Re: [spring] Beyond SRv6.

Tarek Saad <tsaad.net@gmail.com> Tue, 03 September 2019 16:52 UTC

Return-Path: <tsaad.net@gmail.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3136C12013A; Tue, 3 Sep 2019 09:52:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0rVxwagWU40C; Tue, 3 Sep 2019 09:52:38 -0700 (PDT)
Received: from mail-io1-xd2d.google.com (mail-io1-xd2d.google.com [IPv6:2607:f8b0:4864:20::d2d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A6DC4120801; Tue, 3 Sep 2019 09:52:38 -0700 (PDT)
Received: by mail-io1-xd2d.google.com with SMTP id s21so37550583ioa.1; Tue, 03 Sep 2019 09:52:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:thread-topic:thread-index:date:message-id :references:in-reply-to:accept-language:content-language :mime-version; bh=Wd+gNr4mi/eXjP+NV++KEcKAKtsXH1t9A+ybyVpH+6w=; b=HkC/nDLGTgaIkBZyPNcwrbPNYVZEFNXqRtYAWCrPwYXGYIJ1bGrd5+Aw6psq7wp02R x0E05sTV0lXSi/mfHbIBpuJJ93I/ApGMUUJOLWJ4koTBIXF1Y1wPyH+Jr4yWlS7q4dso 4NhjSMAnraAULjPOfZ4ndAw0yP+sJHEM2+6qD9YIKy9e2DTMOMC4BmBAysfETDXQ/F+0 bW9oE4bzGtwktSLDGOWnGAndtvfNogmUJxWzvWrf0Pc9fE8FVS1TJo7qlXzlvDHYvQ/A CXEdwGcfTZdVtB/yQsLstVZ+t1WwA6YGbOmTwJadZKglG/AvVQSxptZGVPqXjya0lYMc G2FA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:thread-topic:thread-index:date :message-id:references:in-reply-to:accept-language:content-language :mime-version; bh=Wd+gNr4mi/eXjP+NV++KEcKAKtsXH1t9A+ybyVpH+6w=; b=YOtTQEfFUyxzB3NRdLYiMpszoWpILSW/mqFSLkryTeV6eJB4Zra2ZrMpIMeE9LkwOh UCB7XooxqK85DVO38JDicNUY+S1VDDm/mSDoj/PgpDyFHWtj0ZZw6HK/N9iUSk2bK0WT 33bip38n/+K2hTcaG+NUDy4SdBbEHPbDZGxI7v21MxMu/XkCJ87SJkgmgKagUQPt8O4V S7lk6HeG29jYRpJP1eGkTwdW3amRnELX1FPqcEc/Q7lFgnssJCObCs0ZBCVQzB76KmrE 05+pCBO2i3I4wIccoPnJF/7577ihgPXMd1Xmlp0IFw2wpRRUNAhe2BRnWCQ6PLFU0xjE sfWg==
X-Gm-Message-State: APjAAAV3xWVjFItvRmlSgvX2esJ5cI10iCwNbbFs/KZzswRvM3+iaFML 0krI7t78DstMS6VOv6augJs=
X-Google-Smtp-Source: APXvYqzQrMuRdKH8h/rRq3Ch561hvA0UVJbnWZl3a2hvs6GyYgN8aAnvPaHv6K8e9AUTxfGzJel+iA==
X-Received: by 2002:a05:6638:2aa:: with SMTP id d10mr37029147jaq.89.1567529557516; Tue, 03 Sep 2019 09:52:37 -0700 (PDT)
Received: from BYAPR19MB3415.namprd19.prod.outlook.com ([2603:1036:307:293b::5]) by smtp.gmail.com with ESMTPSA id c10sm1608216iot.14.2019.09.03.09.52.36 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 03 Sep 2019 09:52:36 -0700 (PDT)
From: Tarek Saad <tsaad.net@gmail.com>
To: Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>, Rob Shakir <robjs=40google.com@dmarc.ietf.org>, SPRING WG List <spring@ietf.org>, "6man@ietf.org" <6man@ietf.org>
Thread-Topic: [spring] Beyond SRv6.
Thread-Index: AWdMX3cxQNL7wwBEVBte2RBjbuftzDBGQjk12qn+9p4=
X-MS-Exchange-MessageSentRepresentingType: 1
Date: Tue, 03 Sep 2019 16:52:33 +0000
Message-ID: <BYAPR19MB3415D21403394F8129A4BAD8FCB90@BYAPR19MB3415.namprd19.prod.outlook.com>
References: <CAHd-QWtA21+2Sm616Fnw0D-eB7SNb_BeG8-A-MCLLFgTwSpOsg@mail.gmail.com> <BYAPR05MB54632F09C712ADB30138CFA9AEBE0@BYAPR05MB5463.namprd05.prod.outlook.com>
In-Reply-To: <BYAPR05MB54632F09C712ADB30138CFA9AEBE0@BYAPR05MB5463.namprd05.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-Exchange-Organization-SCL: -1
X-MS-TNEF-Correlator:
X-MS-Exchange-Organization-RecordReviewCfmType: 0
Content-Type: multipart/alternative; boundary="_000_BYAPR19MB3415D21403394F8129A4BAD8FCB90BYAPR19MB3415namp_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/yoNsEWnOJ4Es8Co2HMcmrn9NoHw>
Subject: Re: [spring] Beyond SRv6.
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Sep 2019 16:52:43 -0000

