[spring] 6MAN Chairs conclusions on Mandating SRH when using C-SIDs (draft-ietf-spring-srv6-srh-compression)

Bob Hinden <bob.hinden@gmail.com> Wed, 03 July 2024 16:34 UTC

Return-Path: <bob.hinden@gmail.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C377EC14F617; Wed, 3 Jul 2024 09:34:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cXqlI5qZALw1; Wed, 3 Jul 2024 09:34:59 -0700 (PDT)
Received: from mail-yw1-x112f.google.com (mail-yw1-x112f.google.com [IPv6:2607:f8b0:4864:20::112f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 45855C14F5FC; Wed, 3 Jul 2024 09:34:59 -0700 (PDT)
Received: by mail-yw1-x112f.google.com with SMTP id 00721157ae682-6515867cf33so8918627b3.1; Wed, 03 Jul 2024 09:34:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1720024498; x=1720629298; darn=ietf.org; h=to:cc:date:message-id:subject:mime-version :content-transfer-encoding:from:from:to:cc:subject:date:message-id :reply-to; bh=8scP8ipEylywo+Mn951liJ3RATR5Nkl5gcJvTFuJGkY=; b=GUeKMSBwCPTBFVh7G7esVfbEMFFGNsUdzZBT3JgwVxbnYJAS6mMhn+pOen63gd1607 jCpDvitUyDaFNw4krTk2ruUEwYjRj/qTFAhgemAQbfcuwEmYIvnayF9QAF2kdTfVfYYA E5qS326g05gHcJn0eDTNlqs9bVtSfI3pJGoyFjVZveHqFW1hLT3nQSiUIDVYqDXnkiTX YdoYeTqeS9BgUhZiiqvPx2OqoxnYPqxCcPkVUYCzQjt+JHgBlWMChnye/xsMzX1rV41u owWu5XniGSwBf8BHT0G/tE6iGQlploIi4WddxiTOC1PjQsizM9FQfI/Fj+1/makvZJ0c Xb6Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1720024498; x=1720629298; h=to:cc:date:message-id:subject:mime-version :content-transfer-encoding:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=8scP8ipEylywo+Mn951liJ3RATR5Nkl5gcJvTFuJGkY=; b=rSeA8gx6xjuUnun63gDAzZ6oQxQ7MpCjWROXsC8JbMY8nV3mWdRusHpThNFbd7SXKt cn3MPpnFl0OKMTKq01UhzxN9O80GAkmVxN7IqBiyLnp/bR/u+Vef21fQX1SpbUbHBdNU kJTRnEt5npqJmgHp2np4h1TcqPdsOWK0CpT/9rR8e680qZJw3YrWtqwf2KIGjYKAojht iKy4A09JC3ALjUaqS0Xnxmmtbu8D6HWY9dpUyi1OJWbQ6/DmL/vhcs/YhPl+zh11IQ1j sX32A7fh2MKqz375Fkr6nCQgSLDvyy0UzosAadydC6dt4okLf6jpLG6ef4kw1Ztreabv v2hA==
X-Forwarded-Encrypted: i=1; AJvYcCV54423I2IRwFPJ/5tBh+Ne0NlN2MLr5th5tEPxIJxxr50Q5j5K/eqPobhsCbjynUyPJqCq8GFDCTfNaiJaTPXDnwX+g+kZsekuDBTeYQJGX/UTQfzUu1QNTsmWkg3rRALP6LfZVuA=
X-Gm-Message-State: AOJu0Yyq+sN9qJVNZGrFgJRTO+OLuAuWk9/xDDSPRG8FDLZK9sCBZ0L5 u9NHMWEcP2/AMnhaqR/J+7+d9lY7/WNJLgoCyUz5viYLZmIEHMSNK61rXw==
X-Google-Smtp-Source: AGHT+IFIDo/d4IOgAmMQ8z0VAuLJ/dpk19F++4CYv8Nz2bfVTDnEZ+/7FsPRS4ZrPA5w+39GPXl5ZQ==
X-Received: by 2002:a81:a50c:0:b0:64b:a57:8441 with SMTP id 00721157ae682-64c718fa8abmr115071057b3.19.1720024497891; Wed, 03 Jul 2024 09:34:57 -0700 (PDT)
Received: from smtpclient.apple ([2600:1700:4383:c05f:6934:c579:4793:16a0]) by smtp.gmail.com with ESMTPSA id 00721157ae682-6521495a3f2sm1148547b3.34.2024.07.03.09.34.56 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 03 Jul 2024 09:34:57 -0700 (PDT)
From: Bob Hinden <bob.hinden@gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.600.62\))
Message-Id: <BD958D15-F596-4D14-AED2-5B616FA11430@gmail.com>
Date: Wed, 03 Jul 2024 09:34:35 -0700
To: Alvaro Retana <aretana.ietf@gmail.com>, "spring-chairs@ietf.org" <spring-chairs@ietf.org>
X-Mailer: Apple Mail (2.3774.600.62)
Message-ID-Hash: JCDPRZVOVNIPJUI7M7MJF5SRNXXB5ENZ
X-Message-ID-Hash: JCDPRZVOVNIPJUI7M7MJF5SRNXXB5ENZ
X-MailFrom: bob.hinden@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-spring.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Bob Hinden <bob.hinden@gmail.com>, Ole Trøan <otroan@employees.org>, Jen Linkova <furry13@gmail.com>, SPRING WG List <spring@ietf.org>, IPv6 List <ipv6@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [spring] 6MAN Chairs conclusions on Mandating SRH when using C-SIDs (draft-ietf-spring-srv6-srh-compression)
List-Id: "Source Packet Routing in NetworkinG (SPRING)" <spring.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/ZjtYWMTB1eZRul4-AdIolBgooaU>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Owner: <mailto:spring-owner@ietf.org>
List-Post: <mailto:spring@ietf.org>
List-Subscribe: <mailto:spring-join@ietf.org>
List-Unsubscribe: <mailto:spring-leave@ietf.org>

Alvaro, Spring Chairs,

The 6MAN chairs have reviewed the discussion on your query to the IPv6 list.   This is our thoughts.

Process wise we don’t think we can declare any kind of formal consensus on this.   We are sure you have also read the discussion.  We do have some feedback from our reading of the discussion.  

Our read is there is a number of people who don’t like using C-SIDs due to issues relating to verify transport checksums due to not having access to final destination address.   We don’t think this is a significant issue as long as they are in a SRH header.  That provides additional context that C-SIDs may be in use.  

We think there is a stronger issue when using C-SIDs without a SRH header.   There isn’t any context for knowing how to handle these packets.   We also agree with the point was that for an endpoint, there would be no way for that endpoint to do hardware offload for the TCP checksum.  Even if the NIC supported SRH it would not know how to restore the original destination address.  These NICs commonly fail to do TCP offload with any routing header or other extension headers too, so the failure is there.  It is made worse without having any context that C-SIDs are being used.

We think this issue could be reduced if there was a way to identify that the packets contained C-SIDs.  For example, if they were using the prefix defined in <draft-ietf-6man-sids>.  We note that <draft-ietf-spring-srv6-srh-compression> does reference this prefix defined in <draft-ietf-6man-sids>, but does not require its use.

Bob, Ole, Jen