Re: [Srcomp] Draft Minutes Jan 27 2021

Ron Bonica <rbonica@juniper.net> Mon, 01 February 2021 20:47 UTC

Return-Path: <rbonica@juniper.net>
X-Original-To: srcomp@ietfa.amsl.com
Delivered-To: srcomp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 580533A14AB; Mon, 1 Feb 2021 12:47:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.358
X-Spam-Level:
X-Spam-Status: No, score=-3.358 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H5=-1, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=MKES5bKh; dkim=pass (1024-bit key) header.d=juniper.net header.b=IUnmEYB5
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qohf8jz0LqSV; Mon, 1 Feb 2021 12:47:29 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 789AA3A147C; Mon, 1 Feb 2021 12:47:29 -0800 (PST)
Received: from pps.filterd (m0108163.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 111Ki3Sf028796; Mon, 1 Feb 2021 12:47:19 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=2SPMZH0Kmopf39yBrU96a2NcpDKFLfRlSK4n2l9eRic=; b=MKES5bKhpYfKkMHmhgD5DjaX1xladPloUo0PRTQsIIHptHLJYo3p3WrONGjXjX5JG121 N3Q1AXDhSr5N9sl24UArTXe7mGO5y7Gp31cBq+6xyAAr85FXcKNp8WZ7HCl0jvqdcZ9e XzP8DTSIJHnEwavR05SsLQ6OEHAGB6m8QId5bkUSZU40q3YXtXnA9p3XYOODGr7tq7GN JcSo1C9BctwGpKTzTErD5imGCaVWiqZ0Cf1eWUMQkQsB7kwwgCbvH10gFf3mmnKbZJe5 GQ9f8dPCqkCyTMkg2fuQKCJuitzB9piSTTbk7LhL6YFwaa0bZS7GFt8R4pXSI85WyzNn bw==
Received: from nam11-bn8-obe.outbound.protection.outlook.com (mail-bn8nam11lp2177.outbound.protection.outlook.com [104.47.58.177]) by mx0b-00273201.pphosted.com with ESMTP id 36e8h51jud-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 01 Feb 2021 12:47:19 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XQd5NMhfI26xWGefkjTO54FbRvEmPq67t+bDrBnrLSdWF7Cv7BCEnGd2vZOdWhcL38Sh0XiQe4DiiD3iXggtj9lJDLnUmYqNT3nYir06Tg7/rsLrpHMoYX7Xn7fIB/IAez0tLqAfcxSsIMn9FVcHd2KjSFgCD1wiG8QaZAQSwfOn71hoFlr50HXCc5WyjSzX750nxpvCT79dKn9wAMm5u28ka1ATbgb50gL1QPMlDk84Y6d9wTffJcggIhEH+jiHbZxoPLAl7/mUvsRzk1LqmpY3yjaH3AfhwuX8aNZTQe6AERIOOFsUB/sKKpvTVKkw4On+BzWSeDToGWfIAcX+PA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2SPMZH0Kmopf39yBrU96a2NcpDKFLfRlSK4n2l9eRic=; b=SVDd1LaN7RUjDRS2SZJ1cbfd73E4cZQsNaTdA5C3OiZTprA1gBJNczSy7k0Kd7NE9suH3uBUIxiEFOm/x3KJpBaDDUclfka9iHE1KR0lxg5D7vzwSQiWN/pd8tbV5YMecGuQ5xml9VfZVFnE99Lod/uyD0T8ztPzgg/wmPmLgCfubi+bivdZ6sX6uVKlljw8AonnHmX47iHs1MOjuiuSndJvyNc4830aO0HOevs0tkoulp8e4Ye5HGEZvJ+qVDqkWjvHiRYnyubjhIuJW3BlDI6vQ7gOW7wOBZ98pkBWYIBmjZDz8U5LD7uFPKIZYhVGx7k3Jp6oHwi4RrQWOoiccA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2SPMZH0Kmopf39yBrU96a2NcpDKFLfRlSK4n2l9eRic=; b=IUnmEYB5gy7s7hyF8nLYwq7Uy4daVdZVwyVRRBiQVz/tepGDVgW57lpgUZaGbgulBy5MSMqous2lGy9Cr99/gqnKRMV9eo1oi4Njkamv+2GqVsSmVLbSZMEmpLLi3jgW0Qe+KXlLk0qipjntMfxtakIXHM3qGHq8RkJTd3y9m10=
Received: from (2603:10b6:208:2f::25) by BL0PR05MB5108.namprd05.prod.outlook.com (2603:10b6:208:8b::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.8; Mon, 1 Feb 2021 20:47:17 +0000
Received: from BL0PR05MB5316.namprd05.prod.outlook.com ([fe80::24d3:61f2:4293:e825]) by BL0PR05MB5316.namprd05.prod.outlook.com ([fe80::24d3:61f2:4293:e825%3]) with mapi id 15.20.3825.017; Mon, 1 Feb 2021 20:47:16 +0000
From: Ron Bonica <rbonica@juniper.net>
To: "Henderickx, Wim (Nokia - BE/Antwerp)" <wim.henderickx@nokia.com>, Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>, "xiechf@chinatelecom.cn" <xiechf@chinatelecom.cn>, "Darren Dukes (ddukes)" <ddukes@cisco.com>, srcomp <srcomp@ietf.org>
Thread-Topic: [Srcomp] Draft Minutes Jan 27 2021
Thread-Index: AQHW9tK4kz7pxGQcqkSp/I74CMk76apDvcyg
Date: Mon, 01 Feb 2021 20:47:16 +0000
Message-ID: <BL0PR05MB53167F50CFBD2A0D087F85FBAEB69@BL0PR05MB5316.namprd05.prod.outlook.com>
References: <86A4CC61-62AD-4A88-B915-B4682E42EAE4@nokia.com>
