Re: [spring] 6MAN WGLC: draft-ietf-6man-sids

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Mon, 10 October 2022 13:45 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC6BEC1522B4; Mon, 10 Oct 2022 06:45:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.605
X-Spam-Level:
X-Spam-Status: No, score=-9.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=RQrn3oTk; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=YtOuKwAH
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id myrXemOAXHN0; Mon, 10 Oct 2022 06:45:23 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0CB14C1522B1; Mon, 10 Oct 2022 06:45:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=26963; q=dns/txt; s=iport; t=1665409523; x=1666619123; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=iCPJX4W7/WSOcWbW2k77ItqBDRVH+CiS3bMrjPEzDCo=; b=RQrn3oTkQIGNnOrfIzHA+9Tpk/tU3pRiHl/fuCgdBMfkXiVHbsv9KBiS vNfZBQdDBJ130Ombr6ASvxsjVpOlHuz+7roIijai3hwrbitJdukEpskpT fS9HUt1t772zm84CBNXHPrEqcz+8BhtWWOJreF5BPpeJeha1J6GCHRlaC w=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:rn27KxDmvaS3gaHvbDxmUyQVaBdPi9zP1kY95pkmjudIdaKut9TnM VfE7PpgxFnOQc3A6v1ChuaX1sKoWWEJ7Zub9nxXdptKWkwJjMwMlFkmB8iIQUTwMP/taXk8G 8JPHF9o9n22Kw5bAsH7MlbTuXa1qzUVH0aXCA==
IronPort-Data: A9a23:yDPQwK2j1TRciV3DRvbD5fhxkn2cJEfYwER7XKvMYLTBsI5bpz0Pm DQeUDqAPfaNZWbxLdB0bo6wphtU7JTVyYRqHVRq3Hw8FHgiRegpqji6wuYcGwvIc6UvmWo+t 512huHodZxyFjmGzvuUGuCJQUNUjclkfZKhTr+ZUsxNbVU8En140Us7w7RRbrNA2LBVPSvc4 bsenOWHULOV82Yc3rU8sv/rRLtH5ZweiRtA1rAMTakjUGz2yxH5OKkiyZSZdBMUdGX78tmSH I4vxJnhlo/QEoxE5tmNyt4XeWVSKlLe0JTnZnd+A8CfbhZ+SiMawo8YCaIhSEdupTzRuP1D9 fVo8qOKcFJ8VkHMsLx1vxhwCSpyO+hN/6XKZCP5us2IxEqAeHzpqxlsJBhpZstDpaAmWicXq KBwxDMlNnhvg8q73qO9Qephrs8iN8LseogYvxmMyBmIV6x6GMqbG/2iCdlw1ilrosJQR//lY 8c2dhBEchvwUyFMNQJCYH45tL742iagG9FCk3qOvbA25Wf7zQFt3v7qKtW9Ut2SW5t9n0uEq CTB5WuRKgsdPtGF1RKf+2m+m+yJmy7nMKoQEb2Q9PlnhF2awnQeEhtQXly+ycRVkWakUN5Zb kcT4Cdr9u459VegSZ/2WBjQTGO4UgA0S/NzLrUHyQG05KOMxCurO0ghCQF7UYlz3CMpfgAC2 liMltLvIDVgtryJVH6Qnot4SxvvY0D5ykdfOEc5oRs5D8rL+9ti0k2VJjp3OOvk0IKtQ26YL yWi9nBWulkFsSIcO0xXF3j9gjmsr4LFVQkzjuk8dj34tlMgDGJJinDB1LQ2xexLIIDcRV6bs T1f3cOf9+sJS5qKkURhodnh/pn3vZ5p0xWF0TaD+qXNERz3qxZPmqgLullDyL9BaJpsRNMQS Ba7VfltzJFSJmC2SqR8fpi8Dc8npYC5S4q4DayMNIEePcAsHONiwM2ITRPOt4wKuBV8+ZzTx b/AGSpRJS9AUP8+nGbeqxk1ju51rszB+Y8jbcmrk0v4uVZvTHWUUrwCeECfdfw06bjsnekm2 4g3Cid+8D0GCLeWSnCOqeY7dAlaRVBlXsqeg5IMKYa+zv9ORTtJ5wn5m+1xIuSIXs19y4/1w 51KchQGlgKj3ieZeF/ih7IKQOqHYKuTZEkTZUQEVWtEEVB/CWpzxM/zr6cKQIQ=
