+b+ERmbEZ7WU8puMcuM6nBhP7rZs2ZiX104Ok5BKqpGaZLjQA@mail.gmail.com>
In-Reply-To: <CA+b+ERmbEZ7WU8puMcuM6nBhP7rZs2ZiX104Ok5BKqpGaZLjQA@mail.gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Thu, 05 Sep 2019 12:42:29 -0700
Message-ID: <CALx6S35VHrjSOKT-zBB4pEBS0+mSJG09U4ODMosu4GVVNvAfGQ@mail.gmail.com>
To: Robert Raszuk <rraszuk@gmail.com>
Cc: Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>, Fernando Gont <fgont@si6networks.com>, "spring@ietf.org" <spring@ietf.org>, "6man@ietf.org" <6man@ietf.org>, Suresh Krishnan <suresh.krishnan@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/9Ct2OQ7SdNx0-LLTWgYAAuDHVko>
Subject: Re: [spring] Spirit and Letter of the Law (was: Question about SRv6 Insert function)
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Sep 2019 19:42:46 -0000

On Thu, Sep 5, 2019 at 12:20 PM Robert Raszuk <rraszuk@gmail.com> wrote:
>
> Hi Tom,
>
>>
>> insertion. For instance, I'd invite you do the thought experiment
>> about what happens when an intermediate node inserts a header that
>> causes the packet to exceed the MTU of some downstream forwarding
>> node.
>
>
> Absolutely.
>
> But SRH is meaningful only within a given domain.
>
Robert,

I don't see how that's relevant. The fact that a protocol is
_intended_ to be used only in a controlled domain is hardly a
substitute for doing the work to make the protocol robust. I don't
subscribe to the idea that just because a protocol runs in a limited
domain all of the problems magically go away.

> At least I would worry much less about MTU being exceeded when you insert EH as compared when you encapsulate with complete new header including EH, DO etc ... which somehow everyone seems to be happy about. I am not seeing much logic here.
>
Because, when a node encapsulates a packet it places _its_ address in
the source address field. This provides the necessary attribution. So
when the encapsulated packet causes issues it is clear who the culprit
is-- they receive the ICMP error or when the packet is error is logged
it's clear who created it. Attribution is critical to correct network
operation.

> Moreover if you look at telco transport today a lot of "circuits" are emulated circuits which use encap in the middle of the transports which in turn runs over their IP networks. How do you deal with such cases when one day it works and when telco underly reroutes such that it goes via bottleneck it does not ?
>
That's a deployment problem, not a protocol problem. That should be
taken up in IPv6 ops WG I would think.

> I am seeing this daily. We even wrote IETF drafts to detect this. Now the BFD draft stuffing is a third attempt to have a tool to detect it. If IPv6 works end to end, hosts to hosts such MTU bottleneck should be part of the IPv6 transport.
>
>> There is no robust protocol mechanism to deal with this.
>
>
> That's a problem much bigger then SR. See when I am building transport over third parties I use SLA probes which periodically validates not only SLA data but also end to end max MTU. When I see an issue I choose automatically different underlay path such that end applications do not notice the issue.

Right, anytime an intermediate node materially changes a packet
outside of the standard protocol or increases the size of packet they
are risking end to end robustness and reliability. That's why RFC8200
precludes EH insertion, and why other similar proposals to make
non-standard modifications to packets in flight will be met with
resistance in IETF.

Tom

> Many thx,
> R.
>
>>