Re: [spring] Chair Review of draft-ietf-spring-srv6-srh-compression-11

Joel Halpern <jmh@joelhalpern.com> Wed, 27 March 2024 15:50 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A7E1C14CE30 for <spring@ietfa.amsl.com>; Wed, 27 Mar 2024 08:50:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2kstcUT-cMUz for <spring@ietfa.amsl.com>; Wed, 27 Mar 2024 08:50:53 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E1F69C14F604 for <spring@ietf.org>; Wed, 27 Mar 2024 08:50:53 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 4V4WNY47d6z6G9kY; Wed, 27 Mar 2024 08:50:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1711554653; bh=He99AoiZkluoGL9jOzBiPgZdR0fII9aY0NTMiK6XsNI=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=L+Q+A5urEolwad7q6Mb48HEvS2ndABuG3f3mTr/gsnpmkT/ws0kDpd0wzx0+P8lvw CPmmWZpurX92tFd+RSNrCSgzfsPuWQxpLzFMpYXd/AUTFxQ+uaqd0THvRTeLRZzJf/ mBE5R/EuRigpC61JtHsEEKrRcsrOTMzjsM7PX8Ww=
X-Quarantine-ID: <xtiEVSFYnRmz>
X-Virus-Scanned: Debian amavisd-new at a2.tigertech.net
Received: from [192.168.22.20] (unknown [50.233.136.230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 4V4WNY0MvKz6G7wR; Wed, 27 Mar 2024 08:50:52 -0700 (PDT)
Message-ID: <a2b14c41-2de2-4c29-ab87-ecc19f65c0d2@joelhalpern.com>
Date: Wed, 27 Mar 2024 11:50:51 -0400
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: Robert Raszuk <robert@raszuk.net>
Cc: "spring@ietf.org" <spring@ietf.org>
References: <CAMMESsw=PihfkO3nECiBnCALfCC=vTRn6c1_OYPK-jT5=yHFZA@mail.gmail.com> <CAMMESszTSki9ct+B+spuX=JOo33Uecv=AFwLmVcQw_cdkBu0Tw@mail.gmail.com> <CALx6S36VW9R+vfsM4Q9mxbVCRg1JBdw8kJF+chpnnLneNF36RQ@mail.gmail.com> <BL0PR05MB531629A0BC6BF060A935DF0DAE352@BL0PR05MB5316.namprd05.prod.outlook.com> <PH0PR03MB6300DD1FAFAB9234AEA12131F6352@PH0PR03MB6300.namprd03.prod.outlook.com> <BL0PR05MB53168835A27B7C9AE33F18D0AE352@BL0PR05MB5316.namprd05.prod.outlook.com> <PH0PR03MB6300C058ABBD13D7CA8D939BF6352@PH0PR03MB6300.namprd03.prod.outlook.com> <BL0PR05MB531627290AD6D971806D897CAE352@BL0PR05MB5316.namprd05.prod.outlook.com> <CALx6S35asVg_Lc1Oq-YkarTrXir-WBG1P6AGhbSX33wDQXx8ug@mail.gmail.com> <DU2PR03MB80215E1BC0942FBF79E39BABFA342@DU2PR03MB8021.eurprd03.prod.outlook.com> <CAOj+MMHPUQHS=wp+mzwELBBH=hsC0_gGsMQJRsbr1atHjaFEyQ@mail.gmail.com> <DU2PR03MB802100C85D3CAA29FBBFA4F6FA342@DU2PR03MB8021.eurprd03.prod.outlook.com> <CAOj+MMGpTT0X=RgqLYoMS9DovWLF39Ot4h=7PtzUyo184nszNw@mail.gmail.com>
Content-Language: en-US
From: Joel Halpern <jmh@joelhalpern.com>
In-Reply-To: <CAOj+MMGpTT0X=RgqLYoMS9DovWLF39Ot4h=7PtzUyo184nszNw@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/tRHA0Ipf2q-5t5qEzkxXEW3VnPc>
Subject: Re: [spring] Chair Review of draft-ietf-spring-srv6-srh-compression-11
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Mar 2024 15:50:57 -0000

The WG LC has not been closed because it is clear that the discussion of 
issues is ongoing.  Declaring a conclusion seems to this chair to be 
inappropriate.   The rules are very clear that the time limit when we 
start a call is a guideline.  Chairs are not free to cut off unresolved 
discussions.

