Re: [spring] RFC8200 update?

"Wang, Weibin (NSB - CN/Shanghai)" <weibin.wang@nokia-sbell.com> Fri, 28 February 2020 13:19 UTC

Return-Path: <weibin.wang@nokia-sbell.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DEB03A17CD; Fri, 28 Feb 2020 05:19:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UVezOgML6Mf7; Fri, 28 Feb 2020 05:19:26 -0800 (PST)
Received: from cnshjsmin03.nokia-sbell.com (cnshjsmin03.app.nokia-sbell.com [116.246.26.71]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8671B3A17C9; Fri, 28 Feb 2020 05:19:22 -0800 (PST)
X-AuditID: ac189297-ec3ff7000000bab2-97-5e591352ab31
Received: from CNSHPPEXCH1610.nsn-intra.net (Unknown_Domain [135.251.51.110]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by cnshjsmin03.nokia-sbell.com (Symantec Messaging Gateway) with SMTP id AA.16.47794.253195E5; Fri, 28 Feb 2020 21:19:14 +0800 (HKT)
Received: from CNSHPPEXCH1605.nsn-intra.net (135.251.51.105) by CNSHPPEXCH1610.nsn-intra.net (135.251.51.110) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Fri, 28 Feb 2020 21:19:14 +0800
Received: from CNSHPPEXCH1605.nsn-intra.net ([135.251.51.105]) by CNSHPPEXCH1605.nsn-intra.net ([135.251.51.105]) with mapi id 15.01.1713.007; Fri, 28 Feb 2020 21:19:14 +0800
From: "Wang, Weibin (NSB - CN/Shanghai)" <weibin.wang@nokia-sbell.com>
To: Sander Steffann <sander@steffann.nl>, Andrew Alston <Andrew.Alston@liquidtelecom.com>
CC: SPRING WG List <spring@ietf.org>, 6man WG <ipv6@ietf.org>
Thread-Topic: [spring] RFC8200 update?
Thread-Index: AQHV7i8LxAmH5T7u3kOoyrYDwIS5gagv/86AgAAJRgCAAIuvAA==
Date: Fri, 28 Feb 2020 13:19:14 +0000
Message-ID: <c1e8bc28880d4ee3a631ac9b9c6799d3@nokia-sbell.com>
References: <D20C2322-8420-416A-90C4-6A2401825FBD@steffann.nl> <DBBPR03MB5415E186A3F30AB1E62EC5E3EEE80@DBBPR03MB5415.eurprd03.prod.outlook.com> <199B7645-A2AC-4E1A-9E6E-7638A200BE80@steffann.nl>
In-Reply-To: <199B7645-A2AC-4E1A-9E6E-7638A200BE80@steffann.nl>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [135.251.51.115]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprHIsWRmVeSWpSXmKPExsXS/ts4TzdIODLOYEG/ssX3pw9ZLV6efc9k serCbzaL4xd+MzqweCxZ8pPJ4/H2fkaPC1eeMwYwR3HZpKTmZJalFunbJXBlzD8uU/BavOL7 pOvMDYydwl2MnBwSAiYSpz40M3UxcnEICRxiklj0cycjhPOXUeLpxVnsEM4mRomDn3+xg7Sw CbhJTNq2iw3EFhGIlujv3M0IYjML2Eqs234PrEZYQFVi5ccGqBo1iSOHFzJB2E4Sm1ZuYwGx WYBqzpxoAIvzCthJ/P58mBli2TFGiZ6z7WBDOQXsJVa8OAk2lFFATOL7qTVMEMvEJW49mc8E 8YOAxJI955khbFGJl4//sXYxcgDZShJ9G6DKdSQW7P7EBmFrSyxb+JoZYq+gxMmZT1gmMIrN QjJ1FpKWWUhaZiFpWcDIsopROjmvOCOrODczz8BYLy8/OzNRtzgpNSdHLzk/dxMjMNbWSEya voPx2AHvQ4wCHIxKPLwSzJFxQqyJZcWVuYcYJTiYlUR4N34NjRPiTUmsrEotyo8vKs1JLT7E KM3BoiTO2zJ5YayQQHpiSWp2ampBahFMlomDU6qB0fCIhLGZVN0CRQ3OR1cy2Bb5Keqqzfxj xyNr/vXLdrGS4gXJyctE3m7tP/CHTad97pxzN765O757Wtb/1fW6ecQJLwem0CtTeJ9OFQpj XKe8QFIp7lF4S1lRpfX5sB9hy6vYJ/5c+uQv/7afed7dprYLhPeZ6QXtsM6p0N1an1ZzNKOx X/OIEktxRqKhFnNRcSIAH3Hat7ECAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/bzXfRKt3Goit-shznpnkl5ohuVs>
Subject: Re: [spring] RFC8200 update?
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Feb 2020 13:19:28 -0000

In the bearer of srv6 traffic, srv6 domain is only one part of the whole packet journey. Because the srv6 domain is trusted by single operator, it is no necessary for the outer IPv6 header (for performing SRH function) to inherit all IPv6 extension headers specially designed for the initial end-to-end IPv6 communication, for example, the AH is not must for outer IPv6 header and its SRH. Therefore, the outer IPv6 processing of srv6 traffic can appropriately relax the restrictions, that is to say, the outer IPv6 encapsulation only inherits a part of IPv6 spec. For example, it is allowed to perform functions such as PSP within SRv6 domain;  Could we treat IPv6 headers function of internal and external layers differently, after all, their purposes are different.


Cheers!

Wang Weibin

-----Original Message-----
From: ipv6 <ipv6-bounces@ietf.org> On Behalf Of Sander Steffann
Sent: Friday, February 28, 2020 8:51 PM
To: Andrew Alston <Andrew.Alston@liquidtelecom.com>
Cc: SPRING WG List <spring@ietf.org>; 6man WG <ipv6@ietf.org>
Subject: Re: [spring] RFC8200 update?

Hi Andrew,

> This is certainly an interesting idea - and I'd probably need to give this a whole lot more thought before commenting properly, but the first thought that comes to mind is - would we be able to standardize a way to instruct like this.
> 
> What I would not want to see is every extension header out there having a separate method of instructing the network to allow this behavior whenever they feel like it, because it would create a nightmare both in terms of seeing if something was requesting it, and I would imagine, implementing it.

Well, it depends on what you deploy in your network. If you deploy SRv6 NP then nodes sending traffic over your network can use the NP functions you provide. If you don't provide any functions then there is nothing a sender can do. This obviously only works when sender and network cooperate. Otherwise the NP instruction will make no sense. And AFAIK source-routing, segment-routing etc are not enabled by default these days, so packets using them will be dropped unless the network is specifically configured to allow them.

> So - my question is - what would be the standard way to introduce this - and to this I would say - if you wanted to do this you'd almost want to add a very short extension header that contains this instruction, that is easy to see and easy to parse - since I don't see anywhere in the v6 header itself that we could add this functionality as a flag of sorts.

That might be useful for many things besides this. Let's talk.

> Interesting ideas - but as I said - I'd argue that if we went this route - I'd want a standard shared way to do this by anything coming tomorrow - to avoid still further divergence.

I'm not sure a standard way is needed. Maybe limit the scope to "if the sender of the packet explicitly asked for that using a routing header"?

Cheers,
Sander