Re: [spring] RFC8200 update?

Andrew Alston <Andrew.Alston@liquidtelecom.com> Fri, 28 February 2020 12:18 UTC

Return-Path: <andrew.alston@liquidtelecom.com>
X-Original-To: spring@ietfa.amsl.com
Delivered-To: spring@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 956CD3A16F6 for <spring@ietfa.amsl.com>; Fri, 28 Feb 2020 04:18:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6K4jQhJ9Nus8 for <spring@ietfa.amsl.com>; Fri, 28 Feb 2020 04:18:21 -0800 (PST)
Received: from eu-smtp-delivery-182.mimecast.com (eu-smtp-delivery-182.mimecast.com [207.82.80.182]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3861D3A16E3 for <spring@ietf.org>; Fri, 28 Feb 2020 04:18:19 -0800 (PST)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-ve1eur03lp2052.outbound.protection.outlook.com [104.47.9.52]) (Using TLS) by relay.mimecast.com with ESMTP id uk-mta-150-9D8UmcmCPJWkPzn5uRtJ3g-1; Fri, 28 Feb 2020 12:18:13 +0000
X-MC-Unique: 9D8UmcmCPJWkPzn5uRtJ3g-1
Received: from DBBPR03MB5415.eurprd03.prod.outlook.com (20.179.47.79) by DBBPR03MB5287.eurprd03.prod.outlook.com (10.255.78.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2772.16; Fri, 28 Feb 2020 12:18:12 +0000
Received: from DBBPR03MB5415.eurprd03.prod.outlook.com ([fe80::31cd:8171:1d1f:2fa9]) by DBBPR03MB5415.eurprd03.prod.outlook.com ([fe80::31cd:8171:1d1f:2fa9%5]) with mapi id 15.20.2750.024; Fri, 28 Feb 2020 12:18:12 +0000
From: Andrew Alston <Andrew.Alston@liquidtelecom.com>
To: Sander Steffann <sander@steffann.nl>, SPRING WG List <spring@ietf.org>, 6man WG <ipv6@ietf.org>
Thread-Topic: [spring] RFC8200 update?
Thread-Index: AQHV7i8K4W7FYkCd4EWPfSUu4+QtZagwhHqw
Date: Fri, 28 Feb 2020 12:18:11 +0000
Message-ID: <DBBPR03MB5415E186A3F30AB1E62EC5E3EEE80@DBBPR03MB5415.eurprd03.prod.outlook.com>
References: <D20C2322-8420-416A-90C4-6A2401825FBD@steffann.nl>
In-Reply-To: <D20C2322-8420-416A-90C4-6A2401825FBD@steffann.nl>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [2c0f:fe40:3:1:f97c:9027:93c8:5c5a]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 859becdf-6073-40fe-e716-08d7bc48479d
x-ms-traffictypediagnostic: DBBPR03MB5287:
x-microsoft-antispam-prvs: <DBBPR03MB5287536A10BEAC11CF360180EEE80@DBBPR03MB5287.eurprd03.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0327618309
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(396003)(366004)(39860400002)(136003)(346002)(376002)(199004)(189003)(55016002)(478600001)(52536014)(9686003)(186003)(76116006)(66476007)(66446008)(64756008)(66946007)(86362001)(66556008)(71200400001)(33656002)(53546011)(316002)(7696005)(110136005)(8936002)(6506007)(2906002)(8676002)(81156014)(81166006)(5660300002)(15650500001); DIR:OUT; SFP:1102; SCL:1; SRVR:DBBPR03MB5287; H:DBBPR03MB5415.eurprd03.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: c5zHcukyAY1MLolGO4ByN/qgN3lQa2QYyxe9swonjMgD7Gho7kQBRQWkli5mNFuI2zsVYpwiHEdmSumgfNuZVXWwfSoJBUmPc9BAWvsTMJjgh8bTDcQXi1lJtsgZcsCq913sU/KSGChoh84pl9lkjWG+GEfjBFQG+6MlTu+ile6U3OJgKxrE1Bid/rQEfwWV3g+QGprxJ3lHJzZWBzeYbPp4+Rv83vCM/ZO9bcg3mt72NUf1nScCvlEyFsHj+FWvvBnZMZhjkEG/FiGE9O2+HkBOLEMzpqVlADK5joMPz3miWbCsFD7slZ92v0O3mVOxE8CIrbGb7fUSO6R8Yq9nKaeY8m57/ToZHplc8yNwbqsKJR0pl4NVUOjcYRF70WfUWahJSQJaMGxLimntT482IROGoOVDPpLf195TLy6Z9CZWq3UasW3u8nSMHXOAzF0J
x-ms-exchange-antispam-messagedata: 3oO1gnSHyDhXtXHH6wGNQXw7xIUk78+2H7QBT8/QqHCikfY/DHcjq+5hhMhdfMk5Sk8VHK8i8KKM04ZU53OUfp13Vew0T0Hz2JP7U56N6slNr/Rcwa0NnPFjX869ZwNyTr5WD3Buh3T4qQW9MbtMDeDDbbuAsUqqlZ3P2FSo7/lq/w03MRfz/todclh19m8TnmS7BVqOo6LZH3pbvpmBUA==
x-ms-exchange-transport-forked: True
MIME-Version: 1.0
X-OriginatorOrg: liquidtelecom.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 859becdf-6073-40fe-e716-08d7bc48479d
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Feb 2020 12:18:12.0372 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 68792612-0f0e-46cb-b16a-fcb82fd80cb1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: EHF5/SgcUVXgcn1ia0wbdccUVCxcxt1X4Y76lFFkjBkI+qamWAQwxVPTPxKXRhLJtjezB4ffW4G0mEJwduJWM3GMfU8DuEGdwtLioais9gA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR03MB5287
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: liquidtelecom.com
Content-Type: text/plain; charset="WINDOWS-1252"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/spring/ObrUWBDn_oi2VrLs98bFOIqcUNQ>
Subject: Re: [spring] RFC8200 update?
X-BeenThere: spring@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Source Packet Routing in NetworkinG \(SPRING\)" <spring.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spring>, <mailto:spring-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spring/>
List-Post: <mailto:spring@ietf.org>
List-Help: <mailto:spring-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spring>, <mailto:spring-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Feb 2020 12:18:26 -0000