Yours,

Joel

On 3/27/2024 6:13 AM, Robert Raszuk wrote:
> Andrew,
>
> It is so cool IETF is about rough consensus ...
>
> Dear SPRING chairs,
>
> WGLC on this doc started Jan 22nd - Today we have March 27th - was the
> result of the working group's last call announced and I missed it ? Looking
> at the list it seems this draft got pretty overwhelming support already.
> Why are we not progressing ? What is holding us ?
>
> Many thx,
> Robert
>
>
>
>
>
> On Wed, Mar 27, 2024 at 10:36 AM Andrew Alston - IETF
> <andrew-ietf@liquid.tech> wrote:
>
>> No Robert,
>>
>>
>>
>> There are operators that have legitimate security concerns and concerts
>> about layer violations – and those operators are entirely in their rights
>> to have such concerns and act on them accordingly.  What this means is that
>> unless those concerns are addressed (with a fail closed
>> solution/ethertype/whatever) those operators will err on the side of
>> security and choose to forgo srv6 entirely no matter what it offers.
>>
>>
>>
>> This may well not be the case if SRv6 did diverge from Ipv6 and take
>> appropriate measures to become a fail closed system, giving the operator
>> the ability to run srv6 as they see fit, in either fail-closed mode (with
>> its own ethertype) or in open mode (without its own ethertype) – or in a
>> hybrid mode (though when we wrote the raviolli draft we chose not to
>> discuss the semantics of hybrid operation because of complexity and because
>> it probably would be a bad idea – but it CAN be done)
>>
>>
>>
>> Thanks
>>
>>
>>
>> Andrew
>>
>>
>>
>>
>>
>>
>> Internal All Employees
>> From: Robert Raszuk <robert@raszuk.net>
>> *Date: *Wednesday, 27 March 2024 at 12:28
>> *To: *Andrew Alston - IETF <andrew-ietf@liquid.tech>
>> *Cc: *Tom Herbert <tom@herbertland.com>, Ron Bonica <rbonica@juniper.net>,
>> Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>, spring@ietf.org <
>> spring@ietf.org>, Alvaro Retana <aretana.ietf@gmail.com>
>> *Subject: *Re: [spring] Chair Review of
>> draft-ietf-spring-srv6-srh-compression-11
>>
>> Andrew,
>>
>>
>>
>>> because there are operators out there that will never run srv6
>>
>>
>> So for the operator who will never run SRv6 what exactly is the problem ?
>> How is he going to be affected by any SRv6 extensions ?
>>
>>
>>
>> Isn't such an operator acting like coast guard of selected IPv6 extensions
>> defending its day one "purity" even if people living further on the land
>> find it useful ? Or is there some cherry picking going on at the "Gates to
>> IPv6 Land" ? You can enter pls come in but you Sr. ohhh sorry No - pls go
>> away ?
>>
>>
>>
>> As mentioned I did observe those operators fighting when 6man allowed SRv6
>> to be IPv6 and they lost the battle badly including fired appeals.
>>
>>
>>
>> RFC8754 is a clear example of this. It is IETF STD track RFC and published
>> by 6man WG. So at this point any discussion on new ethertype for IPv6
>> should first start an effort to first obsolete all RFCs already approved in
>> this space.
>>
>>
>>
>> Best,
>> R.
>>
>>
>>
>> On Wed, Mar 27, 2024 at 7:24 AM Andrew Alston - IETF
>> <andrew-ietf@liquid.tech> wrote:
>>
>> Tom,
>>
>>
>>
>> I believe a number of the differences are highlighted in
>> draft-ietf-6man-sids.
>>
>>
>>
>> Though that does not go as far as to say they ipv6 and srv6 are not the
>> same thing – it does highlight that there are key deviations between srv6
>> and rfc4291 for example.
>>
>>
>>
>> (I hit discuss on this when I was still an AD as seen here
>> https://datatracker.ietf.org/doc/draft-ietf-6man-sids/ballot/#draft-ietf-6man-sids_andrew-alston  because
>> as I said in the discuss I believe that the sids document was attempting to
>> have it both ways – and I don’t believe you can do that)
>>
>>
>>
>> I also point out that if we do agree to diverge between srv6 and ipv6 –
>> this can be done without creating further complexity – and by allowing for
>> an **optional** ethertype as per
>> https://datatracker.ietf.org/doc/draft-raviolli-intarea-trusted-domain-srv6/
>> this also would allow operators the choice to run srv6 in a way that makes
>> them comfortable or not – without complexity and actually **enhance** the
>> deployment of srv6 – because there are operators out there that will never
>> run srv6 while we continue to insist its ipv6 but violate the ipv6
>> standards – at the expense of security and other aspects.
>>
>>
>>
>> I have never understood the vendor resistence to giving operators this
>> choice though – especially when it would actually help get their stuff
>> deployed in more networks potentially.
>>
>>
>>
>> Andrew
>>
>>
>>
>>
>>
>> Internal All Employees
>>
