Re: [Dime] [Technical Errata Reported] RFC6733 (4462)

Jouni Korhonen <jouni.nospam@gmail.com> Tue, 22 September 2015 15:14 UTC

Return-Path: <jouni.nospam@gmail.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F5721AC3DC for <dime@ietfa.amsl.com>; Tue, 22 Sep 2015 08:14:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.427
X-Spam-Level:
X-Spam-Status: No, score=-1.427 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001, URG_BIZ=0.573] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q8kQufXMmpJL for <dime@ietfa.amsl.com>; Tue, 22 Sep 2015 08:14:16 -0700 (PDT)
Received: from mail-pa0-x231.google.com (mail-pa0-x231.google.com [IPv6:2607:f8b0:400e:c03::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C9E8B1A9240 for <dime@ietf.org>; Tue, 22 Sep 2015 08:14:16 -0700 (PDT)
Received: by pacgz1 with SMTP id gz1so9164509pac.3 for <dime@ietf.org>; Tue, 22 Sep 2015 08:14:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:to:references:cc:from:message-id:date:user-agent :mime-version:in-reply-to:content-type:content-transfer-encoding; bh=FVogcwa9mxC7WdmmqKKpW5iq+KjG+oeQHLT3U5RMxDQ=; b=ISD2ou/QLzhfdjVURW2SEHpsRNkqexaAsqBvzQy31U6YFVUbJ3tTXv8xGK2kmI7hOH yAi0icxCPoXreHbgXt+S9Dno5gVxBx0oFc4dZlnncVwjjQwuaEEogwSjWbXRB1uPxLkB W9rCGfXQEqnapmaMXstMCirHtdEsrX1Gf/OSRbtXzU3rjpPVsMnWh5PQQZrnvth6QYpz zBoVA6G+gdqct5VRazYOhMp7dUmY3TnIPPs0lxJeYA9axGwJ7MX7z8f8QHpsjhEkkXAF pVzMc7ReOJmJsnClYOhZZNB72dRaEXeVXBh4ksphbXb+sWtWNRP+miihEyvic8vBJFEa 2qJQ==
X-Received: by 10.66.190.135 with SMTP id gq7mr32052222pac.65.1442934856432; Tue, 22 Sep 2015 08:14:16 -0700 (PDT)
Received: from ?IPv6:2601:647:4204:228b:ccc5:843b:ab02:c88f? ([2601:647:4204:228b:ccc5:843b:ab02:c88f]) by smtp.googlemail.com with ESMTPSA id fu4sm2878958pbb.59.2015.09.22.08.14.14 (version=TLSv1/SSLv3 cipher=OTHER); Tue, 22 Sep 2015 08:14:14 -0700 (PDT)
To: Keshab Upadhya <keshab@smsgt.com>
References: <20150902010923.059A2180474@rfc-editor.org> <00fc01d0eb78$69cdeb10$3d69c130$@smsgt.com> <29295_1441898081_55F19E61_29295_1538_5_6B7134B31289DC4FAF731D844122B36E01D1A7A5@OPEXCLILM43.corporate.adroot.infra.ftgroup> <006301d0eebc$c2dc1550$48943ff0$@smsgt.com> <55F88CDA.4080801@gmail.com> <009a01d0f02b$445e6000$cd1b2000$@smsgt.com> <25E5B468-27E4-406E-8182-4C034B42FE08@gmail.com> <000001d0f10a$ece43490$c6ac9db0$@smsgt.com>
From: Jouni Korhonen <jouni.nospam@gmail.com>
Message-ID: <56017046.1060305@gmail.com>
Date: Tue, 22 Sep 2015 08:14:14 -0700
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0
MIME-Version: 1.0
In-Reply-To: <000001d0f10a$ece43490$c6ac9db0$@smsgt.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/dime/-PC3mzd6kJL0PDUbPQ3f3Rp1teM>
Cc: 'joel jaeggli' <joelja@bogus.com>, 'RFC Errata System' <rfc-editor@rfc-editor.org>, dime@ietf.org
Subject: Re: [Dime] [Technical Errata Reported] RFC6733 (4462)
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Sep 2015 15:14:20 -0000

See inline.

