Re: [Last-Call] [v6ops] Tsvart last call review of draft-ietf-v6ops-ipv6-ehs-packet-drops-05

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi, Tom,

On 7/4/21 12:20, Tom Herbert wrote:
[....]
Given that hosts are the ones creating extensions headers and other
packet formats, hosts have a vested interest in how routers are
dealing with their packets. Even before this document was created, we
have long known that extensions headers might be dropped and have been
working on mitigations to reduce the number of drops which are already
addressing some of the reasons that packets with EH. For instance,
consider draft-hinden-6man-hbh-processing-00; this is a proposal to
limit the number of HBH options to exactly one. The idea is that
routers will make it feasible for routers packets that have HBH
options, with the trade off of specifically limiting the extensibility
of the protocol. The problem is there is no data that indicates this
proposal would have the desired effect; we don't if routers would
start accepting packets that are limited to one HBH option.

What does that proposal have to do with this document?



So my fundamental concern with this draft is that it is an entirely
qualitative description of a well known problem, however a qualitative

No. It is not a well known problem. If you look at draft-hinden-6man-hbh-processing, itś clear that their assumption is that limiting the number of EHs or options solves the problem. Whereas our document essentially notes that to a large extent the problem has to do with the overall EH-chain length -- it doesn't matter if the EH-chain: it doesn matter whether you have one long EH, multiple small ones, one large EH with one large option, one large EH with many small options, or any combination of them.

The fact that youŕe raising this issue and that thereś a belief that there'ś a clear and easy way to make EHs work probes that itś certainly not a well known problem.

I can also say that I have consulted for different operators, and they were not even aware about this issue.



analysis is insufficient input for moving extension headers forward.

Please read the Abstract:
   This document summarizes the operational implications of IPv6
   extension headers specified in the IPv6 protocol specification
   (RFC8200), and attempts to analyze reasons why packets with IPv6
   extension headers are often dropped in the public Internet.

and the disclaimer:

2.  Disclaimer

   This document analyzes the operational challenges represented by
   packets that employ IPv6 Extension Headers, and documents some of the
   operational reasons why these packets are often dropped in the public
   Internet.  This document is not a recommendation to drop such
   packets, but rather an analysis of why they are dropped.


If you want to embark in the project of "moving Ehs forward", getting whatever data you need for that, etc., thatś totally fine.



In the draft, there are several reasons suggested as to why routers
might drop packets, however there is no indication of the relative
occurrence frequency of these. Also, there are parameterizations
mentioned such as in the state that routers might drop if the chain is
"too long", there is no analysis on exactly what "too long" commonly

We discussed this one to death: Thatś impossible to tell. Itś implementation dependent, and the information may not even be public.



and deployment thereby providing actionable data. Note this is not the
same as making recommendations, I am just asking for the operational
data as part of the analysis from which we could derive guidance or
new protocol requirements.

You are asking for a different document. If you want that data, I encourage you to start the experiment, and submit an I-D with the results.

Some of us did that homework for the data that we considered useful, and provided it to the community in RFC7872. If that data is not enough, I certainly encourage you to work on that. But thatś a project thatś totally unrelated to this document.

Thanks,
--
Fernando Gont
e-mail: fgont@xxxxxxxxxxxxxxx
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492




--
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux