Re: [spring] [IPv6] Fw: New Version Notification for draft-liu-6man-max-header-size-00.txt

liu.yao71@zte.com.cn Thu, 26 October 2023 09:23 UTC

Return-Path: <liu.yao71@zte.com.cn>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 847A5C1519B9; Thu, 26 Oct 2023 02:23:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7kXKm43Isjis; Thu, 26 Oct 2023 02:23:11 -0700 (PDT)
Received: from mxhk.zte.com.cn (mxhk.zte.com.cn [63.216.63.40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8DB2C151980; Thu, 26 Oct 2023 02:23:10 -0700 (PDT)
Received: from mxct.zte.com.cn (unknown [192.168.251.13]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxhk.zte.com.cn (FangMail) with ESMTPS id 4SGL1j669bz8XrRB; Thu, 26 Oct 2023 17:23:05 +0800 (CST)
Received: from mse-fl1.zte.com.cn (unknown [10.5.228.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxct.zte.com.cn (FangMail) with ESMTPS id 4SGL164s9nz4xVc0; Thu, 26 Oct 2023 17:22:34 +0800 (CST)
Received: from njy2app02.zte.com.cn ([10.40.13.116]) by mse-fl1.zte.com.cn with SMTP id 39Q9MLSg093450; Thu, 26 Oct 2023 17:22:21 +0800 (+08) (envelope-from liu.yao71@zte.com.cn)
Received: from mapi (njy2app01[null]) by mapi (Zmail) with MAPI id mid203; Thu, 26 Oct 2023 17:22:24 +0800 (CST)
Date: Thu, 26 Oct 2023 17:22:24 +0800
X-Zmail-TransId: 2af9653a2fd0ffffffffb07-9b535
X-Mailer: Zmail v1.0
Message-ID: <202310261722246146440@zte.com.cn>
In-Reply-To: <CALx6S36ihLKRmiCxWWD0ZXutaMcCg4Ngjg4-T7iMtHTs5B9wKw@mail.gmail.com>
References: CALx6S35tn1sZ-ZFvjT5cyA8_T9hxuNYSpS-pG8fV_R2JjpK7eQ@mail.gmail.com, 202310251559362199530@zte.com.cn, CALx6S36ihLKRmiCxWWD0ZXutaMcCg4Ngjg4-T7iMtHTs5B9wKw@mail.gmail.com
Mime-Version: 1.0
From: liu.yao71@zte.com.cn
To: tom@herbertland.com
Cc: ipv6@ietf.org, spring@ietf.org
Content-Type: multipart/mixed; boundary="=====_001_next====="
X-MAIL: mse-fl1.zte.com.cn 39Q9MLSg093450
X-Fangmail-Gw-Spam-Type: 0
X-Fangmail-Anti-Spam-Filtered: true
X-Fangmail-MID-QID: 653A2FF9.001/4SGL1j669bz8XrRB
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/M-y8mJMhwtlxbD9AQkMdaGC_ESg>
Subject: Re: [spring] [IPv6] Fw: New Version Notification for draft-liu-6man-max-header-size-00.txt
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Oct 2023 09:23:12 -0000

with Yao2>>

Original


From: TomHerbert <tom@herbertland.com>
To: 刘尧00165286;
Cc: ipv6@ietf.org <ipv6@ietf.org>;spring@ietf.org <spring@ietf.org>;
Date: 2023年10月25日 23:15
Subject: Re: [IPv6] Fw: New Version Notification for draft-liu-6man-max-header-size-00.txt

