Re: [spring] “SRV6+” complexity in forwarding

Robert Raszuk <robert@raszuk.net> Fri, 20 September 2019 08:45 UTC

Return-Path: <robert@raszuk.net>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C47A1200E6 for <spring@ietfa.amsl.com>; Fri, 20 Sep 2019 01:45:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=raszuk.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hne2zVMSMZ28 for <spring@ietfa.amsl.com>; Fri, 20 Sep 2019 01:45:09 -0700 (PDT)
Received: from mail-qk1-x72a.google.com (mail-qk1-x72a.google.com [IPv6:2607:f8b0:4864:20::72a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1441C1200A1 for <spring@ietf.org>; Fri, 20 Sep 2019 01:45:09 -0700 (PDT)
Received: by mail-qk1-x72a.google.com with SMTP id w2so6541758qkf.2 for <spring@ietf.org>; Fri, 20 Sep 2019 01:45:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=raszuk.net; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=7CvNhxL5C5ECFnMz5DcS3RiycGurA3vQIBH4ZBc4lWI=; b=PRZpZi9sW99tZL1lJ3XUtQiSiB6neTZun/rZAvHH285NkmtcY5B5CsVp0mRvHACl5k Fi6QtPQonTBp8BRgMm1hsV7qxoZslPzD+dpvRecC9JjkvVQRmWggCiap70cQX+iw7kHp ee99uZNKPznMqPFNUCQ8x7H4oL1Qgy7KRjmVj1sIqA78EVSD3sbdG6op2tm2ojFSd38H WzJoNCH58X5wTVx74CplP/0nAHc4amqafm76CvYQnt58TSLasOtJBksiJTrhwl9OtQbN 4WaGabZUf3KNJTsbZx5Rxdba8h+O2Lb56isV13pw2lBnq335xQ9n1mwvdJPvieSfWu2r TdZw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=7CvNhxL5C5ECFnMz5DcS3RiycGurA3vQIBH4ZBc4lWI=; b=bggIEw0rAJt0RjZOTUOEKB1cr3uEByDmQBJ7nuRVph17ot+AqpMWbuF5qRrF32muD1 IStGssOP4hUniNYpjI9c2/lNx4Q//dmUYLiqLrpiAVnWf8fIPmNILNPyEFdiHGCoqq8a 325EHamj2OfOostYfWTPe/ntdMeQ/4wmArXOb1TgKFOnGVYUOV+QCMQ0a1J/qO9ycG7H 2OrNBctQVEFER/9mqoczlq9HIaGq9nPVGhI54lcurWljJL5+2vkuXcVFdoHqEx4CY2AW 4qHNNvVc3g5WGU+vlRxm3n5DKuOMJK8Q4Ke0beovJZDzzteD97Dj3xCOwtP4848TvKr9 reDg==
X-Gm-Message-State: APjAAAXbqpTUF+ciziJQ89raQqEbjWZmWrIYDDJeqT1WG2kYNh2J71eo xEgIfmQrx5olxSWWtULKizfPIemzSKLNV7OX0JvwXw==
X-Google-Smtp-Source: APXvYqzrP2ihHMVXI9iZNA+NOuEybHf/CsPWHgAIOnsjWFJjsao+vB3Yqd1SNwAxi2BTF3qw+xJVZ+VJI0uH60Tlwk0=
X-Received: by 2002:a37:2784:: with SMTP id n126mr2472263qkn.302.1568969107993; Fri, 20 Sep 2019 01:45:07 -0700 (PDT)
MIME-Version: 1.0
References: <CAHd-QWtA21+2Sm616Fnw0D-eB7SNb_BeG8-A-MCLLFgTwSpOsg@mail.gmail.com> <BYAPR05MB54632F09C712ADB30138CFA9AEBE0@BYAPR05MB5463.namprd05.prod.outlook.com> <BYAPR19MB3415D21403394F8129A4BAD8FCB90@BYAPR19MB3415.namprd19.prod.outlook.com> <30491F13-C652-45C3-AB2B-95F765FBB4EA@juniper.net> <65C5CB04-3A2F-4F83-A7C8-2045154F93AE@cisco.com> <BYAPR05MB5463EC3250F2A303A3641839AEBA0@BYAPR05MB5463.namprd05.prod.outlook.com> <91CBADAD-EFE6-46E1-A9D3-DAA111357179@juniper.net> <CAOj+MMGyUFRPDqCBo5SbLX486o_9GLpM6Zxf8KSt1voWiqhkGQ@mail.gmail.com> <E8D473B5-3E8D-4339-9A79-0CAE30750A55@juniper.net> <CAOj+MMFOy5PyTo=jPJkVrQOctdWjsTbD=7ix-2n89vodKzT3gQ@mail.gmail.com> <2F604D74-51CF-4F2F-AEA9-1CBDEEA9B9F7@gmail.com> <F09C2D09-D769-4817-AF73-97D6ED1BC4BF@lapishills.com> <201909120857387140042@chinatelecom.cn> <1568259664564.62561@bell.ca> <CAO42Z2wQ_8GEE+=nAMFBj+ape9Vf7fARVoOwGdCiUxdffkyXgw@mail.gmail.com> <BYAPR05MB5463A04B05B4BD6AA294F7F0AEB00@BYAPR05MB5463.namprd05.prod.outlook.com> <6EA6F7C0-BEB2-4749-A6AB-62B1337213B2@cisco.com> <BYAPR05MB5463426F1668202EE5F183EFAE8F0@BYAPR05MB5463.namprd05.prod.outlook.com> <634900D2-FBCE-47CF-8907-C8B9CB3A4102@cisco.com> <CALx6S34=Tw-u4Hz-07-Rs-GjsungkqnD_fMoQnGc17u3VJhY1g@mail.gmail.com> <CAFqxzqYr7g2jzwJrhvjL_DXYZsDzbzqx01cy0zB1aBweDde1XQ@mail.gmail.com> <CAO42Z2yrjwRMykWxmEo5=18fMvuZdMtuyz5g1p=8oSzp_ro9Vw@mail.gmail.com> <52FDA21F-E860-45E2-846A-43B969DEDC87@juniper.net> <CAOj+MMFjCcQt7FLf9NjfEKruEYktU0iJEs8Q+qFG8Pjkt7jDaA@mail.gmail.com> <9EA2D501-4382-4071-A89C-8C593B66E2F1@juniper.net> <CA+b+ERmnw412sboPtMow6=WUFK_FW2iO+rQxOu4dQ0yV2cuukQ@mail.gmail.com> <CAA8Zg7G-Aa+mVWxax3EqJOs9V7T8Bu=mfvng8Om9bEw59D7Orw@mail.gmail.com> <CAOj+MMFuQqMcGdjLT0piyuyUNpgLka7Pn5suA+LRi+rzFeKwow@mail.gmail.com> <CAA8Zg7HtdoMtzqg6o04TjAnyg8NUaoijVi40NoUPeERcycGssA@mail.gmail.com> <CAOj+MMF7X2nar9TkvWc2LunwdL2A6pfzpvROeZ3XfCGcv4zBZQ@mail.gmail.com> <02987E0C-3512-4BDD-A888-32CF4C8EB78E@gmail.com>
In-Reply-To: <02987E0C-3512-4BDD-A888-32CF4C8EB78E@gmail.com>
From: Robert Raszuk <robert@raszuk.net>
Date: Fri, 20 Sep 2019 10:44:59 +0200
Message-ID: <CAOj+MMHRevSPf+Ayv=4_zgnfA-rV_BvV+7OJwrTi2T9S95oCbw@mail.gmail.com>
To: Gyan Mishra <hayabusagsm@gmail.com>
Cc: Reji Thomas <rejithomas.d@gmail.com>, "xiechf@chinatelecom.cn" <xiechf@chinatelecom.cn>, SPRING WG <spring@ietf.org>, 6man <6man@ietf.org>, Dirk Steinberg <dirk@lapishills.com>, Rob Shakir <robjs@google.com>, Tarek Saad <tsaad.net@gmail.com>, Srihari Sangli <ssangli=40juniper.net@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="00000000000058955b0592f816b5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/V9nFfmKtT68hsjT-VJUB3H9zDWI>
Subject: Re: [spring] “SRV6+” complexity in forwarding
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Sep 2019 08:45:13 -0000

Hi Gyan,

> So now talking SRv6 with Ti LFA why is there an EH insertion as we are
> not using mpls LDP and not doing remote LFA and this is not the
traditional
> mpls TE FRR.

