Re: [Srcomp] Draft Minutes Jan 27 2021

"Henderickx, Wim (Nokia - BE/Antwerp)" <wim.henderickx@nokia.com> Wed, 03 February 2021 05:41 UTC

Return-Path: <wim.henderickx@nokia.com>
X-Original-To: srcomp@ietfa.amsl.com
Delivered-To: srcomp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B34103A1421 for <srcomp@ietfa.amsl.com>; Tue, 2 Feb 2021 21:41:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.15
X-Spam-Level:
X-Spam-Status: No, score=-2.15 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W_Tc0SJvuEqR for <srcomp@ietfa.amsl.com>; Tue, 2 Feb 2021 21:41:26 -0800 (PST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70125.outbound.protection.outlook.com [40.107.7.125]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B40423A1422 for <srcomp@ietf.org>; Tue, 2 Feb 2021 21:41:25 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=b/6AKqMgJr7De8nnl/Yb7POWGMu829gMh6aAeAEtbnFOeUzkMq9SDSgA0oqFQNCPz58xsDWRsAKjySicPb56S30D523dLftos8CcIR6JpK1eka1HvOXWK/g1cXwjlLoyD7I2ZkxdMODFs7fsvyr/ac4rVd2oyWCFpuFV5Gq2hdu5CBTBl7/1wUhB4voJT7tJJenyJnk6abpqhbThxPjKi9hsXAXTxPtgSYCYslqFbX22qqt3XBoD6t0bt14dpwonwfGNXjvmWm5CMGmU0gy4iCgvARsHUgNXdShTVea9j7tRsb3iviv28B9FSivJW4nRmQ2jSHcLucU/GQOgM5C+lQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HVXtoRiLq+wXoV1MJsHsBxlgW0AnZwaWIq6ELmERnbc=; b=IX/ExfhACZ776Ke7toiLPMDLkGyhUIgNzNKnnlxJkSyvmQoPn98kFdd708z4GiVAF2LD2lnr/n4zpsbdH0e6UhMHVCQpglbaWLFfATXknB7JgS7eC3+O9hLMCZFWBI5bywcs7lLViZbQ/m2aKdLh1ANpUaHvEJXlUcNJxIsujokVKgQEK8Uhn4PodgBuNwxZOxFxn9GDjC6eGOfJCHv3YAtEN1InsplaKMsnNa2mEwQ3/hi+HZr6UXY2XKnTnWVrT3vJ5J0/zRfIgmWh4Qdn2G2czMtKIiYoIB8Nzyn2E+oZ/wUrN4aqjDCkSJOS2F27WctFVM1dBVSsFh2rJUYwsg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HVXtoRiLq+wXoV1MJsHsBxlgW0AnZwaWIq6ELmERnbc=; b=SKZIdjuN75eE7J1FA1kC7H89vl57aYwhlIGEuqWgwLcbWshNUAt6SMxFjfQksbPnnOrNBOgWy39rG+FANKv3Ivhnp48BMAMCHZfX4+r/SZtpObwf+BDLdljGN43kEJ5mJNHIflOVcNazCwjAhbnuZQuPIyN9RLOfeFbi26+V+YE=
Received: from (2603:10a6:208:7a::20) by AM0PR0702MB3633.eurprd07.prod.outlook.com (2603:10a6:208:1b::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.8; Wed, 3 Feb 2021 05:41:13 +0000
Received: from AM0PR07MB4497.eurprd07.prod.outlook.com ([fe80::db6:9c47:be2f:4f7b]) by AM0PR07MB4497.eurprd07.prod.outlook.com ([fe80::db6:9c47:be2f:4f7b%5]) with mapi id 15.20.3825.017; Wed, 3 Feb 2021 05:41:13 +0000
From: "Henderickx, Wim (Nokia - BE/Antwerp)" <wim.henderickx@nokia.com>
To: Ron Bonica <rbonica@juniper.net>, Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>, "xiechf@chinatelecom.cn" <xiechf@chinatelecom.cn>, "Darren Dukes (ddukes)" <ddukes@cisco.com>, srcomp <srcomp@ietf.org>
Thread-Topic: [Srcomp] Draft Minutes Jan 27 2021
Thread-Index: AQHW9tK4kz7pxGQcqkSp/I74CMk76apDvcyggAJDrYA=
Date: Wed, 03 Feb 2021 05:41:12 +0000
Message-ID: <9D3F441E-E15F-453A-8402-6A6FAD2DE8F0@nokia.com>
References: <86A4CC61-62AD-4A88-B915-B4682E42EAE4@nokia.com> <BL0PR05MB53167F50CFBD2A0D087F85FBAEB69@BL0PR05MB5316.namprd05.prod.outlook.com>
In-Reply-To: <BL0PR05MB53167F50CFBD2A0D087F85FBAEB69@BL0PR05MB5316.namprd05.prod.outlook.com>
Accept-Language: nl-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.45.21011103
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=true; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2021-02-01T20:47:15Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Method=Standard; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=0633b888-ae0d-4341-a75f-06e04137d755; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=b3146a81-528f-4f36-9bb8-ea3078285270; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ContentBits=2
authentication-results: juniper.net; dkim=none (message not signed) header.d=none;juniper.net; dmarc=none action=none header.from=nokia.com;
x-originating-ip: [81.82.181.214]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: abe8296e-a59b-4853-0a96-08d8c806513d
x-ms-traffictypediagnostic: AM0PR0702MB3633:
x-microsoft-antispam-prvs: <AM0PR0702MB36333D24185C4B7049A3638F83B49@AM0PR0702MB3633.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR07MB4497.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(376002)(136003)(346002)(39860400002)(366004)(64756008)(5660300002)(478600001)(53546011)(55236004)(316002)(110136005)(6506007)(66476007)(2906002)(26005)(86362001)(8936002)(186003)(33656002)(83380400001)(8676002)(6512007)(2616005)(36756003)(71200400001)(66446008)(6486002)(66946007)(66556008)(91956017)(76116006)(45980500001)(559001)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_9D3F441EE15F453A84026A6FAD2DE8F0nokiacom_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM0PR07MB4497.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: abe8296e-a59b-4853-0a96-08d8c806513d
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Feb 2021 05:41:13.0869 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: KKKM346/SDqntkJQJ2g8M3nBCzCV4UrDrv0o7x8eT0Yaw7aJ5o1/b5cueV1hsy62fyg9spmcSJlT/kdGXh1A1FR6mI235/J4Yxh8m4vNVS8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR0702MB3633
Archived-At: <https://mailarchive.ietf.org/arch/msg/srcomp/Uzq1muxfZtMuXyfjnNllozzAs2Q>
Subject: Re: [Srcomp] Draft Minutes Jan 27 2021
X-BeenThere: srcomp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <srcomp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/srcomp>, <mailto:srcomp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/srcomp/>
List-Post: <mailto:srcomp@ietf.org>
List-Help: <mailto:srcomp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/srcomp>, <mailto:srcomp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Feb 2021 05:41:31 -0000

