Re: [v6ops] draft-elkins-6man-ipv6-diagnostic-header (Was: draft minutes ietf 81, 3 meetings...)

Carlos Pignataro <cpignata@cisco.com> Mon, 15 August 2011 09:54 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4044A21F8B2D for <v6ops@ietfa.amsl.com>; Mon, 15 Aug 2011 02:54:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.299
X-Spam-Level:
X-Spam-Status: No, score=-110.299 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id INI3igBJ41mA for <v6ops@ietfa.amsl.com>; Mon, 15 Aug 2011 02:54:00 -0700 (PDT)
Received: from av-tac-rtp.cisco.com (hen.cisco.com [64.102.19.198]) by ietfa.amsl.com (Postfix) with ESMTP id 7500521F8B02 for <v6ops@ietf.org>; Mon, 15 Aug 2011 02:54:00 -0700 (PDT)
X-TACSUNS: Virus Scanned
Received: from rooster.cisco.com (localhost.cisco.com [127.0.0.1]) by av-tac-rtp.cisco.com (8.13.8+Sun/8.13.8) with ESMTP id p7F9sjWT005927 for <v6ops@ietf.org>; Mon, 15 Aug 2011 05:54:45 -0400 (EDT)
Received: from [10.117.115.50] (rtp-cpignata-8911.cisco.com [10.117.115.50]) by rooster.cisco.com (8.13.8+Sun/8.13.8) with ESMTP id p7F9sgsI008108 for <v6ops@ietf.org>; Mon, 15 Aug 2011 05:54:42 -0400 (EDT)
Message-ID: <4E48ECD8.6090200@cisco.com>
Date: Mon, 15 Aug 2011 05:54:32 -0400
From: Carlos Pignataro <cpignata@cisco.com>
Organization: cisco Systems, Inc.
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.24) Gecko/20100228 Thunderbird/2.0.0.24 Mnenhy/0.7.6.0
MIME-Version: 1.0
To: v6ops@ietf.org
References: <1313353876.90887.YahooMailClassic@web2812.biz.mail.ne1.yahoo.com> <E20E7D4C-4051-4621-A497-E5D45B8FC0F5@bogus.com>
In-Reply-To: <E20E7D4C-4051-4621-A497-E5D45B8FC0F5@bogus.com>
X-Enigmail-Version: 1.2
X-Face: *3w8NvnQ|kS~V{&{U}$?G9U9EJQ8p9)O[1[1F'1i>XIc$5FR!hdAIf5}'Xu-3`^Z']h0J* ccB'fl/XJYR[+, Z+jj`4%06nd'y9[ln&ScJT5S+O18e^
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Subject: Re: [v6ops] draft-elkins-6man-ipv6-diagnostic-header (Was: draft minutes ietf 81, 3 meetings...)
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/v6ops>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Aug 2011 09:54:01 -0000

On 8/15/2011 2:21 AM, Joel Jaeggli wrote:
> 
> On Aug 14, 2011, at 1:31 PM, nalini.elkins@insidethestack.com wrote:
> 
>> 
>> I am working on contacting a number of our large corporate
>> customers to weigh in on this topic.  I think that the biggest
>> issue here is that when a large commercial network is having
>> problems, anything that can help speed diagnostics is worth doing.
>> Outages and poor performance can cost a great deal of money.
>> 
>> Situations such as comparing packets at various points on the
>> network to determine packet loss is a necessary part of network
>> problem determination.

I agree with this. To compare packets, we could potentially have the
network protocol analyzer (e.g., Wireshark) compute a hash on invariant
fields of the packet (i.e., exclude Hop Limit, etc), and present that as
packet metadata that is not actually carried on the wire. This would
work for packet traces not being instrumented. Would that help?

>> I am working to get the technicians from
>> the corporations themselves to get onto this email list and tell
>> their opinions themselves.
>> 
>> I wish that the IPID was in the main IPv6 header.  That would be
>> the best place for it.  That is not possible, so what we are
>> looking at is doing our best under the circumstances.  One problem
>> with having a Fragmentation Header generated is that it skews
>> statistics on fragmentation.
> 
> I presume that if one is parsing that far into the optional headers,
> that you can distinguish between a fragment header that has an offset
> of zero and a more fragments flag of 0 which would indicate the
> existence of a fragmentation header but that no other fragments exist
> and the other possible combinations.

