Re: [spring] 6MAN WGLC: draft-ietf-6man-sids

Brian E Carpenter <brian.e.carpenter@gmail.com> Sat, 08 October 2022 19:51 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE02DC14CF0D; Sat, 8 Oct 2022 12:51:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C0bD0X8QbO2M; Sat, 8 Oct 2022 12:51:30 -0700 (PDT)
Received: from mail-pl1-x629.google.com (mail-pl1-x629.google.com [IPv6:2607:f8b0:4864:20::629]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F344C14F72C; Sat, 8 Oct 2022 12:51:30 -0700 (PDT)
Received: by mail-pl1-x629.google.com with SMTP id c24so7279566plo.3; Sat, 08 Oct 2022 12:51:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=JabuOdSG85eMeoCb6RtNn/ePPn22jHNn3J7RlzrXmoU=; b=ndQ99kJ7bpWhF6XDkS3jx8ofblhCmsGDDDTv+eLL78npNv2bS03vlMOJU/V8KO5xgs TG3IF5TQ6rMEz7MfjFztSx5/MAA72kUdmzYqSVXRcxv3iIclPoGXV6H3yBHmonvqCluS PCxPiuM7/VyCq4MWAWhvoyfBbWEEX/Ns4adNSaO0gvPss5oAqaA5KnnlobEZJtIxtQmO rIU1Va/lG5KvKrr+Y/WkkyLFXcoSaLrBtxMDUpVgRDYbuz9QZxP1aNJOJRqP27dVchNJ 1w8pt0RSH0I9iAIfGeqIvWlHvSnRJj5rkZyVSJd5eNUtSTxUjhx36c/SO1tqIPDQ64Pf kczA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=JabuOdSG85eMeoCb6RtNn/ePPn22jHNn3J7RlzrXmoU=; b=RkVitfbKtO+aolBuJQjjvjeIge8JNcpmX6Mx3/3LpKWtYH8b87VgCnALjz98VRC/cH ovtdlqLfK0PlG53ZSrVbKbZLIfhbzXXHc7RFNcg04sYBxWTUq8PE9cQOEG3dZetvPEuP PZoTuucT+Nrcxbl1tiOx+BKQcXal3T4SlxGabioPAvf6y51jDA+O7rfANy7gLxoGKRUa lKMAujQ4JmMXoKLcjZoxqxR42QaXBw0G6rMGkrppf7kvGX0Sm2t9mPWYRiBCa/TZRNgm bnmBbPq/ba0hTy0VjXJNsBHOinyZ8g3N3xTk/Fu0lNgeDZWYO/LhfI/tEeoDp9IA8Ejw hbhg==
X-Gm-Message-State: ACrzQf2pYfCwODARWX+XwWOOO+RKZdeJhcBTu2sQ2dZzRt9TuZi1sC1P OZLc5HF1bAlar3og0qmghzlIiAKJC0sQ1w==
X-Google-Smtp-Source: AMsMyM75zHrTEr1QKSAlMJbKtMtLQBTlvTRY0VB2YW5/sXD1gD58rIOtUbfWuGiETuvqToFvWqYG8w==
X-Received: by 2002:a17:902:ec84:b0:180:e609:d3f with SMTP id x4-20020a170902ec8400b00180e6090d3fmr4603582plg.96.1665258689569; Sat, 08 Oct 2022 12:51:29 -0700 (PDT)
Received: from ?IPV6:2406:e003:1124:9301:80b2:5c79:2266:e431? ([2406:e003:1124:9301:80b2:5c79:2266:e431]) by smtp.gmail.com with ESMTPSA id z3-20020a17090a170300b00203ab277966sm6508319pjd.7.2022.10.08.12.51.26 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 08 Oct 2022 12:51:28 -0700 (PDT)
Message-ID: <1fe2d387-8ecc-5240-092c-84a5978af5e4@gmail.com>
Date: Sun, 09 Oct 2022 08:51:24 +1300
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.10.0
Content-Language: en-US
To: Robert Raszuk <robert@raszuk.net>, Joel Halpern <jmh@joelhalpern.com>
Cc: Suresh Krishnan <suresh.krishnan@gmail.com>, 6man <ipv6@ietf.org>, SPRING WG List <spring@ietf.org>
References: <CAFU7BARixwPZTrNQOuEw3WP-FqUsVwTj7btMTahcMbXm_NqWGw@mail.gmail.com> <CAB75xn4+N31=ggO03AAQJANv7RgHaC1eNGXRUQ9B20rLK+nJyg@mail.gmail.com> <E77D8982-11E9-45F9-81BF-3CA1E1F6B745@gmail.com> <CAB75xn4Zme4KOjPuY1_-4jCKTk1jshbq8X645zXhYQLiKB+N9g@mail.gmail.com> <54A38015-95AD-41F0-8E9D-76B3E62AA55B@gmail.com> <bdd7bf12-f712-3fe5-2698-9272c16ddded@joelhalpern.com> <58E77509-A1A1-4CE8-9EE4-22BEEEA8B62E@gmail.com> <98a941e4-0fff-ced1-d4ca-4406368eac31@joelhalpern.com> <4DC495DF-AD6B-4D60-80C4-B836DD365A0C@gmail.com> <CAOj+MMEx7+jWN1yC=81dMwo5GmqbhyHqOZr9W2_qzN9BNjs+Zw@mail.gmail.com> <ab55e9c0-60b9-2986-07f1-38c28852009e@joelhalpern.com> <CAOj+MMEn6Dz-Rz0PRRvR8VXT8idAQm+rLuouWJoNz-dA+kRkJQ@mail.gmail.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
In-Reply-To: <CAOj+MMEn6Dz-Rz0PRRvR8VXT8idAQm+rLuouWJoNz-dA+kRkJQ@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: base64
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/UANngqbRIRdauzF6cQG6ihvJfNM>
Subject: Re: [spring] 6MAN WGLC: draft-ietf-6man-sids
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 08 Oct 2022 19:51:34 -0000

