Re: [spring] Beyond SRv6.

Satoru Matsushima <satoru.matsushima@gmail.com> Wed, 11 September 2019 01:31 UTC

Return-Path: <satoru.matsushima@gmail.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F254C1200E0; Tue, 10 Sep 2019 18:31:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qDYjsZVi9eC1; Tue, 10 Sep 2019 18:31:46 -0700 (PDT)
Received: from mail-pf1-x42f.google.com (mail-pf1-x42f.google.com [IPv6:2607:f8b0:4864:20::42f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1274F120273; Tue, 10 Sep 2019 18:31:46 -0700 (PDT)
Received: by mail-pf1-x42f.google.com with SMTP id 205so12608759pfw.2; Tue, 10 Sep 2019 18:31:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=SNZgmfS2u3xhyLM8fSVZlETuncz9Pevc5QZelvd5nRQ=; b=M1pUpmQUw4W7b6ABTqKQotU39lXw6s2pzOPeMScQQR9/sb5rgRrhfyNCT1wMMOzY9O pg0dKQZZAqfgl72S3z4JgoHcBrhaXR522m60MZELo9tOYmwKPN8RlKWNgJ0Nc3ZuPLb7 oiF08dqIFRo7cIq9NUV8MR9l9l68T7COX3Cjez/rw69gt5+hd8wPsh9hSIAA06JyeXSX HPvoOlGrbMYmcXe1Qxm+49p/w68oeko4OF4nP7D0HC+nYBXTqoz0LkM1nsPsk5/ab1FY MlTtidDqoI033sg6XWqs/MyTJSZibZ+DxdEkgcomBJfHKrKfMd2ncP7EzuuUGHD1zhqK MLBQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=SNZgmfS2u3xhyLM8fSVZlETuncz9Pevc5QZelvd5nRQ=; b=YjeU1z5Dp9lrEwgTjQEpblLQE0X1nrVsSAJiqkDZTDwkd1CqkusPSvekX/jc4gLEuQ oE+LiHWZhH9Yaxcbs2XzCYij7o/f8QVNqozZAjWtSqgBJlf0C0UNAumhKMlueqEQdq3S ckjy8a1XC76kNhhGy/eQoC6CRXU1Xzy0mdz3ApTUUlm7pScvXaeRkLbencAPBZ1HXfi6 xQJuv5lvH22L6jlb+MOFPmgvH2ucKD3/amJk2ALVIXwjT6ttAlRoP0QdE1f6E0SFAs2C sLiXZSQeb6/okjzegDzYEIMq83ARAcUeACth6v/U/Z5aeo7IuF6JWBIl2fqh/Dev34Jv GB+w==
X-Gm-Message-State: APjAAAUmbIgt2SiNTgGslFkQmVRss2ktEgF4LcDMDs4oSeooF2S5yAHA Vu5uanxYn8wZgMLL2Q/jtqo=
X-Google-Smtp-Source: APXvYqxR3TjsCECZchFpV/e1P8zIAkCI1mDYAbkCwwYP6JS18sc1ACYZPISprxAuOvKJCuieWQRlMg==
X-Received: by 2002:aa7:920b:: with SMTP id 11mr38539298pfo.231.1568165505184; Tue, 10 Sep 2019 18:31:45 -0700 (PDT)
Received: from [10.207.114.140] ([202.45.12.164]) by smtp.gmail.com with ESMTPSA id f12sm16695109pgo.85.2019.09.10.18.31.14 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 10 Sep 2019 18:31:14 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail-9A6F6C61-9053-48AF-80FB-414BD744C1E5"
Mime-Version: 1.0 (1.0)
From: Satoru Matsushima <satoru.matsushima@gmail.com>
X-Mailer: iPad Mail (16G77)
In-Reply-To: <f8d35f889032695a7d0227375b2f7@cweb01.nmdf.nhnsystem.com>
Date: Wed, 11 Sep 2019 10:31:12 +0900
Cc: Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>, 6man@ietf.org, Robert Raszuk <robert@raszuk.net>, Rob Shakir <robjs@google.com>, Tarek Saad <tsaad.net@gmail.com>
Content-Transfer-Encoding: 7bit
Message-Id: <074873B0-AD97-4D14-914C-5A2CA162CB44@gmail.com>
References: <CAHd-QWtA21+2Sm616Fnw0D-eB7SNb_BeG8-A-MCLLFgTwSpOsg@mail.gmail.com> <BYAPR05MB54632F09C712ADB30138CFA9AEBE0@BYAPR05MB5463.namprd05.prod.outlook.com> <BYAPR19MB3415D21403394F8129A4BAD8FCB90@BYAPR19MB3415.namprd19.prod.outlook.com> <30491F13-C652-45C3-AB2B-95F765FBB4EA@juniper.net> <65C5CB04-3A2F-4F83-A7C8-2045154F93AE@cisco.com> <BYAPR05MB5463EC3250F2A303A3641839AEBA0@BYAPR05MB5463.namprd05.prod.outlook.com> <91CBADAD-EFE6-46E1-A9D3-DAA111357179@juniper.net> <CAOj+MMGyUFRPDqCBo5SbLX486o_9GLpM6Zxf8KSt1voWiqhkGQ@mail.gmail.com> <E8D473B5-3E8D-4339-9A79-0CAE30750A55@juniper.net> <CAOj+MMFOy5PyTo=jPJkVrQOctdWjsTbD=7ix-2n89vodKzT3gQ@mail.gmail.com> <2F604D74-51CF-4F2F-AEA9-1CBDEEA9B9F7@gmail.com> <BYAPR05MB54639088D4875F3002A8E66FAEB70@BYAPR05MB5463.namprd05.prod.outlook.com> <1BA5FB3D-B873-4AFA-86CE-14FAED4F9B27@cisco.com> <BYAPR05MB3943B93BC6EF84C7E03DF1E3D5B70@BYAPR05MB3943.namprd05.prod.outlook.com> <6d6b4b04bca30fae8b575e3855cb724@cweb03.nmdf.nhnsystem.com> <f8d35f889032695a7d0227375b2f7@cweb01.nmdf.nhnsystem.com>
To: Hirofumi Ichihara <hirofumi.ichihara@linecorp.com>, SPRING WG List <spring@ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/l0-JT3X5UTDSzGNIwefPzzsU0wQ>
Subject: Re: [spring] Beyond SRv6.
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Sep 2019 01:31:50 -0000

