Re: [Srcomp] Draft Minutes Jan 27 2021

"Henderickx, Wim (Nokia - BE/Antwerp)" <wim.henderickx@nokia.com> Sat, 30 January 2021 06:40 UTC

Return-Path: <wim.henderickx@nokia.com>
X-Original-To: srcomp@ietfa.amsl.com
Delivered-To: srcomp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA26B3A0853 for <srcomp@ietfa.amsl.com>; Fri, 29 Jan 2021 22:40:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.15
X-Spam-Level:
X-Spam-Status: No, score=-2.15 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dLor2bMDHRuC for <srcomp@ietfa.amsl.com>; Fri, 29 Jan 2021 22:40:00 -0800 (PST)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30128.outbound.protection.outlook.com [40.107.3.128]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 922F23A083E for <srcomp@ietf.org>; Fri, 29 Jan 2021 22:39:59 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bc2oftxdOE1bkODs5oz//ncHWaLB+E9yNm7cuaewSojrR7i40E1YdCOgifUWK1YyRtR92yYNAROnpjsph8vLYIz9QcvHy+jkR0ick81ranS9kNKfux/f2qCdTxuJTaSjPVmqJOACTQNYUhJ0bTSPhfqXWkPwN5bU2SWc9AHq6LBtAC7/iBDjOz1cmupCB/HpwCX0GLGd24fHTso9f+6X/IgAyIOw9W9yB+D/9tBVWxq/CinfSrJuvrsiabXfOovOghcYOqSg40oSm5zF0BgdnWRQi5C0HjfS53FArWB9oFZxisK217iYxS4yxrEse2x62YrF/S1jBT0+QxiAseb4GQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AHEUkXOKA4dUJ/hD/RIrYRqkMkrC0qB9NAfF54M4/F4=; b=AoG0cvqYpGMVq4VpzQYffQrG13YANVEf8X5KE//kHBouigSLLXkUU6SVHuIRirZI+xUFoVVZ0Ym1jI2lUg3G4OfetTdSRcIU7JWxXiDS0WJqJyiTFCgtvoVGZ0r7i097xBThUMfTJyZyQzITG9d9aKUxiyr4zTqhZxfQeXRgTt0lb9IcSfGqFKwBA63R+0qbrfcTfnMLbpm5cXrinF9vmTw3K1mmTftF2zOMQExeHdzunnMSSoOIdg11FvV9raCOgr94V81Z8EVZpL5cdlELxZEl7by7jmrguahVnuBY3UPMb2kXSybDZHfnqrYKkgoEAFJZIogRm1/zescNVrVkLw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AHEUkXOKA4dUJ/hD/RIrYRqkMkrC0qB9NAfF54M4/F4=; b=H7K6lmJL9qhTLk6VDUMPu6UtKP1ZYkFRso0xAJX+hPsuxojMsjpNnLEXoeS8izQSZvwZ6WD4e8oWmU7oZ1kLmSETbzAEaqWM1IFx5ZXEB0J+TUSSAt7uqVqz8c6IgeZ+SgHHYCBtl850AWOo2jrKOh/PUnnUjYjfQCuvDaYFe0Q=
Received: from (2603:10a6:208:7a::20) by AM9PR07MB7233.eurprd07.prod.outlook.com (2603:10a6:20b:2c0::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.10; Sat, 30 Jan 2021 06:39:56 +0000
Received: from AM0PR07MB4497.eurprd07.prod.outlook.com ([fe80::db6:9c47:be2f:4f7b]) by AM0PR07MB4497.eurprd07.prod.outlook.com ([fe80::db6:9c47:be2f:4f7b%5]) with mapi id 15.20.3825.008; Sat, 30 Jan 2021 06:39:56 +0000
From: "Henderickx, Wim (Nokia - BE/Antwerp)" <wim.henderickx@nokia.com>
To: Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>, "xiechf@chinatelecom.cn" <xiechf@chinatelecom.cn>, "Darren Dukes (ddukes)" <ddukes@cisco.com>, srcomp <srcomp@ietf.org>
Thread-Topic: [Srcomp] Draft Minutes Jan 27 2021
Thread-Index: AQHW9tK4kz7pxGQcqkSp/I74CMk76Q==
Date: Sat, 30 Jan 2021 06:39:55 +0000
Message-ID: <86A4CC61-62AD-4A88-B915-B4682E42EAE4@nokia.com>
Accept-Language: nl-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.45.21011103
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=true; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2021-01-29T17:23:27Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Method=Standard; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=0633b888-ae0d-4341-a75f-06e04137d755; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=b3146a81-528f-4f36-9bb8-ea3078285270; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ContentBits=2
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=nokia.com;
x-originating-ip: [81.82.181.214]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: d17c9e8e-ad23-4fa1-6e2b-08d8c4e9db99
x-ms-traffictypediagnostic: AM9PR07MB7233:
x-microsoft-antispam-prvs: <AM9PR07MB7233C1EE02231A01C3AF118883B89@AM9PR07MB7233.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR07MB4497.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(396003)(376002)(366004)(136003)(346002)(39860400002)(6512007)(86362001)(6486002)(83380400001)(110136005)(33656002)(478600001)(316002)(71200400001)(55236004)(53546011)(6506007)(186003)(2906002)(5660300002)(64756008)(66946007)(66446008)(2616005)(66476007)(66556008)(76116006)(8936002)(36756003)(26005)(8676002)(45980500001)(579004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_86A4CC6162AD4A88B915B4682E42EAE4nokiacom_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM0PR07MB4497.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d17c9e8e-ad23-4fa1-6e2b-08d8c4e9db99
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Jan 2021 06:39:56.2855 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ID7rU8nqSA/Rcjta2MppOz7gMN0aG1e0ifmD+Pze1LuvDtolv9/LThF51pETns2fQ69tJLHDUKuUNOVa4vhYKUwotgrP0r1PgR+J+7UeTzA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR07MB7233
Archived-At: <https://mailarchive.ietf.org/arch/msg/srcomp/p1AizZjPL2Vsb6ToK3_vEiXYB30>
Subject: Re: [Srcomp] Draft Minutes Jan 27 2021
X-BeenThere: srcomp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <srcomp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/srcomp>, <mailto:srcomp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/srcomp/>
List-Post: <mailto:srcomp@ietf.org>
List-Help: <mailto:srcomp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/srcomp>, <mailto:srcomp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 Jan 2021 06:40:03 -0000

