Re: [Spud] updated draft PLUS charter, rev. 1 June

Tom Herbert <tom@herbertland.com> Wed, 22 June 2016 20:45 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2444012D6A6 for <spud@ietfa.amsl.com>; Wed, 22 Jun 2016 13:45:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9xUb3IXPgeVn for <spud@ietfa.amsl.com>; Wed, 22 Jun 2016 13:45:27 -0700 (PDT)
Received: from mail-it0-x22c.google.com (mail-it0-x22c.google.com [IPv6:2607:f8b0:4001:c0b::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 932F012DBD1 for <spud@ietf.org>; Wed, 22 Jun 2016 13:45:27 -0700 (PDT)
Received: by mail-it0-x22c.google.com with SMTP id f6so48224742ith.0 for <spud@ietf.org>; Wed, 22 Jun 2016 13:45:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=YMBhXmsnbfhWgQ6Acd2dvt77/32vTO26IpsJWJbbhn0=; b=zvhM4P+H2xNBLmaPMekJ4q+w5jaH+cluQGaVC0insjLhUVt1ltYm+bM/UKKGzVgq/R J6jxCO/k+lmSx8Jzn7pZTnFf1HG85MBVFD1j7lCiP7Q44Zbbbi07SlQ01RrmjWabF0Gx TxTUkNqhO48s4EQXy2F5natl3HVI4VDQ5WFnKED6HhmXKIlFi/pP6LW+rcvVm0+rvy5W pWzGz48el8ayxmORK2A8WolMeyIbAp8hxV8iZIxGiGdm40ORx3qm9iodKXs85TMIpcMr 3NaG6pkFsCy0B5QeJEPG8VDsinTlripWP41InsneMPj6TAAW8yhbtGGxhM+tBTk80Cx5 fkeA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=YMBhXmsnbfhWgQ6Acd2dvt77/32vTO26IpsJWJbbhn0=; b=O7e2gGHCsZyvdXA+FG1To4ygn2R+cWrR05+k0wwcsGmQU0cXCiNvREj9YljDQDOzE2 zSULSZTXu6Aj6zuRUdLFRIQlZc9JBjdDHIhArHTBVN9+Xyqau5Jv/ZSyn5U/WTBoZeOT 4lrWG/7PUKt4K7ixbw+ulIB795Ovhwu3wj89jqeZ5m6nixqz+gAkhAP+6ukn6vVQsdG/ Ogr9WyiQqhmDwrTOATDJUBIIN+ZL4hrxAFvGCIS4F2mgMMoJ3c/WQdegy2kE6F5SKRBs C4w5ceLmvWwZcKNC119lwqoKpxCoGhLtQtW53vfPFOb1MD6R5eEL/ThYLYCE/aA+B0RY vZDw==
X-Gm-Message-State: ALyK8tKjeErroSmQpYw3NwYcGUy41cp9wpOmDNabEbzvmrz9l34RhzGjfT2H7fz+OodPqjMug5Ce1kHeQYFqfg==
X-Received: by 10.36.16.67 with SMTP id 64mr17142770ity.88.1466628326817; Wed, 22 Jun 2016 13:45:26 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.107.31.134 with HTTP; Wed, 22 Jun 2016 13:45:25 -0700 (PDT)
In-Reply-To: <576AE5EF.508@isi.edu>
References: <85E24D9D-F666-49C3-A022-2F207227A153@trammell.ch> <A4C63A75-9D7E-430E-B986-9981FB929D46@gmail.com> <CA+9kkMBhJ2oCJ1avnGUY4NYTX0VWA_g=YoJSiLcy6u9hJnH-eA@mail.gmail.com> <57573DCF.1030402@isi.edu> <F6BE4EE1-D320-421E-9D86-2F30B2A88792@tik.ee.ethz.ch> <CALx6S35Z7iEp2F7+1PHzAe0qu9st_CNXB9GCzF278HehFiv0Qg@mail.gmail.com> <0f5628e2-a142-8d83-b427-d6b07183cb9e@isi.edu> <CALx6S35KXOioEK60p-m5tGE_H9MWbB=YhJ_sOcW0KP2vR80vvw@mail.gmail.com> <57574C38.6070402@isi.edu> <F44FFD3B-CE7E-45E8-9F04-233C56CA95A0@trammell.ch> <890FE014-D3F8-4D64-8BF8-95B3E4773075@trammell.ch> <57589967.9090004@isi.edu> <37A6D94A-639C-4B9C-B44E-3FD3B5B59071@trammell.ch> <EA4C43BE752A194597B002779DF69BAE24100840@ESESSMB303.ericsson.se> <CAD6AjGTiSu7Lcfq_fdfva1Z5xM0ReQL+tk4UabE7=g7yjGG4CQ@mail.gmail.com> <DM2PR0301MB0655C4B5A3A7E4102D16DBC6A8540@DM2PR0301MB0655.namprd03.prod.outlook.com> <BB04CCB1-0CF6-437F-B4D1-4CED87DF9864@trammell.ch> <CALx6S35Z=OqFajADnwYixFcsSSdyYTQwPc3xLcL66CywX9Ea3w@mail.gmail.com> <576AE5EF.508@isi.edu>
From: Tom Herbert <tom@herbertland.com>
Date: Wed, 22 Jun 2016 13:45:25 -0700
Message-ID: <CALx6S37Czg4uhoGsfG7tziqaompoTfxcJVUA_t_ciKL=Xerq6g@mail.gmail.com>
To: Joe Touch <touch@isi.edu>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spud/jb6F6lYdSuXVc6MknJqozpufZIM>
Cc: Brian Trammell <ietf@trammell.ch>, Szilveszter Nadas <Szilveszter.Nadas@ericsson.com>, spud <spud@ietf.org>, Ca By <cb.list6@gmail.com>, Christian Huitema <huitema@microsoft.com>
Subject: Re: [Spud] updated draft PLUS charter, rev. 1 June
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jun 2016 20:45:34 -0000