In-Reply-To: <86A4CC61-62AD-4A88-B915-B4682E42EAE4@nokia.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.5.0.60
dlp-reaction: no-action
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=true; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2021-02-01T20:47:15Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Method=Standard; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=0633b888-ae0d-4341-a75f-06e04137d755; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=b3146a81-528f-4f36-9bb8-ea3078285270; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ContentBits=2
authentication-results: nokia.com; dkim=none (message not signed) header.d=none;nokia.com; dmarc=none action=none header.from=juniper.net;
x-originating-ip: [173.79.115.7]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 8ebbcf28-eb17-477d-821f-08d8c6f28fbe
x-ms-traffictypediagnostic: BL0PR05MB5108:
x-microsoft-antispam-prvs: <BL0PR05MB51087FBB53415A80CA741903AEB69@BL0PR05MB5108.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: +0gjEz3dHqqVCZNuztcJofu9KEPdKeYCSwTC/38wyo7ucOw9kRiCYCQlpWUBmVzeDuX/wdGg9NbEduMaTFQU7u1Pzp/OeKLHy6yziaCMOD/qGeBJI57HvtXMa2L83+Re056EUIYiscbrSZJWSzqMo8dJBIPNcPOJmM3tnNEetqg1wEanvnbUn5wUyjjSuiP3Qn9UWvHWNyde29lP3IL7UPkEXG0yayNJd2TnXDjme5KhIMrTjpHmGAREMlnU/bgoWg1UD5T9JYhn9TMvTGSD2YAGe0F19R9EIapGQTgiCWlrguzldMJv0P0L+Lh9nmNQdUIeL483fgsbZ3iUHP+5c8RvUlcZe5gh/W32sIUlttNzb9421wFL9l8X2HTuup7ij9YxiigEhMaVRqtTlzaEintlp2btLjyTszoURzwjYV3hydhPVtjUDWFB40LfjT6HBOmHqk0K2FrUej8XbSnTHieWXztyI9Rvu2km4ed/ECJes9ENc6mSJ9mjSNRRuY8oJi9yEerD7eQtSIxa+jbEMQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BL0PR05MB5316.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(39860400002)(136003)(396003)(346002)(366004)(296002)(83380400001)(52536014)(86362001)(66556008)(478600001)(76116006)(66476007)(33656002)(66446008)(64756008)(9686003)(5660300002)(26005)(2906002)(8676002)(55016002)(7696005)(110136005)(186003)(8936002)(6506007)(53546011)(66946007)(71200400001)(316002)(579004)(559001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BL0PR05MB53167F50CFBD2A0D087F85FBAEB69BL0PR05MB5316namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BL0PR05MB5316.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8ebbcf28-eb17-477d-821f-08d8c6f28fbe
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Feb 2021 20:47:16.7808 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: sHXUVj/xnD8QRIRBkMnCJSlvOFTvsJjaD99edSKrIVXAZONWNTLPxbkzsD29ntHMV7WsFB174sKiG151VpQhyw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR05MB5108
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369, 18.0.737 definitions=2021-02-01_08:2021-01-29, 2021-02-01 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 impostorscore=0 lowpriorityscore=0 clxscore=1011 mlxscore=0 suspectscore=0 adultscore=0 mlxlogscore=999 priorityscore=1501 malwarescore=0 phishscore=0 spamscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2102010113
Archived-At: <https://mailarchive.ietf.org/arch/msg/srcomp/ricpojB3zxhU00UiRwBD7ywO9oo>
Subject: Re: [Srcomp] Draft Minutes Jan 27 2021
X-BeenThere: srcomp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <srcomp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/srcomp>, <mailto:srcomp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/srcomp/>
List-Post: <mailto:srcomp@ietf.org>
List-Help: <mailto:srcomp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/srcomp>, <mailto:srcomp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 Feb 2021 20:47:39 -0000

Folks,

Wim's comment suggests that we are actually looking at two distinct requirements. We seem to have agreement on one while we are debating the other. So, let's separate them into two requirements as follows:



Short Name: Preservation of non-routing information.