Ron, thx indeed my view is to split and 2nd requirement I question. Why and on what basis should we exclude anything that uses other ipv6 semantics that are available in IETF. So in my view any solution that is based on the IPv6 semantics, that is ipv6 Header, extension header, next header, etc should all be possible and we have other criteria to debate the efficiency of them.

So is essence I am questioning the 2nd requirement and I would leave this out of the req doc.

From: Ron Bonica <rbonica@juniper.net>
Date: Monday, 1 February 2021 at 21:47
To: "Henderickx, Wim (Nokia - BE/Antwerp)" <wim.henderickx@nokia.com>, Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>, "xiechf@chinatelecom.cn" <xiechf@chinatelecom.cn>, Darren Dukes <ddukes@cisco.com>, "srcomp@ietf.org" <srcomp@ietf.org>
Subject: RE: [Srcomp] Draft Minutes Jan 27 2021

Folks,

Wim’s comment suggests that we are actually looking at two distinct requirements. We seem to have agreement on one while we are debating the other. So, let’s separate them into two requirements as follows:



Short Name: Preservation of non-routing information.

Description: The compression mechanism MUST preserve non-routing information in the IPv6 header chain.

Rationale: SRv6 ingress nodes encode non-routing information in the IPv6 header chain. This information can be encoded in the following fields:

- Hop Count
- DSCP bits
- ECN bits
- Flow label
- HBH Options Extension header
- Fragment Extension header
- Authentication Extension header
- Encrypted Security Payload Extension header
- Destination Options Extension header

Some of these fields are mutable (e.g., Hop Count) while others are immutable (e.g., Fragment Extension Header).