I have been thinking a bit on this and here is my current thought.

Why would we limit solutions that use other things like ipv6 and extension headers?
I do agree with the fact we should not loose information along the path, like DSCP, ECN, etc
But what is the motivation to be strict ? I don’t believe we can make this call, hence I would make this less strict and focus on the loss of information along the path here.
The solution should be compliant to ipv6 symantics.


From: Srcomp <srcomp-bounces@ietf.org> on behalf of Ron Bonica <rbonica=40juniper.net@dmarc.ietf.org>
Date: Friday, 29 January 2021 at 18:24
To: "xiechf@chinatelecom.cn" <xiechf@chinatelecom.cn>, Darren Dukes <ddukes@cisco.com>, "srcomp@ietf.org" <srcomp@ietf.org>
Subject: Re: [Srcomp] Draft Minutes Jan 27 2021

Hi Chongfeng,

Like every other requirement in the document, this requirement imposes constraints upon the compression mechanism. Namely,


  *   The compression mechanism MUST be encoded in the IPv6 forwarding plane (i.e., an IPv6 header or an extension header)
  *   The IPv6 header or extension header in which it is encoded MUST be imposed at the SR ingress node and maintained until the SR egress or penultimate hop.

                                                                                         Ron



Juniper Business Use Only
From: xiechf@chinatelecom.cn <xiechf@chinatelecom.cn>
Sent: Friday, January 29, 2021 7:59 AM
To: Ron Bonica <rbonica@juniper.net>; Darren Dukes (ddukes) <ddukes@cisco.com>; srcomp <srcomp@ietf.org>
Subject: Re: Re: [Srcomp] Draft Minutes Jan 27 2021

[External Email. Be cautious of content]

Hi, folks,
I remembered the DT mainly deal with how to reduce the length of the SID list in uncompressed approach, but the requirement item being discussed seems unrelated to this, is my understanding wrong?  :-)

Best regards
Chongfeng



From: Ron Bonica<mailto:rbonica=40juniper.net@dmarc.ietf.org>
Date: 2021-01-28 03:18
To: Darren Dukes (ddukes)<mailto:ddukes=40cisco.com@dmarc.ietf.org>; srcomp@ietf.org<mailto:srcomp@ietf.org>
Subject: Re: [Srcomp] Draft Minutes Jan 27 2021
Folks,

May I propose the following update to reflect todays discussion:

Description: The compression mechanism must be IPv6-based. This means that:


1.       The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header. The IPv6 header persists until it is removed by either by the SR egress node or the penultimate node.