Description: The compression mechanism MUST preserve non-routing information in the IPv6 header chain.

Rationale: SRv6 ingress nodes encode non-routing information in the IPv6 header chain. This information can be encoded in the following fields:

- Hop Count
- DSCP bits
- ECN bits
- Flow label
- HBH Options Extension header
- Fragment Extension header
- Authentication Extension header
- Encrypted Security Payload Extension header
- Destination Options Extension header

Some of these fields are mutable (e.g., Hop Count) while others are immutable (e.g., Fragment Extension Header).

Some of these fields contain information that is required by every node along a packet's delivery path (e.g., Hop Count). Others contain information that is required only by the packet's ultimate destination (e.g., Fragment Extension Header).

Therefore, the compression mechanism MUST NOT prevent this information from being delivered, in an IPv6 header chain,  to any node that needs it.

Metric: In a  compliant proposal, the SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header. The SRv6 header contains both routing and non-routing information. The IPv6 header and the information that it contains persists until it is removed by either by the SR egress node or a penultimate node.


 Short Name: IPv6-based

Description: The compression mechanism requires every node along the packet's delivery path to be IPv6-capable. It MUST not require any node along the packet's forwarding path to support any other forwarding plane (e.g., IPv4, MPLS)


Rational: According to RFC 8402, SRv6 is an instantiation of the SR Architecture over the IPv6 data plane.

Metric: A compliant solution requires every node along the packet's delivery path to be IPv6-capable. It does not not require any node along the packet's forwarding path to support any other forwarding plane (e.g., IPv4, MPLS)








Juniper Business Use Only
From: Srcomp <srcomp-bounces@ietf.org> On Behalf Of Henderickx, Wim (Nokia - BE/Antwerp)
Sent: Saturday, January 30, 2021 1:40 AM
To: Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>; xiechf@chinatelecom.cn; Darren Dukes (ddukes) <ddukes@cisco.com>; srcomp <srcomp@ietf.org>
Subject: Re: [Srcomp] Draft Minutes Jan 27 2021

[External Email. Be cautious of content]

I have been thinking a bit on this and here is my current thought.

Why would we limit solutions that use other things like ipv6 and extension headers?
I do agree with the fact we should not loose information along the path, like DSCP, ECN, etc
But what is the motivation to be strict ? I don't believe we can make this call, hence I would make this less strict and focus on the loss of information along the path here.
The solution should be compliant to ipv6 symantics.


From: Srcomp <srcomp-bounces@ietf.org<mailto:srcomp-bounces@ietf.org>> on behalf of Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org<mailto:rbonica=40juniper.net@dmarc.ietf.org>>
Date: Friday, 29 January 2021 at 18:24
To: "xiechf@chinatelecom.cn<mailto:xiechf@chinatelecom.cn>" <xiechf@chinatelecom.cn<mailto:xiechf@chinatelecom.cn>>, Darren Dukes <ddukes@cisco.com<mailto:ddukes@cisco.com>>, "srcomp@ietf.org<mailto:srcomp@ietf.org>" <srcomp@ietf.org<mailto:srcomp@ietf.org>>
Subject: Re: [Srcomp] Draft Minutes Jan 27 2021

Hi Chongfeng,

Like every other requirement in the document, this requirement imposes constraints upon the compression mechanism. Namely,


  *   The compression mechanism MUST be encoded in the IPv6 forwarding plane (i.e., an IPv6 header or an extension header)
  *   The IPv6 header or extension header in which it is encoded MUST be imposed at the SR ingress node and maintained until the SR egress or penultimate hop.

                                                                                         Ron



Juniper Business Use Only
From: xiechf@chinatelecom.cn<mailto:xiechf@chinatelecom.cn> <xiechf@chinatelecom.cn<mailto:xiechf@chinatelecom.cn>>
Sent: Friday, January 29, 2021 7:59 AM
To: Ron Bonica <rbonica@juniper.net<mailto:rbonica@juniper.net>>; Darren Dukes (ddukes) <ddukes@cisco.com<mailto:ddukes@cisco.com>>; srcomp <srcomp@ietf.org<mailto:srcomp@ietf.org>>
Subject: Re: Re: [Srcomp] Draft Minutes Jan 27 2021

[External Email. Be cautious of content]

Hi, folks,
I remembered the DT mainly deal with how to reduce the length of the SID list in uncompressed approach, but the requirement item being discussed seems unrelated to this, is my understanding wrong?  :-)

Best regards
Chongfeng



From: Ron Bonica<mailto:rbonica=40juniper.net@dmarc.ietf.org>
Date: 2021-01-28 03:18
To: Darren Dukes (ddukes)<mailto:ddukes=40cisco.com@dmarc.ietf.org>; srcomp@ietf.org<mailto:srcomp@ietf.org>
Subject: Re: [Srcomp] Draft Minutes Jan 27 2021
Folks,

May I propose the following update to reflect todays discussion:

Description: The compression mechanism must be IPv6-based. This means that:


  1.  The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header. The IPv6 header persists until it is removed by either by the SR egress node or the penultimate node.


