Re: [dhcwg] Comments - draft-ietf-dhc-l2ra-extensions-00

pavan_kurapati <pavan_kurapati@infosys.com> Thu, 23 October 2008 09:29 UTC

Return-Path: <dhcwg-bounces@ietf.org>
X-Original-To: dhcwg-archive@megatron.ietf.org
Delivered-To: ietfarch-dhcwg-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9BEA73A6C29; Thu, 23 Oct 2008 02:29:50 -0700 (PDT)
X-Original-To: dhcwg@core3.amsl.com
Delivered-To: dhcwg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3C82C3A6C29 for <dhcwg@core3.amsl.com>; Thu, 23 Oct 2008 02:29:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.299
X-Spam-Level:
X-Spam-Status: No, score=-3.299 tagged_above=-999 required=5 tests=[AWL=0.300, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XNobdPAvCeOX for <dhcwg@core3.amsl.com>; Thu, 23 Oct 2008 02:29:49 -0700 (PDT)
Received: from kecgate06.infosys.com (kecgate06.infosysconsulting.com [61.95.162.82]) by core3.amsl.com (Postfix) with ESMTP id 457ED3A6C26 for <dhcwg@ietf.org>; Thu, 23 Oct 2008 02:29:48 -0700 (PDT)
X-TM-IMSS-Message-ID: <02d950770000da71@infosys.com>
Received: from blrkechub03.ad.infosys.com ([10.66.236.43]) by infosys.com ([61.95.162.82]) with ESMTP (TREND IMSS SMTP Service 7.0; TLS: TLSv1/SSLv3,128bits,RC4-MD5) id 02d950770000da71 ; Thu, 23 Oct 2008 14:12:47 +0530
Received: from BLRKECMBX01.ad.infosys.com ([10.66.236.21]) by blrkechub03.ad.infosys.com ([10.66.236.43]) with mapi; Thu, 23 Oct 2008 14:12:51 +0530
From: pavan_kurapati <pavan_kurapati@infosys.com>
To: Bharat Joshi <bharat_joshi@infosys.com>, "David W. Hankins" <David_Hankins@isc.org>, DHC WG <dhcwg@ietf.org>
Date: Thu, 23 Oct 2008 14:08:18 +0530
Thread-Topic: [dhcwg] Comments - draft-ietf-dhc-l2ra-extensions-00
Thread-Index: Ackzk6ppqBd629eHRlOwKPeDhKPs9wBMMxFIAAmO+SA=
Message-ID: <7221E17E68B1A944ADCE8A83364DBEE615D5B4BEB6@BLRKECMBX01.ad.infosys.com>
References: <D9872168DBD43A41BD71FFC4713274D405C71EFD@xmb-ams-33b.emea.cisco.com> <D9872168DBD43A41BD71FFC4713274D403E86140@xmb-ams-33b.emea.cisco.com> <7221E17E68B1A944ADCE8A83364DBEE615D5B4BE8F@BLRKECMBX01.ad.infosys.com> <20081017191426.GD5157@isc.org> <31D55C4D55BEED48A4459EB64567589A0CB9657125@BLRKECMBX02.ad.infosys.com>, <20081021154235.GH5567@isc.org>, <31D55C4D55BEED48A4459EB64567589A0CB981ABE6@BLRKECMBX02.ad.infosys.com>
In-Reply-To: <31D55C4D55BEED48A4459EB64567589A0CB981ABE6@BLRKECMBX02.ad.infosys.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
MIME-Version: 1.0
Subject: Re: [dhcwg] Comments - draft-ietf-dhc-l2ra-extensions-00
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/dhcwg>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: dhcwg-bounces@ietf.org
Errors-To: dhcwg-bounces@ietf.org

Hi David,
Just to elaborate on Bharat's point, having a sub-option instead of a flag will address some scenarios where MAC address to be unicasted is not known from the DHCP header. Consider an example where CPE is operating in IPoA (IP over AAL5) encapsulation and not doing bridging.
                      IPoA
PC----CPE----------L2RA-----L3RA------Server

In this mode, there wont be any ethernet header between CPE and L2RA hence CPE does not populate 'chaddr'. L2RA will populate the ethernet header and hence the Layer 2 network between the relay agents will only learn the MAC address of L2RA. Hence having a sub-option here will solve all the cases where there is a chance of flooding between L3 and L2 Relay agents

Thanks,
Pavan

________________________________________
From: dhcwg-bounces@ietf.org [dhcwg-bounces@ietf.org] On Behalf Of Bharat Joshi [bharat_joshi@infosys.com]
Sent: Thursday, October 23, 2008 9:40 AM
To: David W. Hankins; DHC WG
Subject: Re: [dhcwg] Comments -  draft-ietf-dhc-l2ra-extensions-00

David,

     Thanks a lot for your feedback. Please see my replies in line.