TI - stands for Topology Independent ... all other LFA modes rely on
topologies to be able to compute or not the backup path.

So why insertion/EH modification is needed ... well as I stated before
there are  few aspects of this and all must be taken into consideration.

A) In most cases of topologies it may not be required - only in some
special cases you may need to engineer your backup flows and then you
either insert new EH or add another IP encap with such SRH in current SRv6
architecture.

B) When you are doing node protection and PLR is adjucent to segment end
node you should fixup such SRH (so modify it on PLR which is not packet
destination) such that the packet will not try to return when LFA routed to
N+1 segment end.

Why A is option B clearly needs to be fixed or LFA style node protection of
any segment end declared as not supported.

Of course in bigger picture there any more protection methods to consider
and only specific operator of transit or enterprise is in position to
decide what works best for him.

Many thx,
R.















On Fri, Sep 20, 2019 at 3:06 AM Gyan Mishra <hayabusagsm@gmail.com> wrote:

> Hi Robert
>
> I know we have gone through many many lengthy discussions adnosium and I
> know the question has come up a few times and I know you replied back a few
> times related to the service provider use case where we end up with the
> multiple violations of RFC 8200 related to intermediate nodes EH insertion
> as well as many EH insertions occurring and what was mentioned was Ti-LFA.
> So since LFA and Remote LFA are extensions of the IGP providing the 50ms
> failover similar to traditional mpls Fast Reroute capabilities NH & NNH
> link/node/path protection in the legacy TE FRR pce the head end PE LSR adds
> and additional mpls shim for FRR.
>
> With IP LFA and remote LFA used with LDP there are IGP extensions opaque
> LSA’s that provide the pre programmed backup path provided by LFA loop free
> backup path.  In that scenario with LDP there is not any additional label
> with LFA but with remote LFA is added for the Remote LFA backup path with
> LDP session protection enabled with targeted LDP session tunnled through
> the RLFA node.
>
> So now talking SRv6 with Ti LFA why is there an EH insertion as we are not
> using mpls LDP and not doing remote LFA and this is not the traditional
> mpls TE FRR.
>
> I am not getting it from a network engineering technical standpoint what
> the use case is and why EH insertion would occur on any intermediate node
> as that even in the legacy mpls TE world its on the ingress LSR PE and for
> that matter in this case the benefit of SRv6 is “native TE” source routing
> via SRH pssi instructions and not maintaining state on the intermediate
> nodes which just do the PSSI and copy the SRH destination rewrite of IPv6
> destination for the traffic engineered path and then do PSP or USP on the
> egress node of the service provider core.
>
> I designed and manage a fairly large mpls core for Verizon and if their is
> a asic processing penalty hit due to intermediate node EH insertion we
> don’t want it and will stay course with LDP and stick with our path
> targeting SR-MPLS and ditch any ideas of ever going to SRv6.
>
> Thanks in advance for help in clarification of this topic and I think
> understanding the use case would help 6man overall understand the
> justification of the RFC 8200 violations.
>
> Thank you
>
> Gyan Mishra
> Verizon Communications
> Cell 301 502-1347
>
> Sent from my iPhone
>
> On Sep 19, 2019, at 3:50 PM, Robert Raszuk <robert@raszuk.net> wrote:
>
> Hi Reji,
>
> Notice what it says: *" ... explicitly listed intermediate nodes ... "*
>
> CRH which is used in SRv6+ does not explicitly list intermediate nodes so
> I do not think the procedures in IPv6 spec apply as the way you interpret
