Re: [spring] “SRV6+” complexity in forwarding

Gyan Mishra <hayabusagsm@gmail.com> Fri, 20 September 2019 17:20 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B3C061200FF; Fri, 20 Sep 2019 10:20:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yM7KbY4O5tng; Fri, 20 Sep 2019 10:20:35 -0700 (PDT)
Received: from mail-qt1-x82d.google.com (mail-qt1-x82d.google.com [IPv6:2607:f8b0:4864:20::82d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CDD89120024; Fri, 20 Sep 2019 10:20:34 -0700 (PDT)
Received: by mail-qt1-x82d.google.com with SMTP id 3so7079883qta.1; Fri, 20 Sep 2019 10:20:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:mime-version:subject:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=bhcjB0jDc7+b8tzHE+r2w73iZpOzrkt1f3bxeZXXwFQ=; b=ZiMQodttgDBPEccI7Z8PWMQ7DNKN1Fz7jPtfvikDJgCtR9OgUJXTI/78hpWorIDzlI kvjo0OJxHsgW1CLtmHQAL/elVwBgKc9625UHIPf8giJ0Hh4PytxcCqqLNwVa1pGdyDox bNlvqw8jQ2N1YZKokO0u0Jg6DEMFZURHxJy7GES1M2ozG0ZnKMkQkNMu3oV8Pllh6qwU Ndw1NKnxVs/lqay8c7EcspJZjagFAHMP5+jktGgepaJUKp5Z/iEFc3jTIzcgJeYxIEli lknKtzZ6JBb86hz5wlXMvCxl0INeGoevUtJ69rr+DhU+J3z9M2xgqJlDI+uJ0shfuUam hyQQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=bhcjB0jDc7+b8tzHE+r2w73iZpOzrkt1f3bxeZXXwFQ=; b=tiWOdVgnWeqUxPQBy3j3EHDUJLFI9pWOeV2ht5mE0o9fmNdVQ85GKiCGs1LGX50dwR VlmZo159lpW0vhn6zoZh1pKmNJ3evN/ZeeT9VD5NvoyvYH54X6QIWh9TlI1ZFGvWXMuB WEgB+ghuDcxGJg2OFPcMjfAna9nkqnXkY8g6qE8eU7leCfPpE1Xy0Mlum/84qLPjAMIc zsMZAIl+wPIAVSUDjeSY9uZgVPe/t9esoVJlyGuc+xVSCxi9C3XmGRmX8mVyo62jriJE KjbjXDtSN3EzoOtlmendMh9gATFt9Cr6CmwKBWGj5lapAN1GvUxH2pcTorbzoXh0Kmk+ kmzw==
X-Gm-Message-State: APjAAAUwBlYa+DSq3055ZZnVjqt/PjzTxZcfyaSf9nX97KiB9ln89ODU KBhXOLTyp1uOOEqVV+Ygty4vxLYS
X-Google-Smtp-Source: APXvYqyyj39L04Gxejrqs4CIvk4MdScPq/9NcUcA2dgjr/oncYMogpLjPfuXeIQWuotJMSCqXAR+uA==
X-Received: by 2002:a0c:9952:: with SMTP id i18mr14302776qvd.202.1569000033512; Fri, 20 Sep 2019 10:20:33 -0700 (PDT)
Received: from ?IPv6:2600:1003:b026:7d3f:5151:d3f8:5a25:efa9? ([2600:1003:b026:7d3f:5151:d3f8:5a25:efa9]) by smtp.gmail.com with ESMTPSA id c126sm1324169qkd.13.2019.09.20.10.20.32 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 20 Sep 2019 10:20:32 -0700 (PDT)
From: Gyan Mishra <hayabusagsm@gmail.com>
X-Google-Original-From: Gyan Mishra <hayabusaGSM@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail-B18202C3-5BD6-4887-B8E7-8FF0BBDAC16A"
Mime-Version: 1.0 (1.0)
X-Mailer: iPhone Mail (16G102)
In-Reply-To: <F183D162-DE73-486C-ACBD-1200E991D8B7@gmail.com>
Date: Fri, 20 Sep 2019 13:20:31 -0400