Thanks,
Bharat

> > Pavan meant the unicast hardware sub-option we have proposed in layer
> 2 Relay Agent extension draft.
>
> Ah, I am confused, it has been awhile since I have reviewed the draft.
> High time probably.
>
> You have my permission to apply the appropriate filter to my comments.

Not a problem.

> > This is a very good idea. Let me rephrase it and let me know if my
> understanding of what you are proposing is correct.
> >
> > L2 RA sets a flag [other than the broadcast flag] if it wants the
> reply to be unicast to him. DHCP server [if there is no layer 3 relay
> agent] or Layer 3 Relay Agent always looks at this flag and if the flag
> is clear, it unicast the message to the L2 RA. L2 RA looks at the
> broadcast flag and broadcast/unicast DHCP reply accordingly. This looks
> good.
>
> We may fidget on whether the flag would be set for unicast or set for
> broadcast (the question is if any l2ra's exist today which will not
> know or set the flag, and what default they can reasonably expect to
> work), but yes that's the general idea.

We have been internally discussing and have been thimking that have a sun-option may be more generic and helpful. It may take care of cases where Client's MAC address is not known.

> > One question remains. Is it enough if L3 RA [or DHCP server if L3 RA
> is not there] unicast the DHCP reply to hardware address available from
> the DHCP message's chadd field? Or we need some mechanism where L2 RA
> tells L3 RA [or DHCP server] as to what hardware address to use to
> unicast a DHCP reply message to him?
>
> I am probably agnostic on this point as I am not an L2 relay
> implementer.
>
> If the L3 agent transmits to the client's L2 address by unicast, it
> presumes the client's L2 address is in the forwarding database and
> that the database points to the relevant L2 relay agent (which will
> recognize the relay agent information option contents as their own).
> This is most likely a safe presumption since "standard" L2 networks
> generally are not multi path; spanning tree or similar techniques
> remove loops and hold them inactive until the primary path fails.  So
> the only path to the client includes the relay agent by definition,
> even if the packet is flooded (when the client's chaddr is not in the
> forwarding table).

Yes. You are right. That is exactly what we have thought.

> Because there are some modern standard movements that are attempting
> to create L2 multipath forwarding (TRILL WG) with more similarity to
> routed networks (OSPF-like qualities), and many nonstandard methods to
> implement the same exist and are used today, it may be useful to
> direct the unicast to the L2 device itself, to ensure the packet finds
> the original relay agent and does not find an alternate path that
> avoids the relay agent entirely.

Apart from this, as mentioned above, that the client's MAC address may be all zeros. [We found a case where a client may set the chaddr to all 0s]

Does DHCP server allocates an IP address to such a request?

> I would expect L2 implementers have a stronger and more reliable
> opinion than my own, and would defer to their judgement.
>
> As a L3 relay agent implementer (albeit a not widely used/deployed
> one), I'd be willing to observe a "directed unicast over-ride" relay
> agent information option.  It would not be difficult to implement,
> but it would take some time to deploy.
>

Ok. So this is what has been proposed in Layer 2 Relay Agent extension draft that L3 RA parse the sub-option and unicast the reply back to the hardware address.

**************** CAUTION - Disclaimer *****************
This e-mail contains PRIVILEGED AND CONFIDENTIAL INFORMATION intended solely
for the use of the addressee(s). If you are not the intended recipient, please
notify the sender by e-mail and delete the original message. Further, you are not
to copy, disclose, or distribute this e-mail or its contents to any other person and
any such actions are unlawful. This e-mail may contain viruses. Infosys has taken
every reasonable precaution to minimize this risk, but is not liable for any damage
you may sustain as a result of any virus in this e-mail. You should carry out your
own virus checks before opening the e-mail or attachment. Infosys reserves the
right to monitor and review the content of all messages sent to or from this e-mail
address. Messages sent to or from this e-mail address may be stored on the
Infosys e-mail system.
***INFOSYS******** End of Disclaimer ********INFOSYS***
_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www.ietf.org/mailman/listinfo/dhcwg
_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www.ietf.org/mailman/listinfo/dhcwg