This is certainly an interesting idea - and I'd probably need to give this a whole lot more thought before commenting properly, but the first thought that comes to mind is - would we be able to standardize a way to instruct like this.

What I would not want to see is every extension header out there having a separate method of instructing the network to allow this behavior whenever they feel like it, because it would create a nightmare both in terms of seeing if something was requesting it, and I would imagine, implementing it.

So - my question is - what would be the standard way to introduce this - and to this I would say - if you wanted to do this you'd almost want to add a very short extension header that contains this instruction, that is easy to see and easy to parse - since I don't see anywhere in the v6 header itself that we could add this functionality as a flag of sorts.

Interesting ideas - but as I said - I'd argue that if we went this route - I'd want a standard shared way to do this by anything coming tomorrow - to avoid still further divergence.

Thanks

Andrew


> -----Original Message-----
> From: spring <spring-bounces@ietf.org> On Behalf Of Sander Steffann
> Sent: Friday, 28 February 2020 15:02
> To: SPRING WG List <spring@ietf.org>; 6man WG <ipv6@ietf.org>
> Subject: [spring] RFC8200 update?
> 
> Hi,
> 
> I have been thinking about SRv6 and the whole discussion around header
> removal at one of the SR nodes. While I strongly see the current network
> programming PSP function as a violation of RFC8200, one of the possible
> options is of course to update RFC8200 to allow some things that are
> currently not allowed.
> 
> Before you start throwing rotten tomatoes, hear me out :)
> 
> The most important argument against modifying a packet between the
> sender and the final receiver is that it can cause surprises for the sender.
> ICMP errors getting back to the sender about stuff the sender didn't do,
> pMTUd problems etc. And I think this is a very strong argument, and we
> shouldn't cause any surprises for the sender.
> 
> But, what if the sender *asks* the network to do things to its packets? Like in
> network programming. If the sender asks to have the network perform a
> certain function, it can't come as a surprise when it gets an ICMP error after
> the packet has been modified. It asked for that modification itself! And with
> that in mind, we might actually allow much more than just header removal in
> the network.
> 
> What if we update RFC8200 to allow packet manipulation in the network if
> and only if the sender of the packet explicitly asked for that? That would
> open the door for a whole range of innovation (PSP, WAN optimisation,
> payload compression etc), but only when requested. If the sender explicitly
> includes network programming instructions then there is no need anymore
> to forbid the execution of those instructions. No surprises, the possibility of
> smarts in the network, while still preserving the current semantics of an end-
> to-end network by default with strong rules about not messing with the
> packet.
> 
> Would this be a way forward that would accommodate everyones
> requirements?
> 
> Cheers,
> Sander