Re: [tsvwg] Éric Vyncke's Discuss on draft-ietf-tsvwg-rfc6040update-shim-21: (with DISCUSS and COMMENT)

Bob Briscoe <ietf@bobbriscoe.net> Fri, 01 December 2023 21:56 UTC

Return-Path: <ietf@bobbriscoe.net>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AAEF8C14F5F1; Fri, 1 Dec 2023 13:56:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.105
X-Spam-Level:
X-Spam-Status: No, score=-7.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GJGWvd_R0P9A; Fri, 1 Dec 2023 13:56:38 -0800 (PST)
Received: from mail-ssdrsserver2.hostinginterface.eu (mail-ssdrsserver2.hostinginterface.eu [185.185.85.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4800C14F5ED; Fri, 1 Dec 2023 13:56:35 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=In-Reply-To:From:References:Cc:To:Subject: MIME-Version:Date:Message-ID:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=SToNR0sHZA2/7jyqj1+ROnbtA4pWi+/rr87GFpX0mjQ=; b=xUqOwJ0X6pugLNbf1IigSb3rqB qa0HCozRGELLYT9I8duKdbo4gr20R/tD6tF7TfG/1bEIMwcDry3FsD0gWQFUcWLeieedZkAKCQUOo 5+Uf1YeZbTemCZR91w1b3ST3F/exx2dA7NmOkCsjbT1NOuC8mztz32KrTx37Vo4J3a3GBct4rkSbP VxP3E6k0ZDX9cPfo5cigXTFrQM7qC2hqVvG90HpVErJPzkfJcGH+CEFZWg6HmXJycgZ+Ah+YcKMQ7 h5+rwSvgO36Bi4c+zzRtabLJUeHz6ozMyeXTPfLpriFUJMQKWxyraQFsl8vEryxH3RA/vKK5CV9X/ 8zfbigaA==;
Received: from 67.153.238.178.in-addr.arpa ([178.238.153.67]:37970 helo=[192.168.1.29]) by ssdrsserver2.hostinginterface.eu with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.96.2) (envelope-from <ietf@bobbriscoe.net>) id 1r9BV4-0001Eo-2R; Fri, 01 Dec 2023 21:56:32 +0000
Content-Type: multipart/alternative; boundary="------------7R5EQMfaHwkpe5pOWwI0xPtr"
Message-ID: <b522a540-e19c-4266-9b1e-6631dc5b89e0@bobbriscoe.net>
Date: Fri, 01 Dec 2023 21:56:30 +0000
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
To: Éric Vyncke <evyncke@cisco.com>, The IESG <iesg@ietf.org>
Cc: gorry@erg.abdn.ac.uk, tsvwg@ietf.org, draft-ietf-tsvwg-rfc6040update-shim@ietf.org, tsvwg-chairs@ietf.org, d3e3e3@gmail.com
References: <170115584746.29426.10484446828614575033@ietfa.amsl.com>
From: Bob Briscoe <ietf@bobbriscoe.net>
In-Reply-To: <170115584746.29426.10484446828614575033@ietfa.amsl.com>
X-MagicSpam-TUUID: 7901d145-f6ab-4828-98be-cb4552f5a3ea
X-MagicSpam-SUUID: 32044ab9-357a-4ff6-82cc-3d4fb454ec6c
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ssdrsserver2.hostinginterface.eu
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: ssdrsserver2.hostinginterface.eu: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: ssdrsserver2.hostinginterface.eu: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/D6Xy5h8gaS0BCM2w9d3DflfasT8>
Subject: Re: [tsvwg] Éric Vyncke's Discuss on draft-ietf-tsvwg-rfc6040update-shim-21: (with DISCUSS and COMMENT)
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Dec 2023 21:56:43 -0000

Eric, Thank you for your review. Pls see [BB] (where no comment on any 
point means accepted)...

