All – I agree with Ketan/Boris and the points they have made (no need to repeat them again). In general, srh-compression technology has been accepted, implemented and deployed by many vendors and service providers. The issue of some legacy nodes not being able to ascertain final destination and conducting and failing upper layer checksum verification does not seem to have been widely reported, which is not to claim as not legit, but to support the argument that it is not wide spread but perhaps not significant enough to prevent the adoption of this technology.
It might be adequate enough to add ‘apology’ section to acknowledge such limitation, in order to progress the adoption of this document. I believe there is a precedence – section 7 of https://datatracker.ietf.org/doc/draft-ietf-6man-comp-rtg-hdr/. Thanks, Himanshu From: spring <spring-boun...@ietf.org> on behalf of Boris Hassanov <bhassanov=40yahoo....@dmarc.ietf.org> Date: Monday, April 8, 2024 at 12:44 PM To: Alvaro Retana <aretana.i...@gmail.com> Cc: SPRING WG List <spring@ietf.org>, spring-cha...@ietf.org <spring-cha...@ietf.org> Subject: [**EXTERNAL**] Re: [spring] C-SIDs and upper layer checksums (draft-ietf-spring-srv6-srh-compression) Hi Alvaro and all, I re-read section 6.5, it seems to be clear enough IMO, it also has link towards section 9.2 (ICMP Error processing). I do agree with Ketan's email about the methodology for splitting all nodes into those 3 categories (Source, Transit, Destination). Indeed those concerns were about some transit nodes (especially legacy, Special Transit Node as Ketan said) which may experience issues with upper layer checksums and they also cannot deliver the behavior per section 9.2. I have discussed such potential issue with some colleagues and they told that for modern applications there such as eBPF based it is not an issue at all to make correct checksum handling. I also found some public references for that such as: https://github.com/facebookincubator/katran/tree/main [github.com]<https://urldefense.com/v3/__https:/github.com/facebookincubator/katran/tree/main__;!!OSsGDw!NigVX2MITPjUv5es_hCerGiVQWYxbzo2f0c9dlpVV4Q41fSk37U--WWnWdpgNM6asmUyT47YmNQNBGmnuMAT6k7TBoQ$> (katran/lib/bpf/csum_helpers.h). But additional research and experiments are needed. Anyway it is beyond the scope of this draft. May be we can just mention about such possibility for non-SRv6 aware Special Transit Nodes in 6.5 and that would be enough to inform implementers and operators in advance. SY, Boris On Monday, April 8, 2024 at 07:06:12 PM GMT+3, Ketan Talaulikar <ketant.i...@gmail.com> wrote: Hi Alvaro, I find some level of confusion on the discussion threads and it might perhaps be due to the inconsistent use of terminologies. It would help to use the correct terminologies from RFC8754 (6man WG RFC) to bring clarity on what is within the scope and what is beyond the scope of this document. a) SR Source Node: the node originating the packet - it may have an SRH or may skip it (section 4.1) b) Transit Node: node doing IPv6 forwarding c) (Ultimate) Destination Node (from RFC8200): the final node to which the packet is destined The CSID document in section 6.5 does not change or update the text in RFC8200 sec 8.1. It is simply stating what the "final destination" is going to be when CSID is used because RFC8200 does not talk about RHs in sec 8.1. RFC8754 covered this aspect by specifying that the last segment is the "final destination" but this needs to be specified when using C-SID (with or without SRH) and for all C-SID flavors/behaviors. I find the current text in section 6.5 to be necessary and sufficient for implementations that claim (or need to) support SR Source Node behavior for C-SIDs. The CSID document does not change any behavior at the Transit Node or for the (Ultimate) Destination Node. Therefore, the discussion of Transit Nodes is outside the scope of this document - just as it was outside the scope for RFC8754. Now, if some "Special Transit Node" wants to go beyond RFC8200 and do things like upper layer checksum validation enroute then they can refer to the same text in section 6.5 to first understand CSID processing and to do what is necessary for their packet processing enroute. This requires such "Special Transit Nodes" to be aware of first SRv6 and now C-SID - this is the same for any new packet encoding technology. It seems like we are putting the cart before the horse when raising concerns about existing implementations that are not SRv6 and C-SID aware of not being able to do their processing. Let us publish the C-SID document so implementers of those "Special Transit Nodes" (also being referred to as middleboxes on some threads) have a reference to upgrade for C-SID support. Finally, I’ve not heard of issues related to these "Special Transit Nodes" from operators that have deployed SRv6. That may be a good discussion to have (again outside the scope of this document and perhaps in srv6ops?) - so operators who have SRv6 deployment experience can share their learnings and best practices. Thanks, Ketan On Thu, Mar 28, 2024 at 5:34 PM Alvaro Retana <aretana.i...@gmail.com<mailto:aretana.i...@gmail.com>> wrote: Section 6.5 of draft-ietf-spring-srv6-srh-compression describes the behavior when an originating node inside an SRv6 domain creates a packet with a C-SID as the final destination. This description differs from the text in Section 8.1 of RFC8200. We plan to send the draft to the 6man WG for review and explicitly highlight this difference. Please comment on the text in Section 6.5. Does anything need to be added, deleted, changed, or clarified? We want to ask for feedback soon; please send comments on this topic by April 5th. Thanks! Alvaro. -- for spring-chairs _______________________________________________ spring mailing list spring@ietf.org<mailto:spring@ietf.org> https://www.ietf.org/mailman/listinfo/spring [ietf.org]<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/spring__;!!OSsGDw!NigVX2MITPjUv5es_hCerGiVQWYxbzo2f0c9dlpVV4Q41fSk37U--WWnWdpgNM6asmUyT47YmNQNBGmnuMATcBToP6c$> _______________________________________________ spring mailing list spring@ietf.org<mailto:spring@ietf.org> https://www.ietf.org/mailman/listinfo/spring [ietf.org]<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/spring__;!!OSsGDw!NigVX2MITPjUv5es_hCerGiVQWYxbzo2f0c9dlpVV4Q41fSk37U--WWnWdpgNM6asmUyT47YmNQNBGmnuMATcBToP6c$>
_______________________________________________ spring mailing list spring@ietf.org https://www.ietf.org/mailman/listinfo/spring