Re: [v6ops] draft-cc-v6ops-wlcg-flow-label-marking-00.txt

Tom Herbert <tom@herbertland.com> Fri, 07 July 2023 17:43 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E28BDC151997 for <v6ops@ietfa.amsl.com>; Fri, 7 Jul 2023 10:43:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RmK5z60yIzIm for <v6ops@ietfa.amsl.com>; Fri, 7 Jul 2023 10:42:58 -0700 (PDT)
Received: from mail-ot1-x330.google.com (mail-ot1-x330.google.com [IPv6:2607:f8b0:4864:20::330]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B7A38C151990 for <v6ops@ietf.org>; Fri, 7 Jul 2023 10:42:50 -0700 (PDT)
Received: by mail-ot1-x330.google.com with SMTP id 46e09a7af769-6b5d57d7db9so1983938a34.3 for <v6ops@ietf.org>; Fri, 07 Jul 2023 10:42:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland.com; s=google; t=1688751769; x=1691343769; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=Xv4mODwpf9I39hKZ8FQhar5xNtbOtQfruAi2MuEY3w0=; b=U2HuGyJ4/h+Q2BssvlHMdUV1Bqu93BFr68kwJGJFRpaqgAR0HnEZ8aWeknvjOPSVB+ E8q3gA1lNzca+eat3iG19RBcsBOx7OsrKg7JocdzpQbIsdlHo4BxWHKkmMc5e/J7CRta SARcVc+qGqMDvO2XP+xQ0UomoC+TAjeO9PQl2wjRzkisDc8FDLsJWspj466bTxzkS3zz ChDW5pZblZeRAXf3Qn99xwXT2+zbYQ7hGxtBqIziray9UwhEugh6awzPYA1UoOK7y7fG 6fdXUBC+Zz8KxB3x9G1+rMcWFhtscWyhpBjXzyR4yBaoIdOg7M3rw57e5oMXaYJYm338 OLqg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1688751769; x=1691343769; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Xv4mODwpf9I39hKZ8FQhar5xNtbOtQfruAi2MuEY3w0=; b=SN1WKuI/zyfGdjrbT08qOvFhdDe0CZ6b6QsNuo5evo+QgcbXMtiQktT1ifBh52BS0D 0mztfkF/6U5CSSMp+z+bwmmGK7RLDJXP5fDXt4sV/eHiktQZw1Za7Eh5acZO7vtVKxAt Xca0DTEiuIBKNRfId2oP0hf6UjF5LnV8m6D6zNCROaCxDeFh1YMy+QVeDyxPuiWntLY/ q1jY8Q0WID/Z/jSaSzYVxq1OnIdseZSWI/Mi7/lKm06mGCrJGWbigbUilulH/31wncwb i43c/wo0SLgGgdged/pmy/sFxs0Bz5r9Wr9ldDMrF2dYyqV0QHLSHfeStsrbTtD0QIxi LaQQ==
X-Gm-Message-State: ABy/qLaxYOk1XzBofbCpNYD1rkodk8ZFJTSgXYP1HKXDB04q6aC+hs/3 ArWKr0BVK1DSEWR93RU61aDcAUT3QQmeQFQX+zo0mw==
X-Google-Smtp-Source: APBJJlF3WiT+DpYrPn3F/qMbOcJMwgZNpUP+ek7dAvsR+3re56ln+nKJ/gRNL5843XZWPLubDSLJN/Ectalcp5cTRYE=
X-Received: by 2002:a05:6830:1c3:b0:6b8:969f:28e5 with SMTP id r3-20020a05683001c300b006b8969f28e5mr6011827ota.13.1688751769485; Fri, 07 Jul 2023 10:42:49 -0700 (PDT)
MIME-Version: 1.0
References: <ZJ3g8L16euGgDLuI@dwc-desktop.local> <9e2081c4-896f-9a7b-71e3-5a88457d4659@gmail.com> <ZKhLCw3OB684y_Xh@dwc-desktop.local>
In-Reply-To: <ZKhLCw3OB684y_Xh@dwc-desktop.local>
From: Tom Herbert <tom@herbertland.com>
Date: Fri, 07 Jul 2023 11:42:36 -0600
Message-ID: <CALx6S36pM=Xwx-Pmw-=yPnhfmWGBgS3tO2ZS20jZBRYheDW=jw@mail.gmail.com>
To: "Dale W. Carder" <dwcarder@es.net>
Cc: Brian E Carpenter <brian.e.carpenter@gmail.com>, IPv6 Operations <v6ops@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005599f005ffe929af"
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/C8ljS0bBFc55u8p7SiOKHVzkxNo>
Subject: Re: [v6ops] draft-cc-v6ops-wlcg-flow-label-marking-00.txt
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jul 2023 17:43:03 -0000

On Fri, Jul 7, 2023, 10:28 AM Dale W. Carder <dwcarder@es.net> wrote:

> Thus spake Brian E Carpenter (brian.e.carpenter@gmail.com) on Fri, Jun
> 30, 2023 at 10:50:24AM +1200:
> >
> > I'd never thought about using a Hamming code to generate flow labels.
> > But since a given flow must use the same flow label throughout, you can
> > only use the regular 5-tuple as input to the Hamming code. I don't
> > believe that a Hamming code will give you a discrete uniform
> distribution,
> > but I'm not an expert in that area. An expert known as ChatGPT says:
> > "No, a Hamming code does not produce a discrete uniform distribution...
> > The non-uniformity of the distribution arises from the fact that Hamming
> > codes prioritize error detection and correction capabilities over
> > uniformity of codeword distribution."
> >
> > So I think that simply using a stateless hash is the best way. These
> > days I like FNV (draft-eastlake-fnv) which is easy and cheap to
> implement.
>
> I think our idea was that it may be possible to explore other encodings to
> do something more best-effort towards a uniform distribution.  As our
> usecase of the flow label is for telemetry, the encoding must be
> reversible,
> which likely rules out a lot of approaches.  It might be good to find
> someone
> with more knowledge in this area.
>

Dale,

I believe what you're looking for is a cryptographic hash function. Encrypt
to map to a uniform distribution, decrypt to get the original bits.
Googling it, I did find some work on using CRC as a reversible hash that
might be relevant.

Tom




> Dale
>
> _______________________________________________
> v6ops mailing list
> v6ops@ietf.org
> https://www.ietf.org/mailman/listinfo/v6ops
>