Re: [Spud] updated draft PLUS charter, rev. 1 June

Tom Herbert <tom@herbertland.com> Mon, 20 June 2016 17:10 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21DF712D587 for <spud@ietfa.amsl.com>; Mon, 20 Jun 2016 10:10:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JAspObhnP_vk for <spud@ietfa.amsl.com>; Mon, 20 Jun 2016 10:10:02 -0700 (PDT)
Received: from mail-it0-x235.google.com (mail-it0-x235.google.com [IPv6:2607:f8b0:4001:c0b::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F28A12D556 for <spud@ietf.org>; Mon, 20 Jun 2016 10:10:02 -0700 (PDT)
Received: by mail-it0-x235.google.com with SMTP id h190so43043959ith.1 for <spud@ietf.org>; Mon, 20 Jun 2016 10:10:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc; bh=UdYsESLHOE4/NtBXfCVdYNtnshbRMU1lQ1qlbK8R6X4=; b=lgvdOgw0LPoLsEte7p/mgBIA6JgKAC26O2DoBJC2TPSZbk/rlShCJHCKhnzJ3d+HNb JZyxQl/qJV7aaZSzSD+O9HMZyS2K0ZLsVhyzH9oY2vIx6IRTcXzyLamlx3RNTZmd5zkN W5ofDiUr29PkEV7focXFqAHfehlPRPSF2wSO2oduQmtzaW9Y9/bCqk78QQKtsmeyb/vj IP3uPp2I+x5k8cnsVlxxnbpu8yNPMquMNOSlLBXG+cjo+/6xrbezjit3QfplhN3A5FsE +UDuPpHBcdk8JelANhIMpzLFVAm69P4VKB37VBuHbt8o4wWarWptAvJkyQyBagIsf3pp Y+mA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc; bh=UdYsESLHOE4/NtBXfCVdYNtnshbRMU1lQ1qlbK8R6X4=; b=d5Tof7J2v2zcZq4fVxwmQJH5LZ4BCLSGOttEGZDZ3h5equ+nNKsH8/zCio56qqILx+ HPM4D4nfsqW5rFRjcR7zoaR1p7F2XbKHKseQL1rByiGW2pWt+UJONj11OAEB59+SksO5 uW4XQXNSHtigzI9Hldgaeemju0ZwHEPSEfP/1QeuOQvpzlbSx2EMFXYJrTKP0t7FOQx6 DQdM1PEjVDnOQ5sIhoMfGn/ODT3+/obrb7hhRLuE0TtvRDD5xW+FgYC58XqxoD8XNjig 01pclGjkLRAfjk8Q9D6PqdzGhXZY3gPnest4HIvlX+3Z9MGMZponD7Z5NgrZgOka96YW /AXw==
X-Gm-Message-State: ALyK8tIaGe0ASzLbJQiHAVpjae64y2LITn+xhGYPQkH6RucWmYkgz7ZDfbRmd0aQnILx9pLgD5cqEkOimG0dGQ==
MIME-Version: 1.0
X-Received: by 10.36.73.219 with SMTP id e88mr18971442itd.88.1466442601304; Mon, 20 Jun 2016 10:10:01 -0700 (PDT)
Received: by 10.107.31.202 with HTTP; Mon, 20 Jun 2016 10:10:00 -0700 (PDT)
In-Reply-To: <BB04CCB1-0CF6-437F-B4D1-4CED87DF9864@trammell.ch>
References: <85E24D9D-F666-49C3-A022-2F207227A153@trammell.ch> <CAD62q9UiLi1ffGPm=xEXOSH=sqZPv7hYiNBTGvAX52a9dhV8yg@mail.gmail.com> <CAD62q9U7XL8hDqY1VdzuvUvoz0Ec5DDLAS6=kaLxRExu7FY0Kg@mail.gmail.com> <86027402-2F05-4E3B-B9CD-26517A4F007C@tik.ee.ethz.ch> <A4C63A75-9D7E-430E-B986-9981FB929D46@gmail.com> <CA+9kkMBhJ2oCJ1avnGUY4NYTX0VWA_g=YoJSiLcy6u9hJnH-eA@mail.gmail.com> <57573DCF.1030402@isi.edu> <F6BE4EE1-D320-421E-9D86-2F30B2A88792@tik.ee.ethz.ch> <CALx6S35Z7iEp2F7+1PHzAe0qu9st_CNXB9GCzF278HehFiv0Qg@mail.gmail.com> <0f5628e2-a142-8d83-b427-d6b07183cb9e@isi.edu> <CALx6S35KXOioEK60p-m5tGE_H9MWbB=YhJ_sOcW0KP2vR80vvw@mail.gmail.com> <57574C38.6070402@isi.edu> <F44FFD3B-CE7E-45E8-9F04-233C56CA95A0@trammell.ch> <890FE014-D3F8-4D64-8BF8-95B3E4773075@trammell.ch> <57589967.9090004@isi.edu> <37A6D94A-639C-4B9C-B44E-3FD3B5B59071@trammell.ch> <EA4C43BE752A194597B002779DF69BAE24100840@ESESSMB303.ericsson.se> <CAD6AjGTiSu7Lcfq_fdfva1Z5xM0ReQL+tk4UabE7=g7yjGG4CQ@mail.gmail.com> <DM2PR0301MB0655C4B5A3A7E4102D16DBC6A8540@DM2PR0301MB0655.namprd03.prod.outlook.com> <BB04CCB1-0CF6-437F-B4D1-4CED87DF9864@trammell.ch>
Date: Mon, 20 Jun 2016 10:10:00 -0700
Message-ID: <CALx6S35Z=OqFajADnwYixFcsSSdyYTQwPc3xLcL66CywX9Ea3w@mail.gmail.com>
From: Tom Herbert <tom@herbertland.com>
To: Brian Trammell <ietf@trammell.ch>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/spud/rHFd2qN3KSbXeIv4Dc-25fUBCZw>
Cc: Christian Huitema <huitema@microsoft.com>, Ca By <cb.list6@gmail.com>, Joe Touch <touch@isi.edu>, spud <spud@ietf.org>, Szilveszter Nadas <Szilveszter.Nadas@ericsson.com>
Subject: Re: [Spud] updated draft PLUS charter, rev. 1 June
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Jun 2016 17:10:04 -0000