Cc: Robert Raszuk <robert@raszuk.net>, Rob Shakir <robjs@google.com>, SPRING WG <spring@ietf.org>, 6man <6man@ietf.org>, Dirk Steinberg <dirk@lapishills.com>, "xiechf@chinatelecom.cn" <xiechf@chinatelecom.cn>, Tarek Saad <tsaad.net@gmail.com>, Srihari Sangli <ssangli=40juniper.net@dmarc.ietf.org>
Content-Transfer-Encoding: 7bit
Message-Id: <982B4570-F379-4451-8F50-11C932E241B0@gmail.com>
References: <CAHd-QWtA21+2Sm616Fnw0D-eB7SNb_BeG8-A-MCLLFgTwSpOsg@mail.gmail.com> <BYAPR05MB54632F09C712ADB30138CFA9AEBE0@BYAPR05MB5463.namprd05.prod.outlook.com> <BYAPR19MB3415D21403394F8129A4BAD8FCB90@BYAPR19MB3415.namprd19.prod.outlook.com> <30491F13-C652-45C3-AB2B-95F765FBB4EA@juniper.net> <65C5CB04-3A2F-4F83-A7C8-2045154F93AE@cisco.com> <BYAPR05MB5463EC3250F2A303A3641839AEBA0@BYAPR05MB5463.namprd05.prod.outlook.com> <91CBADAD-EFE6-46E1-A9D3-DAA111357179@juniper.net> <CAOj+MMGyUFRPDqCBo5SbLX486o_9GLpM6Zxf8KSt1voWiqhkGQ@mail.gmail.com> <E8D473B5-3E8D-4339-9A79-0CAE30750A55@juniper.net> <CAOj+MMFOy5PyTo=jPJkVrQOctdWjsTbD=7ix-2n89vodKzT3gQ@mail.gmail.com> <2F604D74-51CF-4F2F-AEA9-1CBDEEA9B9F7@gmail.com> <F09C2D09-D769-4817-AF73-97D6ED1BC4BF@lapishills.com> <201909120857387140042@chinatelecom.cn> <1568259664564.62561@bell.ca> <CAO42Z2wQ_8GEE+=nAMFBj+ape9Vf7fARVoOwGdCiUxdffkyXgw@mail.gmail.com> <BYAPR05MB5463A04B05B4BD6AA294F7F0AEB00@BYAPR05MB5463.namprd05.prod.outlook.com> <6EA6F7C0-BEB2-4749-A6AB-62B1337213B2@cisco.com> <BYAPR05MB5463426F1668202EE5F183EFAE8F0@BYAPR05MB5463.namprd05.prod.outlook.com> <634900D2-FBCE-47CF-8907-C8B9CB3A4102@cisco.com> <CALx6S34=Tw-u4Hz-07-Rs-GjsungkqnD_fMoQnGc17u3VJhY1g@mail.gmail.com> <CAFqxzqYr7g2jzwJrhvjL_DXYZsDzbzqx01cy0zB1aBweDde1XQ@mail.gmail.com> <CAO42Z2yrjwRMykWxmEo5=18fMvuZdMtuyz5g1p=8oSzp_ro9Vw@mail.gmail.com> <52FDA21F-E860-45E2-846A-43B969DEDC87@juniper.net> <CAOj+MMFjCcQt7FLf9NjfEKruEYktU0iJEs8Q+qFG8Pjkt7jDaA@mail.gmail.com> <9EA2D501-4382-4071-A89C-8C593B66E2F1@juniper.net> <CA+b+ERmnw412sboPtMow6=WUFK_FW2iO+rQxOu4dQ0yV2cuukQ@mail.gmail.com> <CAA8Zg7G-Aa+mVWxax3EqJOs9V7T8Bu=mfvng8Om9bEw59D7Orw@mail.gmail.com> <CAOj+MMFuQqMcGdjLT0piyuyUNpgLka7Pn5suA+LRi+rzFeKwow@mail.gmail.com> <CAA8Zg7HtdoMtzqg6o04TjAnyg8NUaoijVi40NoUPeERcycGssA@mail.gmail.com> <CAOj+MMF7X2nar9TkvWc2LunwdL2A6pfzpvROeZ3XfCGcv4zBZQ@mail.gmail.com> <02987E0C-3512-4BDD-A888-32CF4C8EB78E@gmail.com> <F183D162-DE73-486C-ACBD-1200E991D8B7@gmail.com>
To: Jeff Tantsura <jefftant.ietf@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/ZSFR_XiTiTUKQNd5q6lGYo2LcGE>
Subject: Re: [spring] “SRV6+” complexity in forwarding
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Sep 2019 17:20:38 -0000