9/16/2015, 10:37 PM, Keshab Upadhya kirjoitti:
> Hi,
>
> Please help with below query.
>
> Thank you.
>
> Regards,
> Keshab.
>
> -----Original Message-----
> From: Keshab Upadhya [mailto:keshab@smsgt.com]
> Sent: Wednesday, September 16, 2015 2:03 PM
> To: 'Jouni'
> Cc: 'ext lionel.morand@orange.com'; 'RFC Errata System'; 'Benoit Claise'; 'joel jaeggli'; 'dime@ietf.org list'
> Subject: RE: [Technical Errata Reported] RFC6733 (4462)
>
> Hi Jouni,
>
> Thank you.
>
> This is for server peer (HSS) for local request processing and handling of unknown destination host in s6a.

You should not have received such request in the first place. The 
routing infrastructure has issues in this case.

> If I understand correctly, a (s6a) request message lands with realm and app is supported by HSS but destination hostname is "unknown" and doesn't have routing details in peer routing table for given hostname, there will be an error (DIAMETER_UNABLE_TO_DELIVER ) returned based on RFC 6733 - 6.1 where clause of 6.1.4, 6.1.5 and 6.1.6 conditions are not fulfilled.

DIAMETER_UNABLE_TO_DELIVER would be the best choice here imho.