>> From: Tom Herbert <tom@herbertland.com>
>> *Date: *Wednesday, 27 March 2024 at 02:52
>> *To: *Ron Bonica <rbonica@juniper.net>
>> *Cc: *Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>,
>> spring@ietf.org <spring@ietf.org>, Andrew Alston - IETF
>> <andrew-ietf@liquid.tech>, Robert Raszuk <robert@raszuk.net>, Alvaro
>> Retana <aretana.ietf@gmail.com>
>> *Subject: *Re: [spring] Chair Review of
>> draft-ietf-spring-srv6-srh-compression-11
>>
>> On Tue, Mar 26, 2024 at 4:03 PM Ron Bonica <rbonica@juniper.net> wrote:
>>> Sasha,
>>>
>>> At the moment when SRv6 diverges from  IPv6, the two evolutionary
>> branches are identical. If SRv6 needs link locals, it can use them.
>>> However, SRv6 now has the freedom to evolve in ways that IPv6 cannot.
>> Hi Ron,
>>
>> That assumes that SRv6 is forked from IPv6? It might be nice for
>> someone to write up an I-D to really clarify the relationship between
>> SRv6 and IPv6.
>>
>> Tom
>>
>>>                                                                    Ron
>>>
>>> Juniper Business Use Only
>>>
>>> ________________________________
>>> From: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>
>>> Sent: Tuesday, March 26, 2024 4:24 PM
>>> To: Ron Bonica <rbonica@juniper.net>
>>> Cc: spring@ietf.org <spring@ietf.org>; Andrew Alston - IETF
>> <andrew-ietf@liquid.tech>; Robert Raszuk <robert@raszuk.net>; Tom Herbert
>> <tom@herbertland.com>; Alvaro Retana <aretana.ietf@gmail.com>
>>> Subject: Re: [spring] Chair Review of
>> draft-ietf-spring-srv6-srh-compression-11
>>>
>>> [External Email. Be cautious of content]
>>>
>>> Ron,
>>> I am not sure you can separate just the forwarding plane of SRv6 and
>> IPv6.
>>> E.g., what would happen to all the IPv6 mechanisms that use link-local
>> IPv6 addresses?
>>> Replicating these mechanisms does not make much sense to me.
>>>
>>> My 2c,
>>> Sasha
>>>
>>>
>>> Get Outlook for Android
>>>
>>>
>>> Juniper Business Use Only
>>>
>>> ________________________________
>>> From: Ron Bonica <rbonica@juniper.net>
>>> Sent: Tuesday, March 26, 2024 8:36:49 PM
>>> To: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>
>>> Cc: spring@ietf.org <spring@ietf.org>; Andrew Alston - IETF
>> <andrew-ietf@liquid.tech>; Robert Raszuk <robert@raszuk.net>; Tom Herbert
>> <tom@herbertland.com>; Alvaro Retana <aretana.ietf@gmail.com>
>>> Subject: [EXTERNAL] Re: [spring] Chair Review of
>> draft-ietf-spring-srv6-srh-compression-11
>>> Sasha,
>>>
>>> Good point. In my previous email, I didn't mean suggest that we should
>> divorce SRv6 from the entire suite of Internet protocols. I only meant that
>> we should divorce the SRv6 forwarding plane from the IPv6 forwarding plane.
>> BGP could continue to distribute SIDS exactly as is distributes MPLS
>> service labels today.
>>> You bring up another good point about the parallel evolution of SRv6 and
>> IPv6. Yes, this is an engineering trade off. If you divorce SRv6 from IPv6,
>> and IPv6 develops a useful new feature, SRv6 might need to develop that
>> feature, too. However, if you bind SRv6 to IPv6, SRv6 must strictly adhere
>> to IPv6 standards, both now and in the future.
>>> Which is more painful?
>>>
>>>
>> Ron
>>> Juniper Business Use Only
>>>
>>> ________________________________
>>> From: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>
>>> Sent: Tuesday, March 26, 2024 1:56 PM
>>> To: Ron Bonica <rbonica@juniper.net>
>>> Cc: spring@ietf.org <spring@ietf.org>; Andrew Alston - IETF
>> <andrew-ietf@liquid.tech>; Robert Raszuk <robert@raszuk.net>; Tom Herbert
>> <tom@herbertland.com>; Alvaro Retana <aretana.ietf@gmail.com>
>>> Subject: RE: [spring] Chair Review of
>> draft-ietf-spring-srv6-srh-compression-11
>>>
>>> [External Email. Be cautious of content]
>>>
>>> Ron and all,
>>>
>>> I respectfully disagree with the proposal of separation of SRv6 from the
>> existing IPv6.
>>>
>>>
>>> IMHO and FWIW the most important added value of SRv6 is its ability to
>> provide BGP-based overlay services without any changes in the P routers as
>> described in Introduction of RFC 9252:
>>>
>>>
>>> To provide SRv6 service with best-effort connectivity, the egress PE
>> signals an SRv6 Service SID with the BGP overlay service route. The ingress
>> PE encapsulates the payload in an outer IPv6 header where the destination
>> address is the SRv6 Service SID provided by the egress PE. The underlay
>> between the PEs only needs to support plain IPv6 forwarding [RFC8200].
>>>
>>>
>>> To me this means that SRv6 services can benefit from incremental
>> deployment when new forwarding capabilities (implementation of SRv6
>> Endpoint Behaviors) would be initially available just in the relevant PEs