> them.
>
> But I am i no way authoritative ... still learning IPv6 and this thread
> become great education.
>
> An real example where those procedure apply is documented in RFC6554 which
> does put the addresses explicitly.
>
> Many thx,
> Robert.
>
>
>
>
>
>
>
>
> On Thu, Sep 19, 2019 at 9:14 PM Reji Thomas <rejithomas.d@gmail.com>
> wrote:
>
>> Hi Robert,
>>
>> >>I do not know what is the difference between IPv6 Destination Address
>> in the fixed header and "final destination". Where do you carry "final
>> destination" address ?
>>
>> See Section 4.4 in RFC 8200.  Hope its clear what's the final destination
>> and the context in which it is used.
>>
>>       Segments Left       8-bit unsigned integer.  Number of route
>>                           segments remaining, i.e., number of explicitly
>>                           listed intermediate nodes still to be visited
>>                           before reaching the final destination.
>>
>>
>> Regards
>>
>> Reji
>>
>>
>> On Thu, Sep 19, 2019 at 10:26 PM Robert Raszuk <robert@raszuk.net> wrote:
>>
>>> IPv6 fixed header has only one destination address. So TE midpoint is
>>> either a packet's destination or not. It can not be both.
>>>
>>> I do not know what is the difference between IPv6 Destination Address in
>>> the fixed header and "final destination". Where do you carry "final
>>> destination" address ?
>>>
>>> Many  thx,
>>> R.
>>>
>>> On Thu, Sep 19, 2019 at 6:17 PM Reji Thomas <rejithomas.d@gmail.com>
>>> wrote:
>>>
>>>> Hi Robert,
>>>>
>>>>
>>>> >>Well the crux of the matter is that you still need to process all EHs at each IPv6 destination which here means each transit node per RFC8200
>>>>
>>>>
>>>>  From RFC 8200 that doesn't seem to be the case or at least as I understand. See  Section 4.1 note 1 and note 3. Am I missing something?
>>>>
>>>>
>>>>
>>>> IPv6 header
>>>>       Hop-by-Hop Options header
>>>>       Destination Options header (note 1)
>>>>       Routing header
>>>>       Fragment header
>>>>       Authentication header (note 2)
>>>>       Encapsulating Security Payload header (note 2)
>>>>       Destination Options header (note 3)
>>>>       Upper-Layer header
>>>>
>>>>       note 1: for options to be processed by the first destination that
>>>>               appears in the IPv6 Destination Address field plus
>>>>               subsequent destinations listed in the Routing header.
>>>>
>>>>       note 2: additional recommendations regarding the relative order of
>>>>               the Authentication and Encapsulating Security Payload
>>>>               headers are given in [RFC4303 <https://tools.ietf.org/html/rfc4303>].
>>>>
>>>>       note 3: for options to be processed only by the final destination
>>>>               of the packet.
>>>>
>>>>
>>>> Regards
>>>> Reji
>>>>
>>>> On Thu, Sep 19, 2019 at 9:00 PM Robert Raszuk <rraszuk@gmail.com>
>>>> wrote:
>>>>
>>>>>
>>>>> I disagree. PPSI and PSSI leverages the DOHs in IPv6 architecture
>>>>>> better. The SRv6+ drafts explain the usecases better FYI.
>>>>>>
>>>>>
>>>>> Well the crux of the matter is that you still need to process all EHs
>>>>> at each IPv6 destination which here means each transit node per RFC8200.
>>>>> That is regardless what any other spec says .... unfortunately.
>>>>>
>>>>> Best,
>>>>> R.
>>>>>
>>>>>
>>>>>
>>>>> --------------------------------------------------------------------
>>>>> IETF IPv6 working group mailing list
>>>>> ipv6@ietf.org
>>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>>> --------------------------------------------------------------------
>>>>>
>>>> _______________________________________________
>>>> spring mailing list
>>>> spring@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/spring
>>>>
>>> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>
>