Re: [v6ops] Operational Implications of IPv6 Packets with Extension Headers - OAM

Fernando Gont <fgont@si6networks.com> Mon, 27 July 2020 09:46 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: v6ops@ietfa.amsl.com
Delivered-To: v6ops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 673123A1811; Mon, 27 Jul 2020 02:46:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UoeshE4jk_ec; Mon, 27 Jul 2020 02:46:22 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [IPv6:2001:67c:27e4::14]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF4DC3A180E; Mon, 27 Jul 2020 02:46:21 -0700 (PDT)
Received: from [IPv6:2800:810:464:1f7:4ccc:6def:a83b:96ef] (unknown [IPv6:2800:810:464:1f7:4ccc:6def:a83b:96ef]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 17DAB283893; Mon, 27 Jul 2020 09:46:17 +0000 (UTC)
To: Vasilenko Eduard <vasilenko.eduard@huawei.com>, IPv6 Operations <v6ops@ietf.org>
Cc: "draft-gont-v6ops-ipv6-ehs-packet-drops@ietf.org" <draft-gont-v6ops-ipv6-ehs-packet-drops@ietf.org>
References: <ab6cb83e1ed74a63a494c83f63c9d371@huawei.com>
From: Fernando Gont <fgont@si6networks.com>
Message-ID: <556c9c3a-b8e5-eb3d-cecb-dfe66cf98ac2@si6networks.com>
Date: Mon, 27 Jul 2020 06:46:09 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <ab6cb83e1ed74a63a494c83f63c9d371@huawei.com>
Content-Type: text/plain; charset="koi8-r"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/v6ops/gu2Ulkmin_6FCfCa_b2Vbl1o4UA>
Subject: Re: [v6ops] Operational Implications of IPv6 Packets with Extension Headers - OAM
X-BeenThere: v6ops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: v6ops discussion list <v6ops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/v6ops>, <mailto:v6ops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/v6ops/>
List-Post: <mailto:v6ops@ietf.org>
List-Help: <mailto:v6ops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/v6ops>, <mailto:v6ops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jul 2020 09:46:25 -0000

Eduard,

On 27/7/20 06:30, Vasilenko Eduard wrote:
> Hi Fernando,
> The more messages I have sent to you - the less confident I am in the next one comment, but anyway.

?


> 1. All these new staff would need more OAM tools. May be such simple as "ping for SRv6", may be much more complicated (is anything exist to ping BIER data plane?). Network Admin (or Planning department) should research what is available for the tools that they have decided to activate.
> 2. Some EH are not practical without proper OSS tools (example: iFit)
> IMHO: it could be one additional section X (numbering in the root).
> It is probably very relevant, because draft has "v6ops" in the middle of the name.

I'm not sure what's the point you are raising.

Essentially, operators employ devices that need to access L-4 
information for doing a bunch of things (EMCP, enforcing ACLs, etc.). 
The structure of IPv6 packets makes accessing such information 
challenging. In some cases, devices are unable to access such 
information. In other cases, they might be able to do so provided the 
packet goes through the slow-path (all this depending, to some extent, 
on the EH-chain length). Ultimately, in many of these cases (if not 
all), operators have no other option than to drop the offending packets.

This is a general issue of IPv6 EHs.

Yes, depending on the tools you might need support for this or that. BUt 
how does that change the discussion we're having in the document?

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492