IronPort-HdrOrdr: A9a23:xwRbLqn2jLqjlQThU11WIOFOJhfpDfOZimdD5ihNYBxZY6Wkfp +V8sjzhCWatN9OYh0dcIi7SdW9qXO1z+8Q3WBjB8bcYOCGghrlEGgG1+rfKlLbalXDH4JmpM Vdmu1FeaDN5DtB/InHCWuDYq0dKbC8mcjC74q/vhRQpENRGttdBmxCe2Gm+zhNNXB77O0CZf yhD6R81l+dUEVSSv7+KmgOXuDFqdGOvonhewQ6Cxku7xTLpS+06ZbheiLokCs2Yndq+/MP4G LFmwv26uGIqPeg0CLR0GfV8tB/hMbh8N1eH8aB4/JlawkEyzzYJLiJaYfy/gzdk9vfrWrCV+ O85yvICv4DqE85uFvF5icFlTOQlgrGoEWSt2NwyUGT0PARAghKUvaoQeliA0DkA41KhqAl7E sD5RPri3IcZymw7BjV9pzGUQpnmVGzpmdnmekPj2ZHWY9bc7NJq5cDlXklW6voMRiKobzPKt MeRP309bJTaxeXfnrZtm5gzJilWWkyBA6PRgwHttaO2zZbkXhlxw9ArfZv00so5dY4Ud1J9u 7EOqNnmPVHSdIXd7t0AKMETdGsAmLATBrQOCaZIEjhFqsAJ3XRwqSHqokd9aWvYtgF3ZEykJ POXBdRsnMzYVvnDYmU0JhC4nn2MROAtPTWu7ZjDrRCy8nBreDQQF++oXgV4r6dn8k=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.95,173,1661817600"; d="scan'208,217";a="922412000"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 10 Oct 2022 13:45:21 +0000
Received: from mail.cisco.com (xfe-rcd-002.cisco.com [173.37.227.250]) by rcdn-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id 29ADjKWq005836 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 10 Oct 2022 13:45:20 GMT
Received: from xfe-rtp-003.cisco.com (64.101.210.233) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9; Mon, 10 Oct 2022 08:45:20 -0500
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-003.cisco.com (64.101.210.233) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.9 via Frontend Transport; Mon, 10 Oct 2022 09:45:20 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HbBUp7LX6WsPbSPZye9xhwOAJQBXe0dHHxR/047Ju/MrzIIR8nlNvXdSBLIGdOnccXhfjpJC4eSzxvj2C8m721drWdDYT4A6y+oeup5GX++bKpa7FQM980w2NqnXy7oMyLC/glcUhBql+nY0buiBqMnbqkC+wwsGa1EY59ECdmkKfz2xVdzUmBv6G1B6TKtXQG0RJb7cC9BJLTvwX1lU2VgcsD+/N6HL3WQBm/HwpocEh/IvjQ6PD5s+VgivfAawHxVL9Og+OoTwF+4xicPuGtx0JLCUlTvjCZ/fMNF+433eso7mHHit4IK6pOXO7ZUTNKJ3lJ2jtJDdUrxbOC2dxw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=iCPJX4W7/WSOcWbW2k77ItqBDRVH+CiS3bMrjPEzDCo=; b=nxef0yvxz4t8Y+WF6iofkzzl8iI6kgqcP2NqnAg3C0pY+Vz5ONGp5n2RMnzDaeEstbgprZ6/RVc3sc6o6vZ+5wBNUWbw72kgXoOYLWASOZQ/vxv4V6qhv9dw8Ij/3ZCG4q72i/HwI5nC+HWWjsN264i0n+GRtJrPrebx5friWX3CMemRuHtmdQOIzfECJOKkuvlZeozFo5Po/znx0sv4IiuLF6ROsF9kR2UAmsvfSrRu1ymSj5yHUCP5TJpyJN9vqutAOABfUd9Wc5aKfqFTQcOpvg2ACUX7rMz2KnyptHovhETY3lp3i6xHyzTxeJvyVtJtYVLrOq2/s+VZEiQvAw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iCPJX4W7/WSOcWbW2k77ItqBDRVH+CiS3bMrjPEzDCo=; b=YtOuKwAHubkt+bX9VyFOwQDF4q9iFBWwzJ5kU+K9YdKK2aOw1ji8G5r7U/24fmyxxV8pQJ+NC99YozxhxjSWGOK7xgfhOLZ5OSFxiwN5hbf1i+B89OnZYNSDD7zbLMX7PmKLcPuBBEqdxChm5MZer1xua+rMQcBIxzm/R0vkteU=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by