This would also be less disruptive as it's a known header instead of a
new header (potentially for existing nodes.)

Thanks,

-- Carlos.

> 
>> Many corporate networks keep track of how much fragmentation is on
>> their networks and if we generate a spurious indication, then this
>> invalidates the real fragmentation.
> 
> should be straight forward to distinguish between the two use-cases.
> 
>> Nalini
>> 
>> 
>> --- On Sun, 8/14/11, Carlos Pignataro <cpignata@cisco.com> wrote:
>> 
>>> From: Carlos Pignataro <cpignata@cisco.com> Subject: [v6ops]
>>> draft-elkins-6man-ipv6-diagnostic-header (Was: draft minutes ietf
>>> 81, 3 meetings...) To: v6ops@ietf.org Date: Sunday, August 14,
>>> 2011, 10:03 AM Hi,
>>> 
>>> I believe there was one further point raised in regards to 
>>> draft-elkins-6man-ipv6-diagnostic-header (though I don't recall
>>> if it was at the mike by Andrew Y., in a corridor, or only in my 
>>> head): the Heisenbug principle -- if this is used in debugging
>>> (and diagnostics), the issue being studied or attempted to
>>> reproduce alters its behavior or goes away when modifying the
>>> packet (like compiling with different -o). I think this is one of
>>> the most important arguments against this proposal. The use of
>>> fragment header is interesting, a new header could show much more
>>> pronounced deviation of observed behaviour than without it.
>>> 
>>> For completeness, I did ask some services escalation engineers
>>> about how they use the ip-id in IPv4 for troubleshooting, and 
>>> basically got two main uses for very corner case situations in:
>>> i. identify middleboxes and their characteristics (by check IP ID
>>> increment patterns, find if packets generated by the same box),
>>> and ii. track set of packets along different points in the
>>> network (e.g., back-to-back packets and see rate, drops, out of
>>> order). But it's built into the v4 header.
>>> 
>>> Thanks,
>>> 
>>> -- Carlos.
>>> 
>>> On 8/2/2011 1:24 PM, Joel Jaeggli wrote:
>>>> * Presentation - RFC for IPv6 IP identification field
>>> (header) - Mike Ackerman
>>>> http://tools.ietf.org/agenda/81/slides/v6ops-7.ppt 
>>>> http://tools.ietf.org/html/draft-elkins-6man-ipv6-diagnostic-header
>>>>
>>>>
>>>> 
Fred B - Question for the group, do you use the IPID
>>> in ipv4? (no
>>>> respondants other than presenters)
>>>> 
>>>> Weg G - We use it all the time? I've never heard of
>>> it...
>>>> 
>>>> Francis D - it's potentially a covert channel, also
>>> why not use the
>>>> fregmentation header?
>>>> 
>>>> Bob H - We diefintently want to hear if this is
>>> useful. I don't know
>>>> who puts this header in the packet?
>>>> 
>>>> Nalini ? - The host clearly
>>>> 
>>>> Andrei Y - typical use case for this header would be
>>> to see if a
>>>> middle box is modifying the packet.
>>>> 
>>>> Fred B - What I'm out of this discussion is that the
>>> application isn't
>>>> a bad one, it could be simulated in a fregment.
>>>> 
>>>> Fred Baker - Meeting complete, go to Lunch
>>> _______________________________________________ v6ops mailing
>>> list v6ops@ietf.org https://www.ietf.org/mailman/listinfo/v6ops
>>> 
>> _______________________________________________ v6ops mailing list 
>> v6ops@ietf.org https://www.ietf.org/mailman/listinfo/v6ops
>> 
> 
> _______________________________________________ v6ops mailing list 
> v6ops@ietf.org https://www.ietf.org/mailman/listinfo/v6ops
>