Some of these fields contain information that is required by every node along a packet’s delivery path (e.g., Hop Count). Others contain information that is required only by the packet’s ultimate destination (e.g., Fragment Extension Header).

Therefore, the compression mechanism MUST NOT prevent this information from being delivered, in an IPv6 header chain,  to any node that needs it.

Metric: In a  compliant proposal, the SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header. The SRv6 header contains both routing and non-routing information. The IPv6 header and the information that it contains persists until it is removed by either by the SR egress node or a penultimate node.


 Short Name: IPv6-based

Description: The compression mechanism requires every node along the packet’s delivery path to be IPv6-capable. It MUST not require any node along the packet’s forwarding path to support any other forwarding plane (e.g., IPv4, MPLS)


Rational: According to RFC 8402, SRv6 is an instantiation of the SR Architecture over the IPv6 data plane.

Metric: A compliant solution requires every node along the packet’s delivery path to be IPv6-capable. It does not not require any node along the packet’s forwarding path to support any other forwarding plane (e.g., IPv4, MPLS)








Juniper Business Use Only
From: Srcomp <srcomp-bounces@ietf.org> On Behalf Of Henderickx, Wim (Nokia - BE/Antwerp)
Sent: Saturday, January 30, 2021 1:40 AM
To: Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>; xiechf@chinatelecom.cn; Darren Dukes (ddukes) <ddukes@cisco.com>; srcomp <srcomp@ietf.org>
Subject: Re: [Srcomp] Draft Minutes Jan 27 2021

[External Email. Be cautious of content]

I have been thinking a bit on this and here is my current thought.

Why would we limit solutions that use other things like ipv6 and extension headers?
I do agree with the fact we should not loose information along the path, like DSCP, ECN, etc
But what is the motivation to be strict ? I don’t believe we can make this call, hence I would make this less strict and focus on the loss of information along the path here.
The solution should be compliant to ipv6 symantics.


From: Srcomp <srcomp-bounces@ietf.org<mailto:srcomp-bounces@ietf.org>> on behalf of Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org<mailto:rbonica=40juniper.net@dmarc.ietf.org>>
Date: Friday, 29 January 2021 at 18:24
To: "xiechf@chinatelecom.cn<mailto:xiechf@chinatelecom.cn>" <xiechf@chinatelecom.cn<mailto:xiechf@chinatelecom.cn>>, Darren Dukes <ddukes@cisco.com<mailto:ddukes@cisco.com>>, "srcomp@ietf.org<mailto:srcomp@ietf.org>" <srcomp@ietf.org<mailto:srcomp@ietf.org>>
Subject: Re: [Srcomp] Draft Minutes Jan 27 2021

Hi Chongfeng,

Like every other requirement in the document, this requirement imposes constraints upon the compression mechanism. Namely,


  *   The compression mechanism MUST be encoded in the IPv6 forwarding plane (i.e., an IPv6 header or an extension header)
  *   The IPv6 header or extension header in which it is encoded MUST be imposed at the SR ingress node and maintained until the SR egress or penultimate hop.

                                                                                         Ron



Juniper Business Use Only
From: xiechf@chinatelecom.cn<mailto:xiechf@chinatelecom.cn> <xiechf@chinatelecom.cn<mailto:xiechf@chinatelecom.cn>>
Sent: Friday, January 29, 2021 7:59 AM
To: Ron Bonica <rbonica@juniper.net<mailto:rbonica@juniper.net>>; Darren Dukes (ddukes) <ddukes@cisco.com<mailto:ddukes@cisco.com>>; srcomp <srcomp@ietf.org<mailto:srcomp@ietf.org>>
Subject: Re: Re: [Srcomp] Draft Minutes Jan 27 2021

[External Email. Be cautious of content]

Hi, folks,
I remembered the DT mainly deal with how to reduce the length of the SID list in uncompressed approach, but the requirement item being discussed seems unrelated to this, is my understanding wrong?  :-)

Best regards
Chongfeng



From: Ron Bonica<mailto:rbonica=40juniper.net@dmarc.ietf.org>
Date: 2021-01-28 03:18
To: Darren Dukes (ddukes)<mailto:ddukes=40cisco.com@dmarc.ietf.org>; srcomp@ietf.org<mailto:srcomp@ietf.org>
Subject: Re: [Srcomp] Draft Minutes Jan 27 2021
Folks,

May I propose the following update to reflect todays discussion:

Description: The compression mechanism must be IPv6-based. This means that:


  1.  The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header. The IPv6 header persists until it is removed by either by the SR egress node or the penultimate node.