- JOuni


>
> Kindly confirm.
>
> Thank you.
>
> -----Original Message-----
> From: Jouni [mailto:jouni.nospam@gmail.com]
> Sent: Wednesday, September 16, 2015 12:38 PM
> To: Keshab Upadhya
> Cc: ext lionel.morand@orange.com; RFC Errata System; Benoit Claise; joel jaeggli; dime@ietf.org list
> Subject: Re: [Technical Errata Reported] RFC6733 (4462)
>
> Hi,
>
> Section 6.1 does state DIAMETER_UNABLE_TO_DELIVER to which the request receiving process imho falls to. I am assuming your node you are talking about is an agent.
>
> - Jouni
>
>
>
>
>> On 15 Sep 2015, at 19:56, Keshab Upadhya <keshab@smsgt.com> wrote:
>>
>> Hi Jouni,
>>
>> Thank you for response.
>>
>> Yes, return error looks like suitable option here as well however it's
>> not mentioned in RFC6733, 1.6.5 explicitly.
>>
>> What will be recommended alteration and which section it will be applicable?
>> Kindly advice.
>>
>> -----Original Message-----
>> From: Jouni Korhonen [mailto:jouni.nospam@gmail.com]
>> Sent: Wednesday, September 16, 2015 5:26 AM
>> To: Keshab Upadhya; lionel.morand@orange.com; 'RFC Errata System';
>> vf0213@gmail.com; jari.arkko@ericsson.com; john.loughney@nokia.com;
>> glenzorn@gmail.com; bclaise@cisco.com; joelja@bogus.com
>> Cc: dime@ietf.org
>> Subject: Re: [Technical Errata Reported] RFC6733 (4462)
>>
>>
>> The proposed correction does not seem right. For routing to work all
>> nodes within a realm must be peer, which in this case does not seem to
>> hold. I would just return an error.
>>
>> - Jouni
>>
>>
>>
>>
>>
>> 9/14/2015, 12:12 AM, Keshab Upadhya kirjoitti:
>>> Hi Lionel,
>>>
>>> Thank you for valuable feedback.
>>>
>>> I believe your understanding is inline and primarily what you've
>>> summarized below clarifies objectively, thank you.
>>>
>>> Confusion with below statement of 6.1.6, paragraph 2:
>>>
>>> "When a request is received that includes a *_realm_* and/or
>>> *_application_* that is *_not_* locally supported, the message is
>>> routed to the peer configured in the routing table (see Section 2.7)."
>>>
>>> As per above statement if realm is present and if application is not
>>> locally supported then below action will be taken place.
>>>
>>> “---- if not, route the request based on Realm/application (section
>> 6.1.6)”
>>>
>>> What will happen if towards a server peer node where hostname is
>>> incorrect and application id with realm locally supported?
>>>
>>> Understanding from RFC - If we go with 6.1.4, such message shouldn’t
>>> be processed locally but if we go with 6.1.6 message looks like
>>> should be processed locally based on above given underlined
>>> statement, defines contradiction of 6.1.4 & 6.1.6.
>>>
>>> After giving a second though on specs in section 6.1.4, if following
>>> altered–
>>>
>>> *_Original -_*
>>>
>>> 6.1.4.  Processing Local Requests
>>>
>>>     A request is known to be for local consumption when one of the
>>>
>>>     following conditions occurs:
>>>
>>>     o  The Destination-Host AVP contains the local host's identity;
>>>
>>>     o *The Destination-Host AVP is not present, the Destination-Realm
>>> AVP*
>>>
>>> *      contains a realm the server is configured to process locally, and*
>>>
>>> *     the Diameter application is locally supported; or*
>>>
>>>     o  Both the Destination-Host and the Destination-Realm are not
>>>
>>>        present
>>>
>>> *_Altered -_*
>>>
>>> 6.1.4.  Processing Local Requests
>>>
>>>     A request is known to be for local consumption when one of the
>>>
>>>     following conditions occurs:
>>>
>>>     o  The Destination-Host AVP contains the local host's identity;
>>>
>>>     o *The Destination-Host AVP is not present _in local peer routing
>>> table_, the Destination-Realm AVP*
>>>
>>> *      contains a realm the server is configured to process locally, and*
>>>
>>> *     the Diameter application is locally supported; or*
>>>
>>>     o  Both the Destination-Host and the Destination-Realm are not
>>>
>>>        present
>>>
>>> It will eliminate the contradiction.
>>>
>>> Please help enlighten us on this.
>>>
>>> Thank you,