PH0PR11MB5625.namprd11.prod.outlook.com (2603:10b6:510:ea::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5676.15; Mon, 10 Oct 2022 13:45:18 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::f9aa:2506:847e:baab]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::f9aa:2506:847e:baab%6]) with mapi id 15.20.5709.015; Mon, 10 Oct 2022 13:45:18 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: Joel Halpern <jmh@joelhalpern.com>, Robert Raszuk <robert@raszuk.net>
CC: 6man <ipv6@ietf.org>, SPRING WG List <spring@ietf.org>
Thread-Topic: [spring] 6MAN WGLC: draft-ietf-6man-sids
Thread-Index: AQHY2fsvT/geXKNxiESo74l0YgpP5q4Dr9sAgAAAxgCAAAKtgIAAZHeAgACuSYCAABQwAIAAEHwAgAAVMYCAASVqgIABZZ0AgAAbwQCAACPtgA==
Date: Mon, 10 Oct 2022 13:45:18 +0000
Message-ID: <BAAD744A-2AD2-4498-90EC-9C9A184E0A8A@cisco.com>
References: <CAFU7BARixwPZTrNQOuEw3WP-FqUsVwTj7btMTahcMbXm_NqWGw@mail.gmail.com> <CAB75xn4+N31=ggO03AAQJANv7RgHaC1eNGXRUQ9B20rLK+nJyg@mail.gmail.com> <E77D8982-11E9-45F9-81BF-3CA1E1F6B745@gmail.com> <CAB75xn4Zme4KOjPuY1_-4jCKTk1jshbq8X645zXhYQLiKB+N9g@mail.gmail.com> <54A38015-95AD-41F0-8E9D-76B3E62AA55B@gmail.com> <bdd7bf12-f712-3fe5-2698-9272c16ddded@joelhalpern.com> <58E77509-A1A1-4CE8-9EE4-22BEEEA8B62E@gmail.com> <98a941e4-0fff-ced1-d4ca-4406368eac31@joelhalpern.com> <4DC495DF-AD6B-4D60-80C4-B836DD365A0C@gmail.com> <CAOj+MMEx7+jWN1yC=81dMwo5GmqbhyHqOZr9W2_qzN9BNjs+Zw@mail.gmail.com> <ab55e9c0-60b9-2986-07f1-38c28852009e@joelhalpern.com> <CAOj+MMEn6Dz-Rz0PRRvR8VXT8idAQm+rLuouWJoNz-dA+kRkJQ@mail.gmail.com> <1fe2d387-8ecc-5240-092c-84a5978af5e4@gmail.com> <CAOj+MME6Nb3MLQCiGQ5S06Cwj6d3Z+aoSpxwFdtoFaV-yPPuJQ@mail.gmail.com> <e65772a1-bc86-c59c-e99f-7cabf92f28a4@joelhalpern.com> <183BB8B9-A338-4136-8546-7C7858B4D4E4@cisco.com> <35484ed3-509a-39ba-6a16-8f2bf807f4f2@joelhalpern.com>
In-Reply-To: <35484ed3-509a-39ba-6a16-8f2bf807f4f2@joelhalpern.com>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.65.22091101
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB4966:EE_|PH0PR11MB5625:EE_
x-ms-office365-filtering-correlation-id: 81132c21-0dd2-4a11-1a4a-08daaac5ab2b
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(4636009)(136003)(396003)(346002)(376002)(366004)(39860400002)(451199015)(21615005)(8936002)(5660300002)(41300700001)(76116006)(53546011)(2906002)(6506007)(71200400001)(91956017)(33656002)(86362001)(186003)(83380400001)(478600001)(38070700005)(66574015)(166002)(54906003)(6512007)(66556008)(66446008)(66476007)(66946007)(4326008)(8676002)(2616005)(966005)(316002)(6486002)(38100700002)(64756008)(36756003)(122000001)(110136005)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 