[spring] Re: [IPv6]6MAN Chairs conclusions on Mandating SRH when using C-SIDs (draft-ietf-spring-srv6-srh-compression)
Tom Herbert <tom@herbertland.com> Wed, 03 July 2024 16:47 UTC
Return-Path: <tom@herbertland.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C8D68C14F5E7 for <spring@ietfa.amsl.com>; Wed, 3 Jul 2024 09:47:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uG265oHzd0CJ for <spring@ietfa.amsl.com>; Wed, 3 Jul 2024 09:47:47 -0700 (PDT)
Received: from mail-ed1-x52b.google.com (mail-ed1-x52b.google.com [IPv6:2a00:1450:4864:20::52b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E631AC14F617 for <spring@ietf.org>; Wed, 3 Jul 2024 09:47:47 -0700 (PDT)
Received: by mail-ed1-x52b.google.com with SMTP id 4fb4d7f45d1cf-57d05e0017aso3977713a12.1 for <spring@ietf.org>; Wed, 03 Jul 2024 09:47:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland.com; s=google; t=1720025266; x=1720630066; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=1lVofWxPgfiWLKGaI1tPDhsWpoZJC6skasgdLSTXb4g=; b=DGzkqvToe1VTc9AatBjbCbeJlaTfUQH3CsnGdXJaNnDhGlJtUI5qp9O75vwJrJIVwZ dLXZ678eIy0qcSMReVLE//nId0dbZT262aQWItHo48Z/O5wn0e/4/Ys0CUAIITqYxLri Y+qckfFboG+QRGjfQgY6/qVdM8AiPUZsOpZslPQyTE4qwPZVJqxexwDfJk59KEvohwMx Sf2QW45w+CHwjoTrGyk9siptPJyNAFpilNh2Gnc4vvRGGvWoKMXfMP1v211ZhbkCZ2Z1 gPwSzJIbv74lyc8AZ/2UNwjQQDQFB7j9EL5sr39992h6bazuyUxTkOPhTF1aEs7Cs/XI 4gVQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1720025266; x=1720630066; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=1lVofWxPgfiWLKGaI1tPDhsWpoZJC6skasgdLSTXb4g=; b=RbIth4zd9FYSTsJv0d2TEHN57a5i3o7KTRJkgYf9O6G05gM+fe7VA4Qz2R8hE6AxKq WZj3HDOM2Nlw2zlWoWtzDJUjhekWpQDKwCPEgdh26oa4nnPcarExQP0+kZAs8XkiqlGE SC6DeRThAqJZIueJ3LuO2NIWihvh1yxbh/FFnajbPh29iT/FvcwXghAj9U39CvZKH6Iu qzRgDlkkuO4bPtV34Nwr9sNLXY/WQ5aJSivFItnt+t12WYcP6BEfinZubBy3tHa9Q4W2 H6ThNJ+C4U6lSFcW2TCGSkwtkULkHtr/ZPREjpmJ2MmOmOnsh91BmlvTWIUSlOKK86/H lqUw==
X-Forwarded-Encrypted: i=1; AJvYcCWb1cQp3ufd+YymSdvg9+hYP2iHLsZC7+RCOsq3FQg190xEMUylGGxs7xWIq4BTfipCnzcPC6RlWxgy9vm0RZA=
X-Gm-Message-State: AOJu0Yy1jlexu9bCW4qT3TuFDUJysrJckT3dz/NH9F5Zjzbstn0t6hQK ZrcNWFR1CilRfmsUyxMdrQ3VqLtr8Oos8fz3eK98oKfDknXvtb+1Q1CfPp8Tw6M9WND/de3hrJ9 VLFihKFWGxAx64fH4GtQthF/1wbKPim+RVypU
X-Google-Smtp-Source: AGHT+IHjogK/VzoDgtFlUqbjboKV/lhcuR9B0yG/EzD8tXcYRQSaqDdU1lyk9LsH9hTFm0vdWvr9SM8q0Osb+mwEyyg=
X-Received: by 2002:a05:6402:d09:b0:57c:7599:2c67 with SMTP id 4fb4d7f45d1cf-587a0bfdde8mr8841188a12.37.1720025265673; Wed, 03 Jul 2024 09:47:45 -0700 (PDT)
MIME-Version: 1.0
References: <BD958D15-F596-4D14-AED2-5B616FA11430@gmail.com>
In-Reply-To: <BD958D15-F596-4D14-AED2-5B616FA11430@gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Wed, 03 Jul 2024 09:47:34 -0700
Message-ID: <CALx6S35ZG8YmS4zYNgJUCY=WzufDujEwHBiminrqs7xguqk9HQ@mail.gmail.com>
To: Bob Hinden <bob.hinden@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: N3ZNF6BI27RSJ6WT7XFQ3Y4ODHY3RMSL
X-Message-ID-Hash: N3ZNF6BI27RSJ6WT7XFQ3Y4ODHY3RMSL
X-MailFrom: tom@herbertland.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-spring.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Alvaro Retana <aretana.ietf@gmail.com>, "spring-chairs@ietf.org" <spring-chairs@ietf.org>, SPRING WG List <spring@ietf.org>, IPv6 List <ipv6@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [spring] Re: [IPv6]6MAN Chairs conclusions on Mandating SRH when using C-SIDs (draft-ietf-spring-srv6-srh-compression)
List-Id: "Source Packet Routing in NetworkinG (SPRING)" <spring.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/xg699HqpZL_V1Tv9NKA0oI65MDU>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Owner: <mailto:spring-owner@ietf.org>
List-Post: <mailto:spring@ietf.org>
List-Subscribe: <mailto:spring-join@ietf.org>
List-Unsubscribe: <mailto:spring-leave@ietf.org>
On Wed, Jul 3, 2024 at 9:35 AM Bob Hinden <bob.hinden@gmail.com> wrote: > > Alvaro, Spring Chairs, > > The 6MAN chairs have reviewed the discussion on your query to the IPv6 list. This is our thoughts. > > Process wise we don’t think we can declare any kind of formal consensus on this. We are sure you have also read the discussion. We do have some feedback from our reading of the discussion. > > Our read is there is a number of people who don’t like using C-SIDs due to issues relating to verify transport checksums due to not having access to final destination address. We don’t think this is a significant issue as long as they are in a SRH header. That provides additional context that C-SIDs may be in use. > > We think there is a stronger issue when using C-SIDs without a SRH header. There isn’t any context for knowing how to handle these packets. We also agree with the point was that for an endpoint, there would be no way for that endpoint to do hardware offload for the TCP checksum. Even if the NIC supported SRH it would not know how to restore the original destination address. These NICs commonly fail to do TCP offload with any routing header or other extension headers too, so the failure is there. It is made worse without having any context that C-SIDs are being used. > > We think this issue could be reduced if there was a way to identify that the packets contained C-SIDs. For example, if they were using the prefix defined in <draft-ietf-6man-sids>. We note that <draft-ietf-spring-srv6-srh-compression> does reference this prefix defined in <draft-ietf-6man-sids>, but does not require its use. > Bob, The prefix would need to be defined as a standard code point, but even so it would be complex to implement in offloads and still wouldn't be compatible with protocol specific checksum offloads. Additionally, then we'd have to update all network devices that might want to look at the checksum in flight to understand the prefix. I don't think it's a feasible solution. How about recommending doing a checksum-neutral mapping like in RFC 6296 where instead of affecting the source address, manipulate bits in the destination address? Tom > Bob, Ole, Jen > > > -------------------------------------------------------------------- > IETF IPv6 working group mailing list > ipv6@ietf.org > Administrative Requests: > --------------------------------------------------------------------