On Wed, Jun 22, 2016 at 12:24 PM, Joe Touch <touch@isi.edu> wrote:
> See below.
>
> On 6/20/2016 10:10 AM, Tom Herbert wrote:
>>> I am also intrigued by Tom's earlier suggestion that using IPv6 DO headers might have reflection-reducing properties, given the installed base. We should look into that more deeply.
>>>
>> The solution would be to use hop-by-hop options. These would have a
>> lot of advantages:
>>
>> - HBH options work with any transport or IP protocol (TCP, SCTP, UDP,
>> IPsec, GRE, etc.) not just new UDP based transport protocols. This
>> means adding host to network signaling could be done as an incremental
>> change to the existing mostly TCP Internet (I think this is a major
>> benefit).
>
> Except that they also increase the chance your packets are just dropped
> at routers, or that they will take the slow-path.
>
>> - For a fragmented packet each fragment can contain hop-by-hop options
>> but not each one contains transport headers.
>> - Hop-by-hop options must be first extension header in the packet so a
>> network device only needs to parse the IPv6 header and one type of EH.
>> If a middlebox has to access the transport layer header and payload it
>> would need to be able to parse over other types of extension headers
>> (routing, DO, etc.)
>
> Except that they tend to want to jump over only a small number of such
> options; increasing that number increases the chance the packet is dropped.
>
Per RFC2460 those devices should not be jumping over any options at
all, this is non standard behavior. This is why we need Happy Eyeballs
in order to work around non-compliant devices. We need workarounds for
IPv6 anyway, and we would need them when trying to replace TCP with
UDP based transport protocol or something else. IMHO I don't believe
that the fact that some number of devices don't comply with the
standard justifies creating a whole new standard to accomplish the
same effect while potentially opening the door for new ways to be
noncompliant.

Tom

>> - HBH can be replicated as desired in the outer headers if packets go
>> through an IP tunnel.
> HBH options almost never make sense to copy. They're useful in the
> context of the original header, not the new one.
>
> You'd have to define the desire to copy your header if that's the
> behavior you want, and you'd need a way to know when that didn't happen.
>
> However, this is a really nonsensical idea - the whole point of a tunnel
> is to present a virtual LINK - not an IP subpath. Nothing that happens
> on a link needs to be visible to IP unless it's already visible at the
> link endpoints -- which is where the tunneled packet's HBH options are
> already processed.
>
>> - IP protocol numbers are unambiguous. If IPv6 next-hdr value is 0 the
>> next header in a packet contains an extension header as a global
>> invariant. No magic numbers needed.
>> - Extension headers are not automatically reflected by any service.
> I'll bet money that they are.
>
>> - It is within the protocol to modify the contents of HBH options (as
>> specified in the definition of an option). There is also no checksum
>> that needs to be updated unlike the case of UDP payload being
>> modified.
>> - The rules for processing HBH options are being relaxed in 2460bis.
>> Previously, all nodes in a path were required to inspect them. The new
>> text allows nodes in the path to ignore them and forward packets as
>> without processing or modifying HBH options.
> That also means that legacy devices might not behave as you expect.
>> - RFC3542 defines a sockets API that seems to be supported by the
>> major OSes. Applications probably are permitted to set arbitrary
>> options in packets that may affect the network, however allowing
>> application specific options that are deemed safe can done by
>> whitelist.
>
> FWIW, ick. RFCs shouldn't be man pages. IPv6 (more specifically,
> RFC2460-bis) should include an abstract API that vendors can support,
> exactly as RFC793 did.
>> - HBH options obviously only works with IPv6 and is not available in
>> IPv4. I actually think this is a good thing since supporting
>> forwarding looking functionality only in IPv6 would promote continued
>> transition to IPv6 in the Internet and is in alignment with the early
>> efforts for sunsetting IPv4.
>>
> +1 on that point.