> 
> Hi Yao,
> 
> I've been thinking about how to generalize the ideas in the draft. Do
> you think it would be feasible to add capability TLVs to various
> routing protocols for all the limits described
> draft-ietf-6man-eh-limits (Max aggregate hdr, max DO and HBH opts EH
> length, max number of HBH or Destopt options, etc.)? I would be
> especially interested to have Maximum HBH Options header length in
> BGP; that would work really well with
> draft-herbert-eh-inflight-removal as a means to extend the limit
> domain wrt reachability for packets with HBH options. I also think the
> 
> other limits would have value to be advertised as well.
> 
> 
> Yao>> Signaling works in some scenarios, but it doesn't fits all the cases like you mentioned in the previous mails.
> 
> For a sending node, even it gets all the extension header capabilities by routing protocols, it can't make sure that the packet it sends would be received by the DST node, because it may not be aware of which nodes the packet would be transmitted through, especially for HBH. For example, the source node sends a packet with certain DA and the HBH header encapsulated, but the the source node doesn't know the all intermediate nodes and which nodes need to process the HBH, so getting Maximum HBH Options header length can't help.
 
Yao,
 
I don't see how that's particularly different from the use case
described in the draft. If we receive a route to some destination that
says some maximum header is supported then that would seem to imply
that if we send a packet to the destination all the nodes in the path
to the destination will be able to process the larger header. As
mentioned previously, the need for a maximum header length isn't
unique to segment routing. If even just one intermediate node between
segment endpoints enforces a limit less than what's advertised and
drops packets because the header length is too long, then that breaks
the whole path in segment routing.

Yao2>>The original way we want to do with IGP signaling is to signal this extension header limit as an attribute of the node/link just like what IGP-MSD is signaled. 
In IGP for the none SR/SR-BE/SR explicit path, when a node calculate a route to a certain destination, it knows (from its aspect, although may be not so accurate) which nodes are on the path, and with the extension header limit received from each node/link, it's aware of the minimum limit of the path to the destination. 
But for the HBH header limit of the SR path with intermediate nodes, the headend may not be able to know the limit, since it may only see the route to the next SID and can't see all the intermediate nodes. In this case, maybe an controller is needed.  
Is your intent about extensions in IGP the same as above, or you want the extension header limits signaled with the prefix reachability info? If it's the latter case, it may works for BGP, but in IGP, I don't know how to make the advertising route to include the limits for each node on the path to the destination, or advertising with the minimum limit, usually IGP wouldn't modify the information of the destination during advertising as for my understanding. 


> 
> But for a direct connected upstream neighbor node, knowing the extension header limits of its downstream neighbor may help its decisions on extension header-related option. And the situation is better for DOH since we know which nodes would process it.
 
Right, and so the extension header limits of connected neighbors would
be an attribute of the link. That information could be advertised in
the routing protocol and then propagated as link state information
throughout the whole table. This way an advertised route would include
the limits for each node on the path to the destination (probably
would roll up to be the minimum limit of a node in the path). We can
do the same thing for path MTU as well.

Yao2>> For path mtu/link mtu, there're some related works, such as draft-hu-lsr-igp-link-mtu. In the draft, similarly, the link mtu is advertised as an link attribute, either the IGP calculates the Path MTU of per destination address, i.e, records the minimum link MTU of all the links in the IGP SPF path as the Min Link MTU, or the controller collects the IGP link mtu via BGP-LS for path computing. 



> 
> So the signaling proposal has to be related with specific scenario or requirements as for my understanding.
> 
> As for draft-herbert-eh-inflight-removal, I suppose that the requirement for BGP extension for Maximum HBH Options header length comes from removing extension headers by the egress router scenario in section 2.3.1. The egress node gets the HBH header size limit of the BGP peer and if the limit is exceeded, the egress node would remove the HBH, not sure if my understanding is right. But I think as long as the requirement is worthy and clear, we can try it.
 
At an egress router we want to determine if the peer AS were sending
into support extension headers or is going to drop packets with them.
If we don't have any information like in a BGP route then the default
would be to remove the HBH options header. If the BGP route says they
are supported then we can forward the packets unchanged.

Yao2>> I think it's a clear usecase and requirement. 


Tom
 
> 
> 
> Tom
> 
>