OPS-Dir review of draft-ietf-lisp-introduction-11

"Black, David" <david.black@emc.com> Tue, 10 February 2015 23:25 UTC

Return-Path: <david.black@emc.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7D6D1A6FFE; Tue, 10 Feb 2015 15:25:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.611
X-Spam-Level:
X-Spam-Status: No, score=-1.611 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pmYpT4oBs9T2; Tue, 10 Feb 2015 15:25:27 -0800 (PST)
Received: from mailuogwdur.emc.com (mailuogwdur.emc.com [128.221.224.79]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3855A1A1AF8; Tue, 10 Feb 2015 15:25:26 -0800 (PST)
Received: from maildlpprd55.lss.emc.com (maildlpprd55.lss.emc.com [10.106.48.159]) by mailuogwprd54.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id t1ANPL8d010201 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 10 Feb 2015 18:25:22 -0500
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd54.lss.emc.com t1ANPL8d010201
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1423610723; bh=Tvg8AcQrD6sh0bMJsaDGtkB/x9w=; h=From:To:CC:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=gAul6nkg0Xe8rjDElLK2/QK5RyXwJrUQJj35UEzDt543U2HnQrEjFsgLTA3qZykAK bu4ke94dAaREiDdNcPe+xXbU0q10mVt2cE8bal9QrSuZWOOjVV6CZgCUyjL3hgzMmZ 4NgdKYAaWHErnj40kAOGg43jH966+m5GDXqu1w7Y=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd54.lss.emc.com t1ANPL8d010201
Received: from mailusrhubprd02.lss.emc.com (mailusrhubprd02.lss.emc.com [10.253.24.20]) by maildlpprd55.lss.emc.com (RSA Interceptor); Tue, 10 Feb 2015 18:25:06 -0500
Received: from mxhub33.corp.emc.com (mxhub33.corp.emc.com [10.254.93.81]) by mailusrhubprd02.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id t1ANP5sm024795 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Tue, 10 Feb 2015 18:25:05 -0500
Received: from MXHUB201.corp.emc.com (10.253.68.27) by mxhub33.corp.emc.com (10.254.93.81) with Microsoft SMTP Server (TLS) id 8.3.327.1; Tue, 10 Feb 2015 18:25:05 -0500
Received: from MX104CL02.corp.emc.com ([169.254.8.236]) by MXHUB201.corp.emc.com ([10.253.68.27]) with mapi id 14.03.0195.001; Tue, 10 Feb 2015 18:25:05 -0500
From: "Black, David" <david.black@emc.com>
To: "acabello@ac.upc.edu" <acabello@ac.upc.edu>, "damien.saucez@inria.fr" <damien.saucez@inria.fr>, "ops-dir@ietf.org" <ops-dir@ietf.org>
Subject: OPS-Dir review of draft-ietf-lisp-introduction-11
Thread-Topic: OPS-Dir review of draft-ietf-lisp-introduction-11
Thread-Index: AdBFiMToswN7n7S2Sw+GOUWYxLLMyg==
Date: Tue, 10 Feb 2015 23:25:03 +0000
Message-ID: <CE03DB3D7B45C245BCA0D24327794936362ABB@MX104CL02.corp.emc.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.238.44.129]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd02.lss.emc.com
X-RSA-Classifications: DLM_1, public
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf/Ag4X4xbf9KjQciFlLkNkIF_U10w>
Cc: "Black, David" <david.black@emc.com>, "ietf@ietf.org" <ietf@ietf.org>, "lisp@ietf.org" <lisp@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Feb 2015 23:25:32 -0000

I have reviewed this document as part of the Operational directorate's
ongoing effort to review all IETF documents being processed by the IESG.
These comments were written with the intent of improving the operational
aspects of the IETF drafts. Comments that are not addressed in last call
may be included in AD reviews during the IESG review.  Document editors
and WG chairs should treat these comments just like any other last call
comments.

Document: draft-ietf-lisp-introduction-11
Reviewer: David Black
Review Date: Feb 10, 2015
IETF LC End Date: Feb 4, 2015 (on -10)

Summary: This draft is on the right track, but has open issues
 		described in the review.

First of all, I apologize for this review showing up after the end of
IETF Last Call on this draft.  I plead being one of the victims of this
year's flu vaccine being poorly matched to the prevalent flu viruses.

The draft is generally well written and provides a nice introduction to
LISP - good job.  Most of the usual OPS-Dir questions in Appendix A of
RFC 5706 do not apply, as they are better addressed by the additional
material in the RFCs that specify the actual LISP protocol specifications.
Nonetheless, there are a few that apply, as noted in the issues below.

