Nope, that is completely not what I have in mind,

Please remember that transit nodes are not SRv6 aware in closed or open
domain, So my site A (car) can be using SRv6 via any IPv6 transit uplink to
my MEC or private DC where services are being properly demuxed based on the
SID/uSID.

If you close this date plane option by new ethertype my car is
disconnected,

So I am not sure who is  "incredibly naive" here or perhaps to put it a bit
more politely who does not understand the power of new technology.

Regards,
R.


On Wed, Mar 29, 2023 at 5:02 AM Mark Smith <markzzzsm...@gmail.com> wrote:

> On Wed, 29 Mar 2023 at 22:46, Robert Raszuk <rob...@raszuk.net> wrote:
> >
> > Guys,
> >
> > What you are really saying here is that the concept of using network
> programmability should be killed and we should get stuck for decades to
> come with closed domains only innovation.
> >
> > I find it quite disturbing especially as we are talking about Internet
> Engineering Task Force produced standards here.
> >
> > Yes it has been derailed {not to say hijacked} into standardization of
> private extensions for various protocols which are limited to closed
> domains as the technology of new forwarding paradigm called MPLS simply by
> design was not applicable to be deployed in the open Internet. But that
> should not mean we should get stuck with this till new generation
> understands mistakes made and moves forward,
> >
> > It is obvious that those who invested heavily in MPLS will fight to
> protect it no matter what. But new technologies and services are being
> deployed over SRv6 using native IPv6 dataplane. Examples are mobile nodes
> which move from network to network.
> >
> > Is this closed domain - no by any means. Is it working today - yes
> pretty well.
> >
> > So proposing a new ethertype for SRv6 today seems to be comparable to
> putting a stick into the wheels of a cool bicycle starting to gain speed.
> >
>
> If you believe one network operator is going to let another network
> operator program the first network operator's network, then I think
> you're incredibly naive about how the multi-party Internet is operated
> and the security and availability concerns network operators have.
>
>
>
> > Respectfully to all td-srv6 authors and cheerleaders,
> > Robert
> >
> >
> > On Wed, Mar 29, 2023 at 1:58 AM Tony Przygienda <tonysi...@gmail.com>
> wrote:
> >>
> >> Though I would like to cheer for Kireeti's 2. as well I think the point
> of SHOULD is more realistic (for now) as Joel points out ...
> >>
> >> As to ethertype, I think grown-ups in the room were since long time
> drily observing that a new IP version would have been appropriate after
> enough
> contortions-of-it's-an-IPv6-address-sometimes-and-sometimes-not-and-sometimes-only-1/4
> were performed with drafts whose authors' list length sometimes rivaled
> pages of content ;-)  I think this ship has sailed and that's why after
> some discussions with Andrew we went the ether type route as more
> realistic. Additionally, yes, lots encaps (not encodings) carrying SRv6
> should get new codepoints if we are really serious about trusted domains
> here.
> >>
> >> And folks who went the MPLS curve know that none of this is new, same
> curve was walked roughly (though smoother, no'one was tempted to "hide
> label stack in extension headers" ;-) and it would go a long way if
> deploying secure SRv6 becomes as simple as *not* switching on "address
> family srv6" on an interface until needed and then relying on BGP-LU (oops
> ;-) to build according lookup FIBs for SRv6 instead of going in direction
> of routers becoming massive wildcard matching and routing header processing
> firewalls ...
> >>
> >> --- tony
> >>
> >>
> >>
> >> On Wed, Mar 29, 2023 at 4:33 PM Kireeti Kompella <
> kireeti.i...@gmail.com> wrote:
> >>>
> >>> On Mar 28, 2023, at 11:24, Adrian Farrel <adr...@olddog.co.uk> wrote:
> >>>
> >>> [Spring cc’ed because, well, you know, SR. I wonder whether 6man and
> 6ops should care as well.]
> >>>
> >>>
> >>> SPRING cc’ed because, you know, replying to Adrian’s email.  Agree
> that 6man and 6ops [sh|w]ould be interested.
> >>>
> >>> tl;dr
> >>>
> >>> I think this is a good initiative and worth discussion. Thanks
> >>>
> >>> for the draft.
> >>>
> >>>
> >>> Agree.  In particular:
> >>> 1. There is an acknowledged security problem. Might be worth
> summarizing, as it is central to this draft, but an example is in rfc
> 8402/section 8. Section 3 of this draft (“The SRv6 Security Problem”)
> doesn’t actually describe the security problem; Section 5 does, briefly.
> >>>
> >>> 2. The solution (using a new EtherType, SRv6-ET) is a good one.  It’s
> sad that this wasn’t done from the get-go, as the solution is a bit “evil
> bit”-ish.  I’d prefer to see ALL SRv6 packets (i.e., those containing SRH)
> use SRv6-ET.  Boundary routers SHOULD drop packets with SRv6-ET that cross
> the boundary in either direction; all routers MUST drop packets with SRH
> that don’t have SRv6-ET. Yeah, difficult, but the added security is worth
> it.
> >>>
> >>> 3. Ease of secure deployment is a major consideration; this draft is a
> big step in that direction.
> >>>
> >>> 4. As Adrian said, several nits.  Will send separately to authors.
> >>>
> >>> Kireeti
> >>>
> >>>
> >>> _______________________________________________
> >>> spring mailing list
> >>> spring@ietf.org
> >>> https://www.ietf.org/mailman/listinfo/spring
> >>
> >> _______________________________________________
> >> spring mailing list
> >> spring@ietf.org
> >> https://www.ietf.org/mailman/listinfo/spring
> >
> > _______________________________________________
> > spring mailing list
> > spring@ietf.org
> > https://www.ietf.org/mailman/listinfo/spring
>
_______________________________________________
spring mailing list
spring@ietf.org
https://www.ietf.org/mailman/listinfo/spring

Reply via email to