Sent from my iPhone

> On Sep 19, 2019, at 10:43 PM, Jeff Tantsura <jefftant.ietf@gmail.com> wrote:
> 
> Gyan,
> 
> IPFRR doesn’t use/need any IGP extensions and is local to the device computing LFA.
> As RTGWG chair - I welcome you to read a number of rather well written RFCs on the topic we have published in RTGWG over the last 7 years. 
> Pay attention on how LFAs are computed, this would clarify your question as to why there’s no need for additional imposition as well as why LFA provides partial coverage.
> There’s also TI-LFA draft that explains how TI-LFA is computed and why it relies on additional imposition if LFA is unavailable.
> 
> Regards,
> Jeff

Thanks you Jeff!

I am part of the RTGWG and will definitely read through all the RFCs as well as Ti-LFA draft I detail.

I read through RFC 5286 IP LFA the LFA algorithm uses the underlying IGP to for alternative loop free next hop for link and node protection but since it’s the algorithm runs locally to build the “backup” path pre programmed it does not require IGP extensions.  
IP LFA is similar algorithm to the CISCO proprietary EIGRP topology loopfree feasible successor backup paths.  Am I stating that correctly reason why LFA does not rely on IGP extensions.

RFLA RFC 7490 - so I had a question - always wondered about - so RLFA is used when a LFA path does not exist so a ldp tunnel is built to the PQ node for backup RLFA pre programmed path to get built.  So when that LDP tunnel is build an extra mpls shim is added to the label stack.  Is that correct for RLFA backup paths. Is it just a single shim or multiple to do the RLFA LDP tunneling.

I read through the Ti-LFA draft 

https://datatracker.ietf.org/doc/draft-bashandy-rtgwg-segment-routing-ti-lfa/

So Ti-LFA uses loop free uses a traffic engineered IGP independent topology independent path that is desired with SR-MPLS or with SRv6 uses the EH SRH SID list for the pre programmed backup path.  So an additional EH insertion has to occur on the ingress PE to the SR or SRV6 domain.  I have to read through more carefully but I am not seeing how an intermediate node would require EH insertion since that function is always on the source node head end of the traffic engineered path.

Regards,

Gyan
>> On Sep 19, 2019, at 18:06, Gyan Mishra <hayabusagsm@gmail.com> wrote:
>> 
>> Hi Robert 
>> 
>> I know we have gone through many many lengthy discussions adnosium and I know the question has come up a few times and I know you replied back a few times related to the service provider use case where we end up with the multiple violations of RFC 8200 related to intermediate nodes EH insertion as well as many EH insertions occurring and what was mentioned was Ti-LFA.  So since LFA and Remote LFA are extensions of the IGP providing the 50ms failover similar to traditional mpls Fast Reroute capabilities NH & NNH link/node/path protection in the legacy TE FRR pce the head end PE LSR adds and additional mpls shim for FRR.
>> 
>> With IP LFA and remote LFA used with LDP there are IGP extensions opaque LSA’s that provide the pre programmed backup path provided by LFA loop free backup path.  In that scenario with LDP there is not any additional label with LFA but with remote LFA is added for the Remote LFA backup path with LDP session protection enabled with targeted LDP session tunnled through the RLFA node.
>> 
>> So now talking SRv6 with Ti LFA why is there an EH insertion as we are not using mpls LDP and not doing remote LFA and this is not the traditional mpls TE FRR.
>> 
>> I am not getting it from a network engineering technical standpoint what the use case is and why EH insertion would occur on any intermediate node as that even in the legacy mpls TE world its on the ingress LSR PE and for that matter in this case the benefit of SRv6 is “native TE” source routing via SRH pssi instructions and not maintaining state on the intermediate nodes which just do the PSSI and copy the SRH destination rewrite of IPv6 destination for the traffic engineered path and then do PSP or USP on the egress node of the service provider core.
>> 
>> I designed and manage a fairly large mpls core for Verizon and if their is a asic processing penalty hit due to intermediate node EH insertion we don’t want it and will stay course with LDP and stick with our path targeting SR-MPLS and ditch any ideas of ever going to SRv6.
>> 
>> Thanks in advance for help in clarification of this topic and I think understanding the use case would help 6man overall understand the justification of the RFC 8200 violations.
>> 
>> Thank you
>> 
>> Gyan Mishra
>> Verizon Communications 
>> Cell 301 502-1347
>> 
>> Sent from my iPhone
>> 
>>> On Sep 19, 2019, at 3:50 PM, Robert Raszuk <robert@raszuk.net> wrote:
>>> 
>>> Hi Reji,
>>> 
>>> Notice what it says: " ... explicitly listed intermediate nodes ... "
>>> 
>>> CRH which is used in SRv6+ does not explicitly list intermediate nodes so I do not think the procedures in IPv6 spec apply as the way you interpret them. 
>>> 
>>> But I am i no way authoritative ... still learning IPv6 and this thread become great education. 
>>> 
>>> An real example where those procedure apply is documented in RFC6554 which does put the addresses explicitly. 
>>> 
>>> Many thx,
>>> Robert.
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>> 
>>>> On Thu, Sep 19, 2019 at 9:14 PM Reji Thomas <rejithomas.d@gmail.com> wrote:
>>>> Hi Robert,
>>>> 
>>>> >>I do not know what is the difference between IPv6 Destination Address in the fixed header and "final destination". Where do you carry "final destination" address ? 
>>>> 
>>>> See Section 4.4 in RFC 8200.  Hope its clear what's the final destination and the context in which it is used.
>>>> 
>>>>       Segments Left       8-bit unsigned integer.  Number of route
>>>>                           segments remaining, i.e., number of explicitly
>>>>                           listed intermediate nodes still to be visited
>>>>                           before reaching the final destination.
>>>> 
>>>> Regards
>>>> Reji
>>>> 
>>>>> On Thu, Sep 19, 2019 at 10:26 PM Robert Raszuk <robert@raszuk.net> wrote:
>>>>> IPv6 fixed header has only one destination address. So TE midpoint is either a packet's destination or not. It can not be both. 
>>>>> 
>>>>> I do not know what is the difference between IPv6 Destination Address in the fixed header and "final destination". Where do you carry "final destination" address ? 
>>>>> 
>>>>> Many  thx,
>>>>> R.
>>>>> 
>>>>>> On Thu, Sep 19, 2019 at 6:17 PM Reji Thomas <rejithomas.d@gmail.com> wrote:
>>>>>> Hi Robert,
>>>>>> 
>>>>>> >>Well the crux of the matter is that you still need to process all EHs at each IPv6 destination which here means each transit node per RFC8200
>>>>>> 
>>>>>>  From RFC 8200 that doesn't seem to be the case or at least as I understand. See  Section 4..1 note 1 and note 3. Am I missing something?
>>>>>>  
>>>>>> IPv6 header
>>>>>>       Hop-by-Hop Options header
>>>>>>       Destination Options header (note 1)
>>>>>>       Routing header
>>>>>>       Fragment header
>>>>>>       Authentication header (note 2)
>>>>>>       Encapsulating Security Payload header (note 2)
>>>>>>       Destination Options header (note 3)
>>>>>>       Upper-Layer header
>>>>>> 
>>>>>>       note 1: for options to be processed by the first destination that
>>>>>>               appears in the IPv6 Destination Address field plus
>>>>>>               subsequent destinations listed in the Routing header.
>>>>>> 
>>>>>>       note 2: additional recommendations regarding the relative order of
>>>>>>               the Authentication and Encapsulating Security Payload
>>>>>>               headers are given in [RFC4303].
>>>>>> 
>>>>>>       note 3: for options to be processed only by the final destination
>>>>>>               of the packet.
>>>>>> 
>>>>>> Regards
>>>>>> Reji
>>>>>> 
>>>>>>>> On Thu, Sep 19, 2019 at 9:00 PM Robert Raszuk <rraszuk@gmail.com> wrote:
>>>>>>>> 
>>>>>>> 
>>>>>>>> I disagree. PPSI and PSSI leverages the DOHs in IPv6 architecture better. The SRv6+ drafts explain the usecases better FYI.
>>>>>>> 
>>>>>>> Well the crux of the matter is that you still need to process all EHs at each IPv6 destination which here means each transit node per RFC8200. That is regardless what any other spec says .... unfortunately. 
>>>>>>> 
>>>>>>> Best,
>>>>>>> R.
>>>>>>> 
>>>>>>> 
>>>>>>>  
>>>>>>> --------------------------------------------------------------------
>>>>>>> IETF IPv6 working group mailing list
>>>>>>> ipv6@ietf.org
>>>>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>>>>> --------------------------------------------------------------------
>>>>>> _______________________________________________
>>>>>> spring mailing list
>>>>>> spring@ietf.org
>>>>>> https://www.ietf.org/mailman/listinfo/spring
>>> --------------------------------------------------------------------
>>> IETF IPv6 working group mailing list
>>> ipv6@ietf.org
>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>> --------------------------------------------------------------------
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------