Re: [spring] WGLC - draft-ietf-spring-srv6-network-programming

Warren Kumari <warren@kumari.net> Wed, 11 December 2019 00:52 UTC

Return-Path: <warren@kumari.net>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6DA71201AA for <spring@ietfa.amsl.com>; Tue, 10 Dec 2019 16:52:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=kumari-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1sS6k4C1RwG1 for <spring@ietfa.amsl.com>; Tue, 10 Dec 2019 16:52:14 -0800 (PST)
Received: from mail-qt1-x843.google.com (mail-qt1-x843.google.com [IPv6:2607:f8b0:4864:20::843]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E274B12008C for <spring@ietf.org>; Tue, 10 Dec 2019 16:52:13 -0800 (PST)
Received: by mail-qt1-x843.google.com with SMTP id s8so4706499qte.2 for <spring@ietf.org>; Tue, 10 Dec 2019 16:52:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kumari-net.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=mdFXigjPjw6Sd0Bu6P+skI4ulKvte1maasOJSV0uAaE=; b=iPBzM7yQU0LOf1XVm23zB5eVuxvkeefxbPhgvO6vXrmq1wHmvu8I/wp0WV4ft/LZHq XNvVwR3qzh+EznVQYfmWOUluawiUMZa0rUCPhQckQz8hEigYd+ZShYddjWppFgwBICF4 w/zdAa4J3se6bp1tpS9a2m43FyhDFEiw/KlJltwor+jYPmi4+33On1PQEWpXT3CB+ZEG I0gUWAd52xmltzex043152f+IWgibGjINJJVM8qDg06Usw8+/lVbBns1I/wzvcj8Fskt 8nl1YxaRPdn/JKw80EyIbX+lqfTpA+iH2v1u8IyWwuy5mJpYIzMDKGJipIIT6qV38aA8 uT8A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=mdFXigjPjw6Sd0Bu6P+skI4ulKvte1maasOJSV0uAaE=; b=rsVDZp010jD6dG5++LaJSchc4+VRKD96jNhRfTMWlUdrGE+bki+0LfWMfBxGIXYzDF dE2FpdHGAkkyerUf9AimGTJ6U1tIDy5I4cF/st57S/kCpecX1fwgupXV6ZF9FRpCfftn S24hiJe8iMN8lrJu2poam+WJ5Ktn2BTgQ8Z1ucWiy2BSdPQTL8qlkRGwlLhD5EJgOCO0 4ET55PmcaIJTNcQye8qEJbldJ08+vDnLrWy8un3cdWHPeWqsZeeNabwZkjC36thvz3Nf +k/n+N8n4scl0unWAo0OdlxbAZQgn8C6/gqTa6hwL93UlLU5yi/iy36ltLJvfslRm3h4 xvOQ==
X-Gm-Message-State: APjAAAXxxN/2xcA1Nbz4co/mYQJw4iNbsXjo3z9SBn7JVZc6CSyv5wOK CIA/TTj+V4t9MVwE3HJ9xMOnZi3uHiEgZT/ZjtmGPA==
X-Google-Smtp-Source: APXvYqyHxlaVdNfaolcChHpBm2cJocfZNtUZDT1WjQko4jGNzFfgRR6uduYi/HZdphyXKGgwY8i8QB5i0ZMNXDS2gCM=
X-Received: by 2002:aed:23bb:: with SMTP id j56mr594041qtc.315.1576025532700; Tue, 10 Dec 2019 16:52:12 -0800 (PST)
MIME-Version: 1.0
References: <17421_1575566127_5DE93B2F_17421_93_1_53C29892C857584299CBF5D05346208A48D1A3DA@OPEXCAUBM43.corporate.adroot.infra.ftgroup> <6c674995-8cc7-c024-4181-60b160910f75@si6networks.com> <29345_1576001884_5DEFE15C_29345_229_5_53C29892C857584299CBF5D05346208A48D250B7@OPEXCAUBM43.corporate.adroot.infra.ftgroup> <89402a30-129b-314f-90f1-ba6efcdd6a88@si6networks.com>
In-Reply-To: <89402a30-129b-314f-90f1-ba6efcdd6a88@si6networks.com>
From: Warren Kumari <warren@kumari.net>
Date: Tue, 10 Dec 2019 19:51:36 -0500
Message-ID: <CAHw9_iLO2eXVMGpdVqnFe+YjFp7iNN26NVcaGgTmvqYgATOcQQ@mail.gmail.com>
To: Fernando Gont <fgont@si6networks.com>
Cc: Bruno Decraene <bruno.decraene@orange.com>, SPRING WG List <spring@ietf.org>, "6man@ietf.org" <6man@ietf.org>, draft-ietf-spring-srv6-network-programming <draft-ietf-spring-srv6-network-programming@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/rdkm1BBwxvOHuXIBJG2hk7Cn-QE>
Subject: Re: [spring] WGLC - draft-ietf-spring-srv6-network-programming
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Dec 2019 00:52:17 -0000