On 28/11/2023 07:17, Éric Vyncke via Datatracker wrote:
> Éric Vyncke has entered the following ballot position for
> draft-ietf-tsvwg-rfc6040update-shim-21: Discuss
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer tohttps://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/  
> for more information about how to handle DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-rfc6040update-shim/
>
>
>
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
>
> # Éric Vyncke, INT AD, comments for draft-ietf-tsvwg-rfc6040update-shim-21
>
> Thank you for the work put into this document.
>
> Please find below one blocking DISCUSS points (easy to address), some
> non-blocking COMMENT points (but replies would be appreciated even if only for
> my own education), and some nits.
>
> Special thanks to Gorry Fairhurst for the shepherd's detailed write-up
> including the WG consensus *but it lacks* the justification of the intended
> status.
>
> Other thanks to Donald Eastlake, the Internet directorate reviewer (at my
> request), please consider this int-dir review:
> https://datatracker.ietf.org/doc/review-ietf-tsvwg-rfc6040update-shim-20-intdir-telechat-eastlake-2023-11-22/
> (and I have noticed Bob's reply)
>
> I hope that this review helps to improve the document,
>
> Regards,
>
> -éric
>
> # DISCUSS (blocking)
>
> As noted inhttps://www.ietf.org/blog/handling-iesg-ballot-positions/, a
> DISCUSS ballot is a request to have a discussion on the following topics:
>
> ## Wrong BCP14 ...
>
> Section 2 MUST use the correct BCP 14 (I told you that this was trivial)
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
>
> # COMMENTS (non-blocking)
>
> ## Section 3.1
>
> It is just a comment, no need to reply, but I do not agree with `Digging to
> arbitrary depths to find an inner IP header within an encapsulation is strictly
> a layering violation`, the encapsulating routing is probably doing the encaps
> based on the future inner IP header (routing to a tunnel interface). Anyway,
> just a comment.

[BB] I haven't changed this - I think the word 'strictly' conveys the 
message that this is actually done in practice, while "it cannot be a 
required behaviour" is reinforced by the later point that there always 
has to be a max depth to dig down to if you're not actually 
decapsulating headers but just digging to look.

> ## Section 6
>
> Suggest removing the long expired draft-ietf-intarea-gue (and possibly others).

[BB] Removed. Thx for being decisive on what is not going forward.

> Suggest to add RFC 8986 as it also has a Ethernet next-header.

[BB] I've scanned through RFC8986. Generally, it only /uses/ existing 
encapsulations. But you're right that §10.1 does assign 143 as the next 
header value for Ethernet. However, not having been involved in the area 
of L2VPNs, I don't understand how/why this happened so late (2021). IOW, 
how was Ethernet indicated as the next header in EVPNs before RFC8986? 
Was the EtherIP assignment used/abused? Whatever, this is just a request 
for a personal tutorial. Back to the draft....

I believe Ethernet L2VPNs are outside the scope of rfc6040update-shim. 
An Ethernet  802.3 MAC header does not fall under the definition of a 
shim header, 'cos it is self-sufficient as an outer for general 
forwarding. So an 802.3 header does not have to be added (or removed) at 
the same time as an outer IP header. And an Ethernet header cannot carry 
any form of explicit congestion notification {Note 1}.

Therefore, there's no sure way to be able to propagate ECN between a 
(possible) IP header encapsulated within the Ethernet header and an 
outer IP header encapsulating the Ethernet header. This could be 
specified, but it's certainly not just something we could tack on to 
rfc6040update-shim - it's beyond the stated scope - much more ambitious.

So, do you agree it is OK not to introduce SRv6? Or have I misunderstood?


{Note 1}: Other than 802.1Q in the control plane, but making that work 
over a L2VPN would be a whole new exercise in itself.

>
> ## Section 6.1.2
>
> Please note that NHRP, RFC 2332, is sometimes used to set up GRE tunnels.

[BB] I'm afraid NHRP is completely new to me. If I add it at the start 
of the list of 4 control plane protocols in the quote below (from 
"§6.1.2 GRE"), will the subsequent para still be correct, or is NHRP not 
used to set up IP-in-IP or IPSec tunnels?

    GRE itself does not support dynamic set-up and configuration of
    tunnels. However, control plane protocols such as *NHRP [RFC2332],*
    Mobile IPv4 (MIP4) [RFC5944
    <https://www.rfc-editor.org/info/rfc5944>], Mobile IPv6 (MIP6)
    [RFC6275 <https://www.rfc-editor.org/info/rfc6275>], Proxy Mobile IP
    (PMIP) [RFC5845 <https://www.rfc-editor.org/info/rfc5845>] and IKEv2
    [RFC7296 <https://www.rfc-editor.org/info/rfc7296>] are sometimes
    used to set up GRE tunnels dynamically.

    When these control protocols set up IP-in-IP or IPSec tunnels, it is
    likely that the resulting tunnels will propagate the ECN field as
    defined in RFC 6040 or one of its compatible predecessors (RFC 4301
    or the full functionality mode of RFC 3168). However, if they use a
    GRE encapsulation, this presumption is less sound.

Thanks again


Bob


>
> ## Section 6.1.3
>
> Teredo... a glimpse of the past back in 2023 ? More seriously, I do not mind
> having this section, but Teredo is no more used. Writing `existing Teredo
> deployments safe` in an IETF document looks so weird.
>
> # NITS (non-blocking / cosmetic)
>
> ## Use of v4 and v6
>
> While I usually say "v4" or "v6", I strongly suggest to write "IPv4" and "IPv6".
>

-- 
________________________________________________________________
Bob Briscoehttp://bobbriscoe.net/