>>>
>>> Keshab.
>>>
>>> -----Original Message-----
>>> From: lionel.morand@orange.com [mailto:lionel.morand@orange.com]
>>> Sent: Thursday, September 10, 2015 11:15 PM
>>> To: Keshab Upadhya; 'RFC Errata System'; vf0213@gmail.com;
>>> jari.arkko@ericsson.com; john.loughney@nokia.com; glenzorn@gmail.com;
>>> bclaise@cisco.com; joelja@bogus.com; jouni.nospam@gmail.com
>>> Cc: dime@ietf.org
>>> Subject: RE: [Technical Errata Reported] RFC6733 (4462)
>>>
>>> Hi Keshab,
>>>
>>> I'm not totally sure to understand your concern.
>>>
>>> The purpose of the section 6.1.4 is to give the conditions for
>>> processing locally a request (i.e. how to know that the receiving
>>> entity is the one that needs to answer to the request?) and nothing else.
>>>
>>> The case you are referring to is covered in the section 6.1.6 and
>>> should not be part of section 6.1.4.
>>>
>>> To make a long story short...
>>>
>>> if the Destination-Host is present,
>>>
>>> - if the identity is equal to the local host's identity --> process
>>> locally (section 6.1.4)
>>>
>>> - if the identity is not equal to the local host's identity, check
>>> the peer table.
>>>
>>> ---- If it is the peer table, forward the request to the peer (sect
>>> 6.1.5)
>>>
>>> ---- if not, route the request based on Realm/application (section
>>> 6.1.6)
>>>
>>> Let me know if it is OK for you.
>>>
>>> Lionel
>>>
>>> -----Message d'origine-----
>>>
>>> De : Keshab Upadhya [mailto:keshab@smsgt.com] Envoyé : jeudi 10
>>> septembre 2015 05:26 Ŕ : 'RFC Errata System'; vf0213@gmail.com
>>> <mailto:vf0213@gmail.com>; jari.arkko@ericsson.com
>>> <mailto:jari.arkko@ericsson.com>; john.loughney@nokia.com
>>> <mailto:john.loughney@nokia.com>; glenzorn@gmail.com
>>> <mailto:glenzorn@gmail.com>; bclaise@cisco.com
>>> <mailto:bclaise@cisco.com>; joelja@bogus.com
>>> <mailto:joelja@bogus.com>; jouni.nospam@gmail.com
>>> <mailto:jouni.nospam@gmail.com>; MORAND Lionel IMT/OLN Cc :
>>> dime@ietf.org <mailto:dime@ietf.org> Objet : RE: [Technical Errata
>>> Reported] RFC6733 (4462)
>>>
>>> Hi All,
>>>
>>> Good day!
>>>
>>> Could you please help on below request raised as conflict in RFC-6733?
>>>
>>> Kindly consider this as an urgent request.
>>>
>>> Thank you,
>>>
>>> Regards,
>>>
>>> Keshab.
>>>
>>> -----Original Message-----
>>>
>>> From: RFC Errata System [mailto:rfc-editor@rfc-editor.org]
>>>
>>> Sent: Wednesday, September 2, 2015 9:09 AM
>>>
>>> To: vf0213@gmail.com <mailto:vf0213@gmail.com>;
>>> jari.arkko@ericsson.com <mailto:jari.arkko@ericsson.com>;
>>> john.loughney@nokia.com <mailto:john.loughney@nokia.com>;
>>> glenzorn@gmail.com <mailto:glenzorn@gmail.com>; bclaise@cisco.com
>>> <mailto:bclaise@cisco.com>; joelja@bogus.com
>>> <mailto:joelja@bogus.com>; jouni.nospam@gmail.com
>>> <mailto:jouni.nospam@gmail.com>; lionel.morand@orange.com
>>> <mailto:lionel.morand@orange.com>
>>>
>>> Cc: keshab@smsgt.com <mailto:keshab@smsgt.com>; dime@ietf.org
>>> <mailto:dime@ietf.org>; rfc-editor@rfc-editor.org
>>> <mailto:rfc-editor@rfc-editor.org>
>>>
>>> Subject: [Technical Errata Reported] RFC6733 (4462)
>>>
>>> The following errata report has been submitted for RFC6733, "Diameter
>>> Base Protocol".
>>>
>>> --------------------------------------
>>>
>>> You may review the report below and at:
>>>
>>> http://www.rfc-editor.org/errata_search.php?rfc=6733&eid=4462
>>>
>>> --------------------------------------
>>>
>>> Type: Technical
>>>
>>> Reported by: Keshab Upadhya <keshab@smsgt.com
>>> <mailto:keshab@smsgt.com>>
>>>
>>> Section: 6.1.4 6.1.6
>>>
>>> Original Text
>>>
>>> -------------
>>>
>>> 6.1.4.  Processing Local Requests
>>>
>>>     A request is known to be for local consumption when one of the
>>>
>>>     following conditions occurs:
>>>
>>>     o  The Destination-Host AVP contains the local host's identity;
>>>
>>>     o  The Destination-Host AVP is not present, the Destination-Realm
>>> AVP
>>>
>>>        contains a realm the server is configured to process locally,
>>> and
>>>
>>>       the Diameter application is locally supported; or
>>>
>>>     o  Both the Destination-Host and the Destination-Realm are not
>>>
>>>        present.
>>>
>>> 6.1.6.  Request Routing
>>>
>>>     Diameter request message routing is done via realms and
>>> Application
>>>
>>>     Ids. A Diameter message that may be forwarded by Diameter agents
>>>
>>>     (proxies, redirect agents, or relay agents) MUST include the
>>> target
>>>
>>>     realm in the Destination-Realm AVP.  Request routing SHOULD rely
>>> on
>>>
>>>     the Destination-Realm AVP and the Application Id present in the
>>>
>>>     request message header to aid in the routing decision.  The realm
>>> MAY
>>>
>>>     be retrieved from the User-Name AVP, which is in the form of a
>>>
>>>     Network Access Identifier (NAI).  The realm portion of the NAI is
>>>
>>>     inserted in the Destination-Realm AVP.
>>>
>>>     Diameter agents MAY have a list of locally supported realms and
>>>
>>>     applications, and they MAY have a list of externally supported
>>> realms
>>>
>>>     and applications.  When a request is received that includes a
>>> realm
>>>
>>>     and/or application that is not locally supported, the message is
>>>
>>>     routed to the peer configured in the routing table (see Section 2.7).
>>>
>>>     Realm names and Application Ids are the minimum supported routing
>>>
>>>     criteria, additional information may be needed to support redirect
>>>
>>>     semantics.
>>>
>>> Corrected Text
>>>
>>> --------------
>>>
>>> 6.1.6 -
>>>
>>>    When a request is received that includes a realm
>>>
>>>     and/or application that is not locally supported, the message is
>>>
>>>     routed to the peer configured
>>>
>>> conflicts with 6.1.4 -
>>>
>>>     The Destination-Host AVP is not present, the Destination-Realm AVP
>>>
>>>        contains a realm the server is configured to process locally,
>>> and
>>>
>>>        the Diameter application is locally supported
>>>
>>> Notes
>>>
>>> -----
>>>
>>> please guide if 6.1.4 Local processing - "hostname not present" needs
>>> to be amended by "not present in host peer routing table". otherwise
>>> it conflicts with 6.1.6.
>>>
>>> Instructions:
>>>
>>> -------------
>>>
>>> This erratum is currently posted as "Reported". If necessary, please
>>> use "Reply All" to discuss whether it should be verified or rejected.
>>> When a decision is reached, the verifying party (IESG) can log in to
>>> change the status and edit the report, if necessary.
>>>
>>> --------------------------------------
>>>
>>> RFC6733 (draft-ietf-dime-rfc3588bis-33)
>>>
>>> --------------------------------------
>>>
>>> Title               : Diameter Base Protocol
>>>
>>> Publication Date    : October 2012
>>>
>>> Author(s)           : V. Fajardo, Ed., J. Arkko, J. Loughney, G. Zorn, Ed.
>>>
>>> Category            : PROPOSED STANDARD
>>>
>>> Source              : Diameter Maintenance and Extensions
>>>
>>> Area                : Operations and Management
>>>
>>> Stream              : IETF
>>>
>>> Verifying Party     : IESG
>>>
>>> _____________________________________________________________________
>>> _ ___________________________________________________
>>>
>>> Ce message et ses pieces jointes peuvent contenir des informations
>>> confidentielles ou privilegiees et ne doivent donc pas etre diffuses,
>>> exploites ou copies sans autorisation. Si vous avez recu ce message
>>> par erreur, veuillez le signaler a l'expediteur et le detruire ainsi
>>> que les pieces jointes. Les messages electroniques etant susceptibles
>>> d'alteration, Orange decline toute responsabilite si ce message a ete
>>> altere, deforme ou falsifie. Merci.
>>>
>>> This message and its attachments may contain confidential or
>>> privileged information that may be protected by law; they should not
>>> be distributed, used or copied without authorisation.
>>>
>>> If you have received this email in error, please notify the sender
>>> and delete this message and its attachments.
>>>
>>> As emails may be altered, Orange is not liable for messages that have
>>> been modified, changed or falsified.
>>>
>>> Thank you.
>