> I am also intrigued by Tom's earlier suggestion that using IPv6 DO headers might have reflection-reducing properties, given the installed base. We should look into that more deeply.
>
The solution would be to use hop-by-hop options. These would have a
lot of advantages:

- HBH options work with any transport or IP protocol (TCP, SCTP, UDP,
IPsec, GRE, etc.) not just new UDP based transport protocols. This
means adding host to network signaling could be done as an incremental
change to the existing mostly TCP Internet (I think this is a major
benefit).
- For a fragmented packet each fragment can contain hop-by-hop options
but not each one contains transport headers.
- Hop-by-hop options must be first extension header in the packet so a
network device only needs to parse the IPv6 header and one type of EH.
If a middlebox has to access the transport layer header and payload it
would need to be able to parse over other types of extension headers
(routing, DO, etc.)
- HBH can be replicated as desired in the outer headers if packets go
through an IP tunnel.
- IP protocol numbers are unambiguous. If IPv6 next-hdr value is 0 the
next header in a packet contains an extension header as a global
invariant. No magic numbers needed.
- Extension headers are not automatically reflected by any service.
- It is within the protocol to modify the contents of HBH options (as
specified in the definition of an option). There is also no checksum
that needs to be updated unlike the case of UDP payload being
modified.
- The rules for processing HBH options are being relaxed in 2460bis.
Previously, all nodes in a path were required to inspect them. The new
text allows nodes in the path to ignore them and forward packets as
without processing or modifying HBH options.
- RFC3542 defines a sockets API that seems to be supported by the
major OSes. Applications probably are permitted to set arbitrary
options in packets that may affect the network, however allowing
application specific options that are deemed safe can done by
whitelist.
- HBH options obviously only works with IPv6 and is not available in
IPv4. I actually think this is a good thing since supporting
forwarding looking functionality only in IPv6 would promote continued
transition to IPv6 in the Internet and is in alignment with the early
efforts for sunsetting IPv4.

 Tom