1OgWLta2Ywz7Ma0QHCBXmFSvPOrbgXKf6SVbqELzuW4mpVDaSN+IUwpvZc/vjDV6eTfsFUCyXLTm1OR6SumWlrzm9e0NniuUE+jvlSar8dKmDNZTp0z0/+4gQv9x0R/b+XqlVAVvOPMaoxXnUSFeTHFm/G45CrjQ1LEtUsMxVaCGGejZDxV71h3JmuqYZHYV685x6PQ+6JwrXfgMn5jMp+r0W9+j37e4dS64GsmpBdiNnZNbtvX47wGi4V4gCqE2djI30S/5Z/CBGh+0zPRzw/eRi4l4YrljTEKXr6gDTPDs/oJurpF+uH8b6HTtY+0McZbJMd7mQRR8zsTQ+LMs+1EFohdICSe63mAPxH8QEcd3h8e1V2O3EWA+DJ5JK/wi5hHaH6/fgxq+NQxOw5V9v5Z8ZpJCP+/29MGkg8SqS6EYijAnmq2eXR1OxV/914IJoMPT+x3KdzVQ2I86w877uMxz5A50R+ZDfw/66dkZBfNSedXYo9o5/cSRAnLxM9CfyEaXMqS4iEyTz8ICzuYLUBJmbdwhoCYcBWeMEe4LMpHqFI2vO+l0anLVg3nMyQtLtFFW+O5ys5XG+W6/8uoVTUlUlEtgeoCj3HFXIGvLQlZDYGNlvF0RBgwvPMN6DBgzoG4sZ0tRNoUu9nDy8QG7GKW7+GaSmhqid0ilMlNcXEtjL8LX4434hYNsvCnQayUD1OOEuhmHWi3ukNB9CcxiL/2jKovcJWfvA0DgM8bzKKs9qHQmoUpUm0UrDRMA400bqCssSw5lOvgrV9ei7xMIy5jBumdadrWUMrnYUcFnVz9jL6PSJmkIO4WaOdhJSM/h5hpWmjHsZ2w20OdiCQvUsXJlHawmeIRxVNs2A7cCGcVdOpH6Srr9gZUEx0lGI0lwteYw14kQrBqEEf/7YrzvM84iDQtcHqPNQEILeGNIj98Qjn6iss0FrSwEF8GeGmbpO5Ka/FIIqW1DDBU72bhquKcoMPGV51BhVuUW26splH143t9DsvRcIUoU1HeZsSS7jQjdlWY4A291UHcUuaJT7JvI6VsRMQcOHdMr9BJvQXa6k/m95wrY1OPIhAfBXXx8t+sP3JTEL/9FS0RzjAToHeDOtKVfJHld4U1kV7L3CJnbbLo9GLf7hbq3C3d0qT0N6Lk5tcoR58VHZnW/aCDohNAmM7wpVxtazS2+uKSuugRMDJHFydSm5s15sAhIpMatDASILwpMnUalzdz1WU/TDorItYqejIcLSb42uTpRn+M9FGYsVjsGyC3zoRP4u6UYsgsoUeBz9vrakI/uvXX20NmX5jXHQLc7EGTfAv+590YDuSYsvHxKBdtSR4E1fOnx1F6JPbgPC4B3FCN7Fbvf7+SXk1aieQ84THBKiL8tlV3jy+Scn1WV1XM5v9d78p+Y+s8zpLLaxR8pIYrNn/D+c+3hk4YgWCptf5JhgBxm9gz/nqAfF79UdtIUKCGb6ZN3Q9FUT6YH0BkbV97n74s8uismCo73VLbkZsA8oJdfmHT+v+LYDkIazUJ4v6pKljwXXv6dsCWgjmUFlUiixvlh0eZCyUQDho4v1FwHFF7BtSQ0oRAOf5zJHhCdmq9I6jjSrnX3GkUtSl2s4RQPzrl/zFj9BEZEmOmcV20/f2D2ACHOi/1tHLz3/b7FpSrfecRa
Content-Type: multipart/alternative; boundary="_000_BAAD744A2AD2449890EC9C9A184E0A8Aciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 81132c21-0dd2-4a11-1a4a-08daaac5ab2b
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Oct 2022 13:45:18.2885 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EXUA1E4bdpZBaVLYmckEircxYkDfYUb+16QusbOzk2/YjqlvCVj/jvi44lJaKPXgYYRW9oJCC7Kzi9zza94O3Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB5625
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.227.250, xfe-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/st0KezHaisNyyQLcZtCkXSAFDUs>
Subject: Re: [spring] 6MAN WGLC: draft-ietf-6man-sids
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Oct 2022 13:45:27 -0000