  1.  The compression mechanism is either:

  1.  Encoded in the IPv6 header

b.       Encoded in an IPv6 extension header that follows the IPv6 header.

c.       Encode in both.


Rational: The SR ingress node determines  routing and non-routing information regarding the SR path. Non-routing information includes:
-  DSCP bits
- ECN bits
- Flow label
- Fragmentation information
- Authentication information
- Destination Options
- Hop Count

Non-routing information must not be lost. Premature removal of the IPv6 header may cause loss of non-routing information.

According to RFC 8402, SRv6 is an instantiation of the SR Architecture over the IPv6 data plane. The only elements of the IPv6 data plane are the IPv6 header and IPv6 extension headers. Therefore, an SRv6 compression mechanism must be encoded in either the IPv6 header or an IPv6 extension header.

Metric: A compliant proposal satisfies the following conditions:


  1.  The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header. The IPv6 header persists until it is removed by either by the SR egress node or a penultimate node.


  1.  The compression mechanism is either:

  1.  Encoded in the IPv6 header

e.       Encoded in an IPv6 extension header that follows the IPv6 header.

f.        Encode in both.





Juniper Business Use Only
From: Srcomp <srcomp-bounces@ietf.org<mailto:srcomp-bounces@ietf.org>> On Behalf Of Darren Dukes (ddukes)
Sent: Wednesday, January 27, 2021 11:53 AM
To: srcomp@ietf.org<mailto:srcomp@ietf.org>
Subject: [Srcomp] Draft Minutes Jan 27 2021

[External Email. Be cautious of content]

Attendees: Weiqiang, PSF, Cheng Li, Wim, Darren, Ron, Chongfeng

Minutes

  *   Analysis document will have authors listed in alphabetical order by last name.
  *   ACTION for team:

     *   Review backlog document
     *   Verify there are no missing requirements in the backlog
     *   Send all such requirements to the list by Friday
     *   Darren to add any to the backlog doc in git.

  *   PS or BCP requirement to be added to draft.
  *   IPv6 Based needs to be added to the draft.

     *   The text below has been discussed in the call
     *   ACTION: Team to discuss on the list (See two options below as discussed)

  *   ACTION: Weiqiang to send proposals to SPRING WG and request additional proposals.

     *   draft-filsfilscheng-spring-srv6-srh-comp-sl-enc
     *   draft-decraene-spring-srv6-vlsid
     *   draft-bonica-6man-comp-rtg-hdr
     *   draft-mirsky-6man-unified-id-sr


Short Name: IPv6 Based (Original + edited in call)
Description: The compression mechanism must be IPv6-based. The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header.

The compression mechanism is either:
- Encoded in the IPv6 header
- Encoded in an IPv6 extension header that follows the IPv6 header.
- Encode in both.
The IPv6 header persists until it is removed by either by the SR egress node or a penultimate node.  Once the IPv6 header is completely processed and removed, it cannot be re-added.

Rational: The SR ingress node calculates routing and non-routing information regarding the SR path. Non-routing information includes:
-              DSCP bits
-              ECN bits
-              Flow label
-              Fragmentation information
-              Authentication information
-              Destination Options
-              Hop Count
The SR ingress node encodes routing and non-routing information in the IPv6 header and its extensions. If the IPv6 header were removed along the SR path, non-routing information would be lost.
Also, transit nodes may update the ECN bits in the IPv6 header. If the IPv6 header were removed, the ECN bits would be lost.


Metric: Non-routing information (e.g., DSCP, ECN, Destination Options) must be delivered from the source node to the destination node. It must not be delivered to an upper-layer protocol for the purposes of including it in a new IPv6 header.


Short Name: IPv6 Based (Darren’s draft proposal)
Description: The compression mechanism must be IPv6-based (within an IPv6 header or extension header). The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header. The compression mechanism MUST not lose non-routing information in the IPv6 header within the SR domain.

Rationale: The IPv6 header carries information within the SR domain, including; DSCP bits, ECN bits, Flow label, Fragmentation and Authentication information, Destination Options, Hop Count.  Losing this information can result in failures.

Metric: A proposal that can preserve non-routing information in the IPv6 header within the SR Domain satisfies this requirement.