On Tue, Dec 10, 2019 at 6:22 PM Fernando Gont <fgont@si6networks.com> wrote:
>
> Bruno,
>
> On 10/12/19 13:18, bruno.decraene@orange.com wrote:
> > Fernando,
> >
> > Thank you for spelling out your comment, plus on the WGLC thread.
> > More in-line
> >
> >> Bruno,
> >>
> >> On 5/12/19 12:15, bruno.decraene@orange.com wrote:
> >> [....]>
> >>> This email starts a two weeks Working Group Last Call on
> >>> draft-ietf-spring-srv6-network-programming [1].
> >>>
> >>>
> >>>
> >>> Please read this document if you haven't read the most recent version,
> >>> and send your comments to the SPRING WG list, no later than December 20.
> >>>
> >>>
> >>>
> >>> You may copy the 6MAN WG for IPv6 related comment, but consider not
> >>> duplicating emails on the 6MAN mailing list for the comments which are
> >>> only spring specifics.
> >>>
> >>>
> >>>
> >>> If you are raising a point which you expect will be specifically debated
> >>> on the mailing list, consider using a specific email/thread for this point.
> >>>
> >>> This may help avoiding that the thread become specific to this point and
> >>> that other points get forgotten (or that the thread get converted into
> >>> parallel independent discussions)
> >>
> >> Penultimate Segment Popping describes/specifies the removal of a SRH at
> >> a place other than the final destination of the packet.
> >>
> >> Such behavior violates RFC8200, which specifies:
> >>
> >    > Extension headers (except for the Hop-by-Hop Options header) are not
> >    > processed, inserted, or deleted by any node along a packet's delivery
> >    > path, until the packet reaches the node (or each of the set of nodes,
> >    > in the case of multicast) identified in the Destination Address field
> >    > of the IPv6 header.
> >>
> >> Note, of course, that the reference of "Destination Address" in RFC8200
> >> is clearly the final destination of the packet -- for instance, RFC8200
> >
> > I hear and can understand your reading of RFC8200.
>
> Could you please check RFC8200, and tell me what other possible
> interpretation of "Destination Address" you might have, in the context
> of RFC8200.
>
> RFC8200 does not even specify any routing header types. SO...where's the
> ambiguity?
>
>
>
> > At minimum, I think that we can agree that there is another reading, as expressed by other WG participants, and hence I disagree with "of course".
>
> No, I argue that there is not. IN fact, I argue that folks have been
> following that strategy for way too long, and that's quite frustrating.
>
>
>
> > Personally, I understand "Destination Address" as "Destination Address field of the IPv6 header." as indicated explicitly in the text quoted.
>
> The quoted text is from RFC8200. In the context of RFC8200 the
> Destination Address can only contain the ultimate destination of the
> packet. Where's the ambiguity?
>
> And let me ask you, as chair, another question, that will lead you to
> the same place: is IPv6 and end to end protocol?
>
>
> The fact that I may claim that RFC8200 contains a receipe for BBQ does
> not actually mean that that's the case.
>
>
>
> > I'm fine with having this clarified with 6MAND chairs and AD. That been said, the Internet AD would have an opportunity to DISCUSS this.
>
> For the record, I think this is a major issue that should be cleared
> before it can be claimed that there is consensus to request publication
> of this document.
>

[ .. and once again / still with no hats ]

I'd suggest that *everyone* read RFC7282 - "On Consensus and Humming
in the IETF" - being a Pete Resnick document, it is clear, concise and
a pleasant read.

Unfortunately it's also descriptive, rather than prescriptive, and so
people may take away different things from it, but it's *still* a
useful read...

W

>
>
> >
> >> does not specify any routing header type, and hence the meaning is
> >> unambiguous (there's no destination other than the final destination of
> >> the packet).
> >>
> >> This is of course in line with IPv6 being and end-to-end protocol, and
> >> crucial for other related mechanisms to work as expected (such as IPsec
> >> AH). Please also check: draft-smith-6man-in-flight-eh-insertion-harmful.
> >>
> >> So, in order to proceed with the document, there are multiple options
> >> forward:
> >>
> >> 1) Just remove the corresponding text/behavior
> >
> > That is indeed one option. But as of today, this is not my assumption.
> >
> >> 2) Implement a similar mechanism in an RFC8200-compliant manner (e.g.,
> >> re-encap)
> >
> > SRH insert is out of scope of this specification. So yes, IPv6 encaps is used.
> > We are talking SRH removal. I'm assuming that you are referring to PSP. My understanding is that this function (PSP) is to distribute the (forwarding plane) load between the PSP and the USP. In a way similar to MPLS PHP. But in all cases, this is not about SRH insertion.
>
> It's about SRH removal, which is also forbiden by RFC8200.
>
>
>
>
> >> 3) Do the necessary standards work to update RFC8200, such that it
> >> allows this sort of behavior, and only ship the network-programming
> >> draft for publication when at least 6man has consensus to proceed on
> >> that path.
> >
> > Not the preferred path as of today.
>
> Yes, it should be evident that it seems the preferred path has been
> (starting with EH insertion at the time) to circumvent existing
> specifications.
>
>
>
> >
> >> P.S.: I will go through the document once again... but the same
> >> reasoning should be applied to any EH-insertion/removal at a place other
> >> than the source of the packet or its final destination.
> >
> > It looks to me that SRH insertion and SRH removal are to be treated differently.
>
> I don't see how or why. Both violate the same requirement in RFC8200.
>
>
> Thanks,
> --
> Fernando Gont
> SI6 Networks
> e-mail: fgont@si6networks.com
> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
>
>
>
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf