Re: [spring] [IPv6] Requiring Tunneling - subject change
"Martin Vigoureux (Nokia)" <martin.vigoureux@nokia.com> Thu, 28 March 2024 15:58 UTC
Return-Path: <martin.vigoureux@nokia.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49FDFC169428; Thu, 28 Mar 2024 08:58:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.177
X-Spam-Level:
X-Spam-Status: No, score=-2.177 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.08, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nokia.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o7rM62ORSvK7; Thu, 28 Mar 2024 08:58:12 -0700 (PDT)
Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03on2116.outbound.protection.outlook.com [40.107.105.116]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5310C151996; Thu, 28 Mar 2024 08:57:24 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dm5Jo7EZGp8Ff8LNKE5dSOCfjHgrj8aGxeJX14Uf9Ta9Toy8j2PvqgQICx8nuWum36idnOtXgJVp3oH32VDoumjuMNLO77dFpdcKQLe/5SgwTxJSminjTAoPSQPtc3msjfWIttwjN1SD2M1ez/RJyHgILONx2hs6lrWq9jgNTm0KRZu0AO/l8+5QqxgGIk8DNTXcp7IxFHWyG+zqemLg+u4CNBzDXX9bix9v6cinHwVbwJ68dtY1uNoBS+dBT6LNGKZeFOmevhmErdfGto6K1Gl2N80R1UolqAWYIasQj4qK/WNs2icWzqCXaVMRfJk6ZlNg1qr2Sj02SvYzIuLUAA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Ae5AppVFwJQTqgEmjaUjiHuY1pivZppY9Mv8n15C/Y4=; b=aO5SGM81TeY8PNyVJZLm0PfZEx4kloqYtPFLAUlwsfoaDpguJB8BXqwNkSoO+zFQNkRHUUyoxImefln9IcaWWn1Za6bTW5mOUrGjnCq9bgxeXe0Q3wKoOuRU7zPllJQjcPT2WBlJ75U1Gp0gRItIojYN6d6OSgsd1Xbyl9bLtUrBbF2El03sJxhvd16YXJOu5qMJ1rR7n1QYTs83vMh/CqvFplWwFw1wQ6uokQzpaLPzand1WjZsh7zaG1sig4BmXhPd158OjrpLX+VFijtHxFHyMrk2pPS7vei8jYSdYMZDO2/5BWWRYsoGNxnBmVFHwQv3KpuGMH1DJLUy/R4fuw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ae5AppVFwJQTqgEmjaUjiHuY1pivZppY9Mv8n15C/Y4=; b=EMtBBD5XcZpzNNWOPLuHsVQ8vCGHwz9GIg2CYSjHkP1kASsJJF9Fl8ARLo5+z5kc26Ty0Yy4ni313TxVxQn8K5ULQ0o5NMijBG86yZSyJSi78UmpXFrsQqx56iSN7PKSULFrMJq92rq9BWxgQhdz1iKx7LiNVd2uG/YWn2YMRAMGs12y3HVLXRjHZctbjiJvO9e+SKaM+w1fRr+uL03jdTuR8p642gJCOatPlSRNiBSVK/Lmqhp4GRUoWdsxkb0K5M2i7gUloSrC1EuwN2zDR4BmcY/coW4rj2GoAADiLKQuf4qYfErbvfWczBfDoHL1yinsN5n02pLSmYAyo0eMYw==
Received: from AM6PR07MB5560.eurprd07.prod.outlook.com (2603:10a6:20b:6f::22) by AS8PR07MB7576.eurprd07.prod.outlook.com (2603:10a6:20b:2a6::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7409.38; Thu, 28 Mar 2024 15:57:22 +0000
Received: from AM6PR07MB5560.eurprd07.prod.outlook.com ([fe80::4bba:985b:ad:55e8]) by AM6PR07MB5560.eurprd07.prod.outlook.com ([fe80::4bba:985b:ad:55e8%3]) with mapi id 15.20.7409.028; Thu, 28 Mar 2024 15:57:22 +0000
Message-ID: <d46fbd0c-67c6-4da3-85b5-a5c5916dbb17@nokia.com>
Date: Thu, 28 Mar 2024 16:57:20 +0100
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
To: ipv6@ietf.org, "spring@ietf.org" <spring@ietf.org>
References: <CAMMESszUUdDw-xnDtZKqz75g6SXZ+7mXtZujBKwN+hxypC-Kuw@mail.gmail.com> <CAOj+MMFTpKdNtE2SGubsBKkwbgdX2G5qBxBCViCu-EFmUXjfHw@mail.gmail.com> <CALx6S37CK69EU+59r_M8caO4MNRQFC8fgo4+VyTSgSE0aNTVTQ@mail.gmail.com> <CAOj+MMFHC6vdUK3MQ8xU44=ESf-_mq=PCT=8W_jr5WiTp50hyQ@mail.gmail.com> <CALx6S35Dn03qt9ziMv3=xtYKpdgR88SU0HDYirXr1tm4-Nz-ng@mail.gmail.com> <CAOj+MMF6D+fsDY-8tt7R9MJRAf3x+bk13MXadSPT2ozOpq7zrg@mail.gmail.com> <53e9e432-db61-4129-b766-b4c675b13012@joelhalpern.com>
From: "Martin Vigoureux (Nokia)" <martin.vigoureux@nokia.com>
In-Reply-To: <53e9e432-db61-4129-b766-b4c675b13012@joelhalpern.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: PA7P264CA0398.FRAP264.PROD.OUTLOOK.COM (2603:10a6:102:39b::21) To AM6PR07MB5560.eurprd07.prod.outlook.com (2603:10a6:20b:6f::22)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: AM6PR07MB5560:EE_|AS8PR07MB7576:EE_
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR07MB5560.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376005)(1800799015)(366007); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4d8e3e55-5b3c-4a6c-ed33-08dc4f3fc11b
X-MS-Exchange-CrossTenant-AuthSource: AM6PR07MB5560.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2024 15:57:22.2239 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: HT7xfOPiNKFBJcOqqKO7tswhRm0FSzKQdG5M2DIYjuS6gw1BNRevBRwIXWznbTI8IjDndUzHtHOCFHWeNzrDZ1yinJLZVbnKOdjymV9vH+w=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR07MB7576
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/rqj8Nck6HPFrwlN5Hs9CAtsaXFw>
Subject: Re: [spring] [IPv6] Requiring Tunneling - subject change
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Mar 2024 15:58:16 -0000
Hi Joel, Le 2024-03-28 à 16:46, Joel Halpern a écrit : > > CAUTION:This is an external email. Please be very careful when clicking > links or opening attachments. See the URL nok.it/ext for additional > information. > > Robert, as far as I can tell, you are asking for a different change than > any of the other proposals. If I understand, you are proposing that > even end hosts inside an SRv6 domain should encapsulate the underlying > IPv6 packet. In order to help the chairs keep track, and tell if there > are other folks who also support such a change, I have changed the > subject line and ask that if there is more to say, people use this > subject line. > > I look forward to comments from folks beyond Tom and Robert on this subject. before talking about a potential solution, could you confirm that the issue is about respecting a convention? regards -m > > Yours, > > Joel M. Halpern > > On 3/28/2024 11:40 AM, Robert Raszuk wrote: >> Hi Tom, >> >> Not really. >> >> RFC8200 defines an exception which is tunneling and says: >> As an exception to the default behavior, protocols that use UDP >> as a tunnel encapsulation may enable zero-checksum mode for a >> specific port (or set of ports) for sending and/or receiving. >> Any node implementing zero-checksum mode must follow the >> requirements specified in "Applicability Statement for the Use >> of IPv6 UDP Datagrams with Zero Checksums" [RFC6936 <https://datatracker.ietf.org/doc/html/rfc6936>]. >> >> So in practice if we always tunnel SRv6 there is no issue. >> >> Even Andrew agreed with that :) >> >> Cheers, >> Robert >> >> On Thu, Mar 28, 2024 at 4:36 PM Tom Herbert <tom@herbertland.com> wrote: >> >> On Thu, Mar 28, 2024 at 7:46 AM Robert Raszuk <robert@raszuk.net> >> wrote: >> > >> > Hi Tom, >> > >> > > because of SRH >> > >> > Ok I buy this that there are devices which do check checksum and >> are not final destination of the packets ... I was more talking >> about plain forwarding devices (aka P routers). Then I doubt >> firewalls would be sitting in the core of the networks. >> > >> > But let me come black to what I believe is the main disconnect. >> > >> > Why SRH would cause an issue ? I think there is claimed issue >> *ONLY* with SRv6 packets which are not encapsulated - call it raw >> - sent by the hosts which talk SRv6 and sent with more then one >> SID/uSID which may get swapped on the way. >> > >> > Because only in those cases the destination address will be >> changing while checksum of the tunnel header will not be zero. >> > >> > So what we should I think discuss are really B.1 and B.2.2 cases. >> >> Robert, >> >> The scenario that I'm talking about is really simple, and it's not >> specific to segment routing. If someone sends a TCP in an IPv6 packet >> with no routing header then the convention is that the TCP checksum is >> valid end to end. So if the addresses are changed in flight, like in >> NAT, then we expect that some part of the packet covered by the >> checksum is adjusted to offset the change. If a packet is sent in >> segment routing without an SRH with EtherType 0x86DD then it IS an >> IPv6 packet to the network so all the conventions and requirements of >> IPv6 should be applied. IMO, if SRv6 can't maintain these conventions >> and requirements then it should fork from IPv6 and use a different >> EtherType. >> >> Tom >> >> > >> > Francois, Pablo - could you comment on this how often do we see >> those type of SRv6 deployments ? And also could you comment if >> operator who enables SRv6 in the first place sees those checksum >> errors how difficult is to address it ? >> > >> > Thx, >> > Robert >> > >> > >> > On Thu, Mar 28, 2024 at 3:29 PM Tom Herbert >> <tom@herbertland.com> wrote: >> >> >> >> On Thu, Mar 28, 2024 at 6:26 AM Robert Raszuk >> <robert@raszuk.net> wrote: >> >> > >> >> > Hi Alvaro, >> >> > >> >> > On this specific topic I think you have flatted it a bit too >> much. >> >> > >> >> > These are apparently the options on the table: >> >> > >> >> > A) Original packet get's encapsulated with IPv6 header >> >> > >> >> > A.1 SHR is added to it >> >> > >> >> > A.1.1. Regular SIDs are used >> >> > A.1.2 Compresses SIDs are used >> >> > >> >> > A.2 SRH is not added to it >> >> > >> >> > A.2.1. Regular SID is used as destination >> >> > A.2.2 Compresses SIDs are used in a container >> >> > A.2.3 Compresses SID is used >> >> > >> >> > B) Original packet get's send from SRv6 host (without >> encapsulation) >> >> > >> >> > B.1 SHR is added to it >> >> > >> >> > B.1.1. Regular SIDs are used >> >> > B.1.2 Compresses SIDs are used >> >> > >> >> > B.2 SRH is not added to it >> >> > >> >> > B.2.1. Regular SID is used as destination >> >> > B.2.2 Compresses SIDs are used in a container >> >> > B.2.3 Compresses SID is used >> >> > >> >> > So within all checksum related discussions so far it seems >> that the only concern is about B.2.2 and perhaps B.1 however folks >> did state that if there is SRH added there is no issue so I am not >> sure how the presence of SRH fixes it. >> >> > >> >> > Maybe there was some assumption that presence of SRH mandates >> encapsulation, but I do not believe this is the case for native >> SRv6 hosts. >> >> > >> >> > All in all I think it should be no business for transit nodes >> to verify packet's upper layer checksum. I do not know if there is >> any RFC which would describe what is an expected behavior for >> transit nodes or even say that they MAY do it. >> >> >> >> Robert, >> >> >> >> I can go further than that. I believe that intermediate nodes >> have no >> >> business parsing into the transport layer, and yet firewalls do >> that >> >> all the time even though there is no standard RFC on it (I've asked >> >> for someone to formalize the requirements of firewalls, but to no >> >> avail). Validating the checksum in flight is an instance of >> this, and >> >> there are devices that commonly do this in deployment. Protocol >> >> specific checksum offload in NICs is one example. Also, if >> someone is >> >> seeing checksum failures in their network, an obvious action is to >> >> sample packets from routers in the path and look at the traces. >> If the >> >> checksum is incorrect on the wire because of SRH then the operator >> >> sees a whole bunch of checksum errors at the router, but has no >> way to >> >> distinguish those packets that are actually good from those >> that are >> >> bad. >> >> >> >> It's a long established convention in IP that the transport >> checksum >> >> is maintained to be correct on the wire-- this is done in NAT by >> >> adjusting the checksum directly, there's also checksum neutral NAT >> >> that adjusts another part of the IPv6 header to keep the transport >> >> layer checksum correct. IMO, deviating from this convention is >> risky, >> >> not just to SRH packets but that can have collateral damage like >> >> breaking the user's ability to debug bad links as I described >> above. >> >> >> >> Tom >> >> >> >> > >> >> > Kind regards, >> >> > Robert >> >> > >> >> > >> >> > >> >> > On Thu, Mar 28, 2024 at 1:06 PM Alvaro Retana >> <aretana.ietf@gmail.com> wrote: >> >> >> >> >> >> Focusing on the C-SID draft, some have suggested requiring the >> >> >> presence of the SRH whenever C-SIDs are used. Please discuss >> whether >> >> >> that is the desired behavior (or not) -- please be specific when >> >> >> debating the benefits or consequences of either behavior. >> >> >> >> >> >> Please keep the related (but independent) discussion of >> requiring the >> >> >> SRH whenever SRv6 is used separate. This larger topic may impact >> >> >> several documents and is better handled in a different >> thread (with >> >> >> 6man and spring included). >> >> >> >> >> >> Thanks! >> >> >> >> >> >> Alvaro >> >> >> -- for spring-chairs >> >> >> >> >> >> >> -------------------------------------------------------------------- >> >> >> IETF IPv6 working group mailing list >> >> >> ipv6@ietf.org >> >> >> Administrative Requests: >> https://www.ietf.org/mailman/listinfo/ipv6 >> >> >> >> -------------------------------------------------------------------- >> >> > >> >> > >> -------------------------------------------------------------------- >> >> > IETF IPv6 working group mailing list >> >> > ipv6@ietf.org >> >> > Administrative Requests: >> https://www.ietf.org/mailman/listinfo/ipv6 >> >> > >> -------------------------------------------------------------------- >> > > -------------------------------------------------------------------- > IETF IPv6 working group mailing list > ipv6@ietf.org > Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 > --------------------------------------------------------------------
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Robert Raszuk
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- [spring] Subject: Mandating SRH when using C-SIDs… Alvaro Retana
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Robert Raszuk
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Robert Raszuk
- [spring] Requiring Tunneling - subject change Joel Halpern
- Re: [spring] [IPv6] Requiring Tunneling - subject… Martin Vigoureux (Nokia)
- Re: [spring] [IPv6] Requiring Tunneling - subject… Bob Hinden
- Re: [spring] Requiring Tunneling - subject change Robert Raszuk
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] Subject: Mandating SRH when using C-… Alvaro Retana
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Francois Clad
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Mark Smith
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Francois Clad
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Francois Clad
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Robert Raszuk
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Ole Troan
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Robert Raszuk
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Robert Raszuk
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Robert Raszuk
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Michael Richardson
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Ole Trøan
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Suresh Krishnan
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Francois Clad
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Adrian Farrel
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Bob Hinden
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Cheng Li
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Robert Raszuk
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Michael Richardson
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Michael Richardson
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Suresh Krishnan
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tal Mizrahi
- Re: [spring] Subject: Mandating SRH when using C-… Antoine FRESSANCOURT
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Tom Herbert
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Robert Raszuk
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Martin Vigoureux (Nokia)
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Ketan Talaulikar
- Re: [spring] [IPv6] Subject: Mandating SRH when u… Mark Smith