2.       The compression mechanism is either:

a.       Encoded in the IPv6 header

b.       Encoded in an IPv6 extension header that follows the IPv6 header.

c.       Encode in both.


Rational: The SR ingress node determines  routing and non-routing information regarding the SR path. Non-routing information includes:
-  DSCP bits
- ECN bits
- Flow label
- Fragmentation information
- Authentication information
- Destination Options
- Hop Count

Non-routing information must not be lost. Premature removal of the IPv6 header may cause loss of non-routing information.

According to RFC 8402, SRv6 is an instantiation of the SR Architecture over the IPv6 data plane. The only elements of the IPv6 data plane are the IPv6 header and IPv6 extension headers. Therefore, an SRv6 compression mechanism must be encoded in either the IPv6 header or an IPv6 extension header.

Metric: A compliant proposal satisfies the following conditions:


1.       The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header. The IPv6 header persists until it is removed by either by the SR egress node or a penultimate node.


2.       The compression mechanism is either:

d.       Encoded in the IPv6 header

e.       Encoded in an IPv6 extension header that follows the IPv6 header.

f.        Encode in both.





Juniper Business Use Only
From: Srcomp <srcomp-bounces@ietf.org<mailto:srcomp-bounces@ietf.org>> On Behalf Of Darren Dukes (ddukes)
Sent: Wednesday, January 27, 2021 11:53 AM
To: srcomp@ietf.org<mailto:srcomp@ietf.org>
Subject: [Srcomp] Draft Minutes Jan 27 2021

[External Email. Be cautious of content]

Attendees: Weiqiang, PSF, Cheng Li, Wim, Darren, Ron, Chongfeng

Minutes

  *   Analysis document will have authors listed in alphabetical order by last name.
  *   ACTION for team:

     *   Review backlog document
     *   Verify there are no missing requirements in the backlog
     *   Send all such requirements to the list by Friday
     *   Darren to add any to the backlog doc in git.

  *   PS or BCP requirement to be added to draft.
  *   IPv6 Based needs to be added to the draft.

     *   The text below has been discussed in the call
     *   ACTION: Team to discuss on the list (See two options below as discussed)

  *   ACTION: Weiqiang to send proposals to SPRING WG and request additional proposals.

     *   draft-filsfilscheng-spring-srv6-srh-comp-sl-enc
     *   draft-decraene-spring-srv6-vlsid
     *   draft-bonica-6man-comp-rtg-hdr
     *   draft-mirsky-6man-unified-id-sr


Short Name: IPv6 Based (Original + edited in call)
Description: The compression mechanism must be IPv6-based. The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header.

The compression mechanism is either:
- Encoded in the IPv6 header
- Encoded in an IPv6 extension header that follows the IPv6 header.
- Encode in both.
The IPv6 header persists until it is removed by either by the SR egress node or a penultimate node.  Once the IPv6 header is completely processed and removed, it cannot be re-added.

Rational: The SR ingress node calculates routing and non-routing information regarding the SR path. Non-routing information includes:
-              DSCP bits
-              ECN bits
-              Flow label
-              Fragmentation information
-              Authentication information
-              Destination Options
-              Hop Count
The SR ingress node encodes routing and non-routing information in the IPv6 header and its extensions. If the IPv6 header were removed along the SR path, non-routing information would be lost.
Also, transit nodes may update the ECN bits in the IPv6 header. If the IPv6 header were removed, the ECN bits would be lost.


Metric: Non-routing information (e.g., DSCP, ECN, Destination Options) must be delivered from the source node to the destination node. It must not be delivered to an upper-layer protocol for the purposes of including it in a new IPv6 header.


Short Name: IPv6 Based (Darren’s draft proposal)
Description: The compression mechanism must be IPv6-based (within an IPv6 header or extension header). The SR ingress node encapsulates its payload (e.g.., Ethernet, IP, TCP) in an IPv6 header. The compression mechanism MUST not lose non-routing information in the IPv6 header within the SR domain.

Rationale: The IPv6 header carries information within the SR domain, including; DSCP bits, ECN bits, Flow label, Fragmentation and Authentication information, Destination Options, Hop Count.  Losing this information can result in failures.

Metric: A proposal that can preserve non-routing information in the IPv6 header within the SR Domain satisfies this requirement.