Hi Joel,

So, your sentence below "We require, per the RFC, blocking SRH outside of the limited domain for many reasons" was to be read as "do not leak SRH outside your own domain" ? If so, I guess we agree for 99%, the remaining 1% seems to be related to Robert's use case, which is valid in my mind. All in all, I really hope that IPv6 packets with extension headers could travel safely the global public Internet without being dropped, hence my original reply.

And of course, this email and the previous one are written without any hat and are not related to Suresh's I-D.

Regards

-éric


From: Joel Halpern <jmh@joelhalpern.com>
Date: Monday, 10 October 2022 at 15:36
To: Eric Vyncke <evyncke@cisco.com>, Robert Raszuk <robert@raszuk.net>
Cc: 6man <ipv6@ietf.org>, SPRING WG List <spring@ietf.org>
Subject: Re: [spring] 6MAN WGLC: draft-ietf-6man-sids


Eric, you seem to be objecting to something I did not say.  I have not asked, and do not expect, for the document to mandate or even suggest that arbitrary domains should drop packets with SRH.  I will note that given that SRH is explicitly for limited domains, an operator who chooses to drop such packets is well within his rights.  And I am told there are such operators.  But that is not what I asked for this document.

What I asked, and I believe Suresh has agreed to, and I beleive the WG supports, is that the document note that an operator using SRv6 who does not use the allocated SID, and block the allocated SID at his boundaries, has to be more careful to define his ingress and egress filters to comply with the existing RFCs which require that SRv6 not leak inwards or outwards.

Robert objected to that requirement.  And propounde3d a use case that he says he needs.  I pointed out that the use case violates the RFC.  And then pointed out one of the many reasons why the IETF has put in the requirement which he wants to violate.

Yours,

Joel
On 10/10/2022 5:57 AM, Eric Vyncke (evyncke) wrote:
Hmmm I really wonder why a transit network should look into my packets (to check for SRH) and decide to drop my packets; assuming of course that my packets are not damaging the transit network (like some hop-by-hop years ago) or attempting to trick my network (anti-spoofing or using transit provider own SID -- both being layer-3 filters BTW).