Hi WG,

RFC8200 (section 4.4) defines the Routing Header as merely means to steer packets across topological elements. My understanding of the SRv6+’s proposal is that it strictly adheres to this and leaves any service or function instructions to be carried in other parts of IPv6 header. This (among other advantages) provides a clean delineation of the different layers of the network (underlay transport from overlay/services) and allows for possibility of different overlay technologies to be seamlessly carried over SRv6+.

This is in contrast to exposing overlays to a specific underlay technology and forcing it to understand and encode the required bits of information it requires within it. Feel free to correct me if I got it wrong.

Regards,
Tarek


From: spring <spring-bounces@ietf.org> on behalf of Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>
Date: Monday, September 2, 2019 at 9:23 AM
To: Rob Shakir <robjs=40google.com@dmarc.ietf.org>, SPRING WG List <spring@ietf.org>, "6man@ietf.org" <6man@ietf.org>
Subject: Re: [spring] Beyond SRv6.

Rob,

There may be an elephant in the room that needs addressing….

Over the years, the IPv6 community has specified a very tight architecture that encodes some information in IPv6 addresses, other information in Routing headers, and still other information in Destination Options headers. SRv6+ adheres strictly to this architecture. Because it reuses IPv6 machinery, its specification promises it be painless and its deployment promises to be safe. To date, there has been no significant technical criticism of SRv6+. Only a claim that SRv6 is nearly complete and good enough. (Both of those claims may require scrutiny).

By contrast, SRv6 varies from the spirit, if not the letter of the IPv6 architecture. It encodes things in IPv6 address that have never been encoded in IPv6 addresses before. It attempts to encode everything else in the Routing header, as if the other IPv6 extension headers didn’t exist. It frequently tests the limits of RFC 8200 compliance.

This creates a situation in which each variance from IPv6 orthodoxy requires another. For example, because SRv6 encodes instructions in IPv6 addresses, draft-ali-6man-spring-srv6-oam is required. And now, draft-ali-6man-spring-srv6-oam creates its own variances from the IPv6 orthodoxy. OAM information is encoded in the Routing header and the Routing header must be examined, even when Segment Left is equal to zero.

I invite everyone to consider how TI-LFA an uSID will interact.

So, why would the IETF would want to prevent work on the more conservative, SRv6+ approach?  This brings us to the back to the elephant in the room…..

Until very recently, relatively few router vendors have supported IPv6 extension headers in ASICs. If an IPv6 packet contained any extension headers at all, it was sent to the slow path.

SRv6+ encourages router vendors to support both the Routing and Destination Options header in ASICs. This sets vendors on a path on a path towards more complete implementation of the architecture that the IPv6 community has developed so carefully over the years. It encourages vendors to commit more and more of RFC 8200 to ASICs.

SRv6 encourages router vendors to support the Routing header in ASICs, while doing everything possible to mitigate the need to support Destination Options in ASICs. This may be a necessary expedient for many platforms. However, it should not be the only approach, or even the long-term approach for the IETF.

                                                                                                                                   Ron




From: spring <spring-bounces@ietf.org> On Behalf Of Rob Shakir
Sent: Sunday, August 4, 2019 5:04 PM
To: SPRING WG List <spring@ietf.org>
Subject: [spring] Beyond SRv6.


Hi SPRING WG,


Over the last 5+ years, the IETF has developed Source Packet Routing in NetworkinG (SPRING) aka Segment Routing for both the MPLS (SR-MPLS) and IPv6 (SRv6) data planes. SR-MPLS may also be transported over IP in UDP or GRE.


These encapsulations are past WG last call (in IESG or RFC Editor).


During the SPRING WG meeting at IETF 105, two presentations were related to the reduction of the size of the SID for IPv6 dataplane:
·         SRv6+ / CRH -- https://tools.ietf.org/html/draft-bonica-spring-srv6-plus-04<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dbonica-2Dspring-2Dsrv6-2Dplus-2D04&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=ackZC9evRf_LWYu2a-1NaGRDJKdxnE2ieIC4dD_FL6s&s=KUhAfjVsx_wK645uJk0FHzs2vxiAVr-CskMPAaEhEQQ&e=>
·         uSID -- https://tools.ietf.org/html/draft-filsfils-spring-net-pgm-extension-srv6-usid-01<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dfilsfils-2Dspring-2Dnet-2Dpgm-2Dextension-2Dsrv6-2Dusid-2D01&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=ackZC9evRf_LWYu2a-1NaGRDJKdxnE2ieIC4dD_FL6s&s=Aq1DK7fu73axZ1PXLIE8xnHE2AhTtNZy9LTHgWqx4CQ&e=>


During the IETF week, two additional drafts have been proposed:
·         https://tools.ietf.org/html/draft-li-spring-compressed-srv6-np-00<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dli-2Dspring-2Dcompressed-2Dsrv6-2Dnp-2D00&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=ackZC9evRf_LWYu2a-1NaGRDJKdxnE2ieIC4dD_FL6s&s=XWUDAD2FMhWLfeT5sgUb1lgthJhugcyT98GJ2N-CrKs&e=>
·         https://tools.ietf.org/html/draft-mirsky-6man-unified-id-sr-03<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dmirsky-2D6man-2Dunified-2Did-2Dsr-2D03&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Fch9FQ82sir-BoLx84hKuKwl-AWF2EfpHcAwrDThKP8&m=ackZC9evRf_LWYu2a-1NaGRDJKdxnE2ieIC4dD_FL6s&s=gcbkHYxXm7FU7vblOB1vI58SDaaWf62pa7YvLmsP4nI&e=>


As we expressed during the meeting, it is important for the WG to understand what the aims of additional encapsulations are. Thus, we think it is important that the WG should first get to a common understanding on the requirements for a new IPv6 data plane with a smaller SID - both from the perspective of operators that are looking to deploy these technologies, and from that of the software/hardware implementation.


Therefore, we would like to solicit network operators interested in SR over the IPv6 data plane to briefly introduce their:
·         use case (e.g. Fast Reroute, explicit routing/TE)
·         forwarding performance and scaling requirements
o    e.g., (number of nodes, network diameter, number of SID required in max and average). For the latter, if possible using both SRv6 128-bit SIDs and shorter (e.g. 32-bit) SIDs as the number would typically be different (*).
·         if the existing SRv6 approach is not deployable in their circumstances, details of the requirement of a different solution is required and whether this solution is needed for the short term only or for the long term.


As well as deployment limitations, we would like the SPRING community to briefly describe the platform limitations that they are seeing which limit the deployment of SRv6  In particular limitations related to the number of SIDs which can be pushed and forwarded and how much the use of shorter SIDs would improve the deployments .


For both of these sets of feedback if possible, please post this to the SPRING WG. If the information cannot be shared publicly, please send it directly to the chairs & AD (Martin).


This call for information will run for four weeks, up to 2019/09/03. As a reminder, you can reach the SPRING chairs via spring-chairs@ietf.org<mailto:spring-chairs@ietf.org> and ADs via spring-ads@ietf.org<mailto:spring-ads@ietf.org>.


Thank you,

-- Rob & Bruno


(*) As expressed on the mailing list, a 128 bit SID can encode two instructions a node SID and an adjacency SID hence less SID may be required.



Juniper Business Use Only