  1.  The compression mechanism is either:

  1.  Encoded in the IPv6 header

b.       Encoded in an IPv6 extension header that follows the IPv6 header.

c.       Encode in both.


Rational: The SR ingress node determines  routing and non-routing information regarding the SR path. Non-routing information includes:
-  DSCP bits
- ECN bits
- Flow label
- Fragmentation information
- Authentication information
- Destination Options
- Hop Count

Non-routing information must not be lost. Premature removal of the IPv6 header may cause loss of non-routing information.

According to RFC 8402, SRv6 is an instantiation of the SR Architecture over the IPv6 data plane. The only elements of the IPv6 data plane are the IPv6 header and IPv6 extension headers. Therefore, an SRv6 compression mechanism must be encoded in either the IPv6 header or an IPv6 extension header.

Metric: A compliant proposal satisfies the following conditions:


  1.  The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header. The IPv6 header persists until it is removed by either by the SR egress node or a penultimate node.


  1.  The compression mechanism is either:

  1.  Encoded in the IPv6 header

e.       Encoded in an IPv6 extension header that follows the IPv6 header.

f.        Encode in both.





Juniper Business Use Only
From: Srcomp <srcomp-bounces@ietf.org<mailto:srcomp-bounces@ietf.org>> On Behalf Of Darren Dukes (ddukes)
Sent: Wednesday, January 27, 2021 11:53 AM
To: srcomp@ietf.org<mailto:srcomp@ietf.org>
Subject: [Srcomp] Draft Minutes Jan 27 2021

[External Email. Be cautious of content]

Attendees: Weiqiang, PSF, Cheng Li, Wim, Darren, Ron, Chongfeng

Minutes

  *   Analysis document will have authors listed in alphabetical order by last name.
  *   ACTION for team:

     *   Review backlog document
     *   Verify there are no missing requirements in the backlog
     *   Send all such requirements to the list by Friday
     *   Darren to add any to the backlog doc in git.

  *   PS or BCP requirement to be added to draft.
  *   IPv6 Based needs to be added to the draft.

     *   The text below has been discussed in the call
     *   ACTION: Team to discuss on the list (See two options below as discussed)

  *   ACTION: Weiqiang to send proposals to SPRING WG and request additional proposals.

     *   draft-filsfilscheng-spring-srv6-srh-comp-sl-enc
     *   draft-decraene-spring-srv6-vlsid
     *   draft-bonica-6man-comp-rtg-hdr
     *   draft-mirsky-6man-unified-id-sr


Short Name: IPv6 Based (Original + edited in call)
Description: The compression mechanism must be IPv6-based. The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header.

The compression mechanism is either:
- Encoded in the IPv6 header
- Encoded in an IPv6 extension header that follows the IPv6 header.
- Encode in both.
The IPv6 header persists until it is removed by either by the SR egress node or a penultimate node.  Once the IPv6 header is completely processed and removed, it cannot be re-added.

Rational: The SR ingress node calculates routing and non-routing information regarding the SR path. Non-routing information includes:
-              DSCP bits
-              ECN bits
-              Flow label
-              Fragmentation information
-              Authentication information
-              Destination Options
-              Hop Count
The SR ingress node encodes routing and non-routing information in the IPv6 header and its extensions. If the IPv6 header were removed along the SR path, non-routing information would be lost.
Also, transit nodes may update the ECN bits in the IPv6 header. If the IPv6 header were removed, the ECN bits would be lost.


Metric: Non-routing information (e.g., DSCP, ECN, Destination Options) must be delivered from the source node to the destination node. It must not be delivered to an upper-layer protocol for the purposes of including it in a new IPv6 header.


Short Name: IPv6 Based (Darren's draft proposal)
Description: The compression mechanism must be IPv6-based (within an IPv6 header or extension header). The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header. The compression mechanism MUST not lose non-routing information in the IPv6 header within the SR domain.

Rationale: The IPv6 header carries information within the SR domain, including; DSCP bits, ECN bits, Flow label, Fragmentation and Authentication information, Destination Options, Hop Count.  Losing this information can result in failures.

Metric: A proposal that can preserve non-routing information in the IPv6 header within the SR Domain satisfies this requirement.