Robert,

> If there is any spec which mandates that someone will drop my IPv6 packets only because they contain SRH in the IPv6 header I consider this an evil and unjustified action. 

The Internet is more or less opaque to most extension headers, especially to recently defined ones, so I don't hold out much hope for SRH outside SR domains.

https://www.rfc-editor.org/rfc/rfc9098.html
https://datatracker.ietf.org/doc/html/draft-elkins-v6ops-eh-deepdive-fw

Regards
    Brian Carpenter

On 09-Oct-22 07:52, Robert Raszuk wrote:
> Hi Joel,
> 
> I was hoping this is apparent so let me restate that I do not buy into "limited domain" business for SRv6.
> 
> I have N sites connected over v6 Internet. I want to send IPv6 packets between my "distributed globally limited domain" without yet one more encap.
> 
> If there is any spec which mandates that someone will drop my IPv6 packets only because they contain SRH in the IPv6 header I consider this an evil and unjustified action.
> 
> Kind regards,
> Robert
> 
> On Sat, Oct 8, 2022 at 7:40 PM Joel Halpern <jmh@joelhalpern.com <mailto:jmh@joelhalpern.com>> wrote:
> 
>     Robert, I am having trouble understanding your email.
> 
>     1) A Domain would only filter the allocated SIDs plus what it chooses to use for SRv6.
> 
>     2) Whatever it a domain filters should be irrelevant to any other domain, since by definition SRv6 is for use only within a limited domain.  So as far as I can see there is no way a domain can apply incorrect filtering.
> 
>     Yours,
> 
>     Joel
> 
>     On 10/8/2022 3:16 AM, Robert Raszuk wrote:
>>     Hi Suresh,
>>
>>         NEW:
>>         In case the deployments do not use this allocated prefix additional care needs to be exercised at network ingress and egress points so that SRv6 packets do not leak out of SR domains and they do not accidentally enter SR unaware domains.
>>
>>
>>     IMO this is too broad. I would say that such ingress filtering could/should happen only if dst or locator is within locally  configured/allocated prefixes. Otherwise it is pure IPv6 transit and I see no harm not to allow it.
>>
>>         Similarly as stated in Section 5.1 of RFC8754 packets entering an SR domain from the outside need to be configured to filter out the selected prefix if it is different from the prefix allocated here.
>>
>>
>>     Again the way I read it this kills pure IPv6 transit for SRv6 packets. Why ?
>>
>>     (Well I know the answer to "why" from our endless discussions about SRv6 itself and network programming however I still see no need to mandate in any spec to treat SRv6 packets as unwanted/forbidden for pure IPv6 transit.)
>>
>>     Thx,
>>     R.
> 
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------