Excellent news.

I’d capture your case in the SRv6 deployment draft, in case you’d be okay.

Cheers,
--satoru

2019/09/11 9:55、Hirofumi Ichihara <hirofumi.ichihara@linecorp.com>のメール:

> Hi folks,
> ​
> Let me mention my opinion as an operator.
> ​
> Our company already has deployed and used SRv6 Network in our DC. Our use case is L3VPN to isolate network for each multi-tenant and we decided to use T.Encaps and End.DX4. Currently, we deployed hypervisors and gateway nodes which are aware of SRv6. Although there are many routers not supported SRv6 between HVs and GW nodes, it works fine because of current SRH mechanism. We actually use one SID only between HV and HV, HV and GW so we don't face the issue like many SIDs now although we have a plan to use multiple SIDs for our SFC use case.
> ​
> We don't have specific opinion to shorter SIDs. However, we operator hope strongly that new thing must configure backward compatibility or reasonable migration plan.
> ​
> Thanks,
> Hirofumi
> 
> -----Original Message-----
> From: "Shraddha Hegde"<shraddha=40juniper.net@dmarc.ietf.org> 
> To: "Andy Smith (andsmit)"<andsmit@cisco.com>; "Ron Bonica"<rbonica=40juniper.net@dmarc.ietf.org>; 
> Cc: "SPRING WG List"<spring@ietf.org>; "6man@ietf.org"<6man@ietf.org>; "Gyan Mishra"<hayabusagsm@gmail.com>; "Robert Raszuk"<robert@raszuk.net>; "Rob Shakir"<robjs@google.com>; "Tarek Saad"<tsaad.net@gmail.com>; 
> Sent: 2019-09-10 (火) 02:51:48 (GMT+09:00)
> Subject: Re: [spring] Beyond SRv6.
>  
> Andy,
>  
> RFC 6119 defines ipv6 router-id .
> It is not mandatory to advertise IPv4 router-id in ISIS.
>  
> Rgds
> Shraddha
>  
> From: spring <spring-bounces@ietf.org> On Behalf Of Andy Smith (andsmit)
> Sent: Monday, September 9, 2019 10:07 PM
> To: Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>
> Cc: SPRING WG List <spring@ietf.org>; 6man@ietf.org; Gyan Mishra <hayabusagsm@gmail.com>; Robert Raszuk <robert@raszuk.net>; Rob Shakir <robjs@google.com>; Tarek Saad <tsaad.net@gmail.com>
> Subject: Re: [spring] Beyond SRv6.
>  
> Ron,
>  
> Doesn't ISIS require a quad octet / 32 bit / IPv4 address for it's router ID?
>  
> So you can't really build an ipv4 'free' network.   Not 100% anyway.
>  
> Andy
>  
>  
> 
> 
> On Sep 9, 2019, at 12:21 PM, Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org> wrote:
>  
> Hello Gyan,
>  
> Amplifying what you have said…..
>  
> There is no reason why SR-MPLS shouldn’t work over an IPv6 only infrastructure. So long as every node is MPLS capable, SR-MPLS should not require IPv4 to be enabled.
>  
>                                                                                Ron
>  
>  
>  
> Juniper Business Use Only
> From: Gyan Mishra <hayabusagsm@gmail.com> 
> Sent: Sunday, September 8, 2019 3:20 AM
> To: Robert Raszuk <robert@raszuk.net>
> Cc: Srihari Sangli <ssangli@juniper.net>; SPRING WG List <spring@ietf.org>; 6man@ietf.org; Zafar Ali (zali) <zali@cisco.com>; Rob Shakir <robjs@google.com>; Ron Bonica <rbonica@juniper.net>; Tarek Saad <tsaad.net@gmail.com>
> Subject: Re: [spring] Beyond SRv6.
>  
> As an operator of a Tier 1 provider with massive mpls networks I think our traditional bread and butter “mpls” will be around for a very very long time as is IPv4 if not longer.
>  
> Most all service provider cores run greater then or equal to MTU 9000 mpls cores to account for mpls overhead shims being tacked on plus edge overhead from possible GRE tunneling or IPSEC so in general making  the core the maximum Jumbo MTU supported by most vendors at 9216 is what is generally done out in the field.
>  
> So for SRv6 support of multiple or many EH insertions is really a non issue for 
> most operators.
>  
