Hi Andrew,

I fully understand your perspective. I am just questioning if ethertype is
the right level to introduce a fail-closed solution.

As you know IETF is very creative in inventing more and more services
running over IP. Lot's of them would benefit perhaps from such fasil-closed
automation. But adding new ethertype for each is no go IMHO.

With that IPv6 addresses are big enough so for example embedding well known
few bits in src IPv6 address could easily automate and apply protection for
lot's of current and future services running on IPv6. And if not mangling
with IPv6 addressing architecture then extension header could be defined
there completely independent from service headers to be used for such
protection.

Main point being that while we are going to go via pain of network upgrades
I would rather recommend to do it in a much more universal way.

Cheers,
Robert




On Tue, Mar 28, 2023 at 6:47 PM Andrew Alston - IETF
<andrew-i...@liquid.tech> wrote:

> Hi Robert,
>
>
>
> The way the authors view this – and what we will be adding possibly more
> explicitly in the document, is that this does not force an ethertype onto
> srv6 – it creates an OPTION for operators that want to run it in this mode
> to do so.  It introduces a choice that following consultation, many
> operators seem to want.
>
>
>
> In our view – this is in the interests of the both the operators and the
> vendors – the operators who feel more comfortable with a fail-closed
> solution, and the vendors because the goal here is to get the operators
> happy enough to actually deploy the technology.  Yes, there is some srv6
> deployment, but it is nowhere near ubiquitous – and for a number of
> operators – the lack of fail closed mechanism is preventing them from
> deploying.
>
>
>
> I would ask that you look at this in that light – we do not wish to stop
> anyone running srv6 in the standard mode, we wish to provide an option that
> does not interfere with existing srv6 to those that may want to use the
> technology, but aren’t comfortable using it in the absence of this
> mechanism.
>
>
>
> Thanks
>
>
>
> Andrew
>
>
>
>
>
> *From: *Robert Raszuk <rob...@raszuk.net>
> *Date: *Wednesday, 29 March 2023 at 10:30
> *To: *Andrew Alston - IETF <andrew-i...@liquid.tech>
> *Cc: *adr...@olddog.co.uk <adr...@olddog.co.uk>, int-a...@ietf.org <
> int-a...@ietf.org>, spring@ietf.org <spring@ietf.org>
> *Subject: *Re: [spring] [Int-area] FW: New Version Notification for
> draft-raviolli-intarea-trusted-domain-srv6-00.txt
>
> Andrew,
>
>
>
> To me the fact that SRv6 is using IPv6 ethertype is a feature not a bug.
> It allows seamless deployment in any IPv6 enabled network.
>
>
>
> Yes I personally suggested a new ethertype for SRv6 long time back, but
> the issue was related to hurdles with IPv6 standards not related to any
> "security" issues.
>
>
>
> IP packets go from and two depending on their src and dst addresses. So
> network(s) which fail to properly automate filtering of external packets
> targeted to their internal infrastructure should be decommissioned, not
> packets ethertype should change to keep those alive just to prevent IP
> packets from "escaping" a domain.
>
>
>
> Last but not least, sending SRv6 services over completely unaware Internet
> underlay is very useful. Just think about mobile services as an example.
>
>
>
> So I wish you all the best with srv6-td.
>
>
>
> Kind regards,
>
> Robert
>
> Internal All Employees
>
_______________________________________________
spring mailing list
spring@ietf.org
https://www.ietf.org/mailman/listinfo/spring

Reply via email to