-éric

From: ipv6 <ipv6-bounces@ietf.org><mailto:ipv6-bounces@ietf.org> on behalf of Joel Halpern <jmh@joelhalpern.com><mailto:jmh@joelhalpern.com>
Date: Sunday, 9 October 2022 at 16:38
To: Robert Raszuk <robert@raszuk.net><mailto:robert@raszuk.net>
Cc: 6man <ipv6@ietf.org><mailto:ipv6@ietf.org>, SPRING WG List <spring@ietf.org><mailto:spring@ietf.org>
Subject: Re: [spring] 6MAN WGLC: draft-ietf-6man-sids


We require, per the RFC, blocking SRH outside of the limited domain for many reasons.

One example is that it turns SRH into a powerful attack vector, given that source address spoofing means there is little way to tell whether an unencapsulated packet actually came from another piece of the same domain.

So yes, I think making this restriction clear in this RFC is important and useful.

Yours,

Joel
On 10/8/2022 5:07 PM, Robert Raszuk wrote:
Hi Brian,

Completely agree.

One thing is not to guarantee anything in respect to forwarding IPv6 packets with SRH (or any other extension header) and the other thing is to on purpose recommending killing it at interdomain boundary as some sort of evil.

Cheers,
R.



On Sat, Oct 8, 2022 at 9:51 PM Brian E Carpenter <brian.e.carpenter@gmail.com<mailto:brian.e.carpenter@gmail.com>> wrote:
Robert,

> If there is any spec which mandates that someone will drop my IPv6 packets only because they contain SRH in the IPv6 header I consider this an evil and unjustified action.

The Internet is more or less opaque to most extension headers, especially to recently defined ones, so I don't hold out much hope for SRH outside SR domains.

https://www.rfc-editor.org/rfc/rfc9098.html
https://datatracker.ietf.org/doc/html/draft-elkins-v6ops-eh-deepdive-fw

Regards
    Brian Carpenter

On 09-Oct-22 07:52, Robert Raszuk wrote:
> Hi Joel,
>
> I was hoping this is apparent so let me restate that I do not buy into "limited domain" business for SRv6.
>
> I have N sites connected over v6 Internet. I want to send IPv6 packets between my "distributed globally limited domain" without yet one more encap.
>
> If there is any spec which mandates that someone will drop my IPv6 packets only because they contain SRH in the IPv6 header I consider this an evil and unjustified action.
>
> Kind regards,
> Robert
>
> On Sat, Oct 8, 2022 at 7:40 PM Joel Halpern <jmh@joelhalpern.com<mailto:jmh@joelhalpern.com> <mailto:jmh@joelhalpern.com<mailto:jmh@joelhalpern.com>>> wrote:
>
>     Robert, I am having trouble understanding your email.
>
>     1) A Domain would only filter the allocated SIDs plus what it chooses to use for SRv6.
>
>     2) Whatever it a domain filters should be irrelevant to any other domain, since by definition SRv6 is for use only within a limited domain.  So as far as I can see there is no way a domain can apply incorrect filtering.
>
>     Yours,
>
>     Joel
>
>     On 10/8/2022 3:16 AM, Robert Raszuk wrote:
>>     Hi Suresh,
>>
>>         NEW:
>>         In case the deployments do not use this allocated prefix additional care needs to be exercised at network ingress and egress points so that SRv6 packets do not leak out of SR domains and they do not accidentally enter SR unaware domains.
>>
>>
>>     IMO this is too broad. I would say that such ingress filtering could/should happen only if dst or locator is within locally  configured/allocated prefixes. Otherwise it is pure IPv6 transit and I see no harm not to allow it.
>>
>>         Similarly as stated in Section 5.1 of RFC8754 packets entering an SR domain from the outside need to be configured to filter out the selected prefix if it is different from the prefix allocated here.
>>
>>
>>     Again the way I read it this kills pure IPv6 transit for SRv6 packets. Why ?
>>
>>     (Well I know the answer to "why" from our endless discussions about SRv6 itself and network programming however I still see no need to mandate in any spec to treat SRv6 packets as unwanted/forbidden for pure IPv6 transit.)
>>
>>     Thx,
>>     R.
>
>
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org<mailto:ipv6@ietf.org>
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------