> From reading through all the discussion threads the SR insertion is two fold one being for FRR capabilities using Ti-LFA or remote LFA tunnel so end up requiring double EH insertions on the Ingress PE tunnel head end SRv6 source node and then second scenario being a possible EH insertions occurrence on intermediate nodes.  I have not read through the drafts or RFC regarding Ti-LFA with SR but since that is an IGP extension I am guessing an opaque LSA and is not the traditional MPLS FRR link/node/path protection that adds an additional mpls shim so not sure why an EH insertion needs to occur for Ti-LFA.  Can someone clarify that use case for me.  Also the EH insertion on intermediate node what is the use case or reason for that.  My guess is it’s for special use case of stitching SRv6 domains together.  Please clarify.
>  
> I do agree with some of the other operators on the marketing hype and push for SR-MPLS and SRv6 is not for every service provider as goes the mantra ..”if it’s not broken..don’t try to fix it..leave it alone” and I think you can definitely say that for MPLS as it has had a SOLID run for service providers since the 90’s ever since ATM and frame relay were put to rest so I don’t think that it’s going away any time soon.
>  
> I think it would be a serious mistake and sad state of affairs for vendors to push SR-MPLS and SRv6 and stop development and support of MPLS as that would really pigeon hole all operators into one technology which does not fit the bill for every use case out there.
>  
> The mention of SR-MPLS pulling support for IPv6 and forcing operators to go with SRv6 is a wrong move for vendors and would really limit operators with flexibility to chose based on their use case to stay with traditional mpls or go with with SR-MPLS or SRv6 only if necessary with their unique use case warrants..
>  
> I think SR-MPLS and SRv6 should be marketed by vendors and the industry as yet another tool in our operator “design toolbox” to use as we see fit or not use but not be forced into it.
>  
> There are particular use cases for SR-MPLS for migration from existing LDP and the downside of having state maintained in the core is not a downside as the P and PE nodes have to be provisioned anyway so their is no savings in pulling mpls LDP/mLDP with SR-MPLS “Sr-prefer” and ditching LDP.   
>  
> I think the major use case for SR-MPLS and SRv6 is coloring per-vrf TE feature for L3 VPNs steering without adding complexity of adding ibgp loopback egress PE FEC next hop to traffic engineer L3 VPN traffic.  That is a unique use case and not every major service provider has that requirement so if you don’t their really is no need to jump on the SR band wagon and you can stay put with the tried and true mpls that has been around for decades and is not going away any time soon.
>  
> SRv6 has a more ubiquitous all encompassing use case that could serve for MPLS core replacement or on the public internet or for enterprise network traffic engineering of flows between data centers or access to data center and an alternative to SD WAN application based routing solutions.  But here as well the use case benefit has to exist.  Nobody wants to be forced into it if it’s unnecessary added complexity.
>  
> My 2 1/2 cents 
>  
> Regards,
>  
> Gyan Mishra
> Verizon Communications 
> Cell- 301 502-1347
>  
> Sent from my iPhone
> 
> On Sep 6, 2019, at 10:17 AM, Robert Raszuk <robert@raszuk.net> wrote:
> 
> I don't think so. 
>  
> In OAM packets are on purpose made huge - even up to MTU to make sure real customer packets can go through or to detect and diagnose MTU issues. So adding SRH to it is nothing one can call inefficient. 
>  
> Wrong tree :) 
>  
> Cheers,
> R.
>  
> On Fri, Sep 6, 2019 at 4:14 PM Srihari Sangli <ssangli@juniper.net> wrote:
>  
> On 06/09/19, 4:32 PM Robert Raszuk from robert@raszuk.net said >
>  
> Not really. Only SR OAM packets may need it. Is that a real problem ?
>  
> Thanks for clarification. Like Ron pointed out before, its inefficient encoding.
>  
> srihari…
> _______________________________________________
> spring mailing list
> spring@ietf.org
> https://www.ietf.org/mailman/listinfo/spring
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>  
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------