I found a couple of major issues that I hope arise from the
summarization of LISP in this draft, as opposed to being problems in
the actual LISP protocols.  I also found a few minor issues, the most
important of which is the need for additional security considerations
discussion on misdelivery, with particular attention to VPNs.

-- Major issues --

[A] EID mobility vs. EID prefixes

- 5. Mobility

I understand how this works when mapping is per-EID, but how does this work
when the EID of the system that moves is part of an EID prefix, as discussed
in Section 3.4.1?  Even if the answer is a long version of "Don't do that!"
it should be explained.

- 7.4.  LISP for Virtual Machine Mobility in Data Centers

I don't understand how this works when EID prefixes are used, as each VM
has its own EID or EIDs, hence the entire prefix range does not move when
the VM moves.

For OPS-Dir, this EID prefix issue [A] falls under A.1.1 in Appendix A
of RFC 5706:  Has deployment been discussed? and specifically under:

       *  Is the proposed specification deployable?  If not, how could
          it be improved?

as EID prefixes appear to be undeployable for Mobility and VM Mobility usage.

[B] LISP Multicast vs. EID/RLOC separate

- 6. Multicast

This is interesting, multicast addresses (G) look like they're an exception
to the EID/RLOC separation as the same destination IP multicast address
is used for both purposes.  This could use some more discussion, as it's
unexpected based on the contents of the draft up to this point.

- 7.2.  LISP for IPv6 Co-existence

   LISP encapsulations allows to transport packets using EIDs from a
   given address family (e.g., IPv6) with packets from other address
   families (e.g., IPv4).

How does that work for multicast traffic, where the destination address
(G) has to be the same in both the inner and outer headers?  Are ETRs
and ITRs expected to map IPv6 multicast addresses to IPv4 and v.v.?

- 7.3.  LISP for Virtual Private Networks

This also has multicast problems, as there is only one instance of each
multicast address (G) in the underlay network.  I think I can figure out how
to make multicast work for this use case, but it's not immediately obvious,
and the result when the same underlay multicast address is used by more
than one VPN could well deliver some traffic to ETRs that have to discard
it because the Instance ID is wrong (and that excessive delivery is a
security consideration, see minor issue on Section 8 below).  I think an
explanation is in order.

For OPS-Dir, this multicast issue [B] falls under A.1.4 in Appendix A of
RFC 5706: Have the Requirements on other protocols and functional
       components been discussed?

-- Minor Issues --

There seems to be an implicit assumption that the end host and its
ITR (xTR) are in the same domain or Autonomous System.  For incremental
deployment, I don't think that's always the case, but I think that only
has editorial impact on this document, as I don't think any of the
fundamental LISP mechanisms are affected.  The authors should look for
use of "domain" and "Autonomous System" and ensure that the text is
generalized to the case where the end host and ITR are more widely
separated.

Despite multiple  mentions of incremental deployment, I did not
see a discussion of how that might be accomplished.  There is some
useful content in Section 3.5, but that's at best an incomplete
explanation.  This is an OPS-Dir review concern - it falls under
A.1.3 in Appendix A of RFC 5706: Has the migration path been discussed?

- 3.3.1.  LISP Encapsulation

   the source port is selected by 
   the ITR and ignored on reception.

Please mention multipathing (e.g., ECMP and LAG) as possible influences
on how source ports are selected, as this imposes some limits on what an
ITR can reasonably do.

For OPS-Dir, this multipathing concern falls under A.1.4 in Appendix A of
RFC 5706: Have the Requirements on other protocols and functional
       components been discussed?

   This decision was made because the
   typical transport protocols used by the applications already include
   a checksum, by neglecting the additional UDP encapsulation checksum
   xTRs can forward packets more efficiently.

Groan!  I have an exquisite set of scars on UDP zero checksums for IPv6
from working on the MPLS in UDP draft, so I may be overly sensitive to
this concern.  The downside of this efficiency is that there is no
checksum coverage of the IPv6 header when zero UDP checksums are used.
That should at least be mentioned here, with a summary of why that's ok
- the detailed justification for why that's ok can be left to other
documents.

For OPS-Dir, this UDP zero checksum for IPv6 concern also falls under
A.1.4 in Appendix A of RFC 5706:
   Have the Requirements on other protocols and functional
       components been discussed?

- 8 Security Considerations

This should discuss possibility of misdelivery of LISP-encapsulated
packets to the wrong ETR and the resulting security consequences.  This
is particularly relevant to the VPN use case in Section 7.3.  This
discussion should also note that omitting the UDP checksum for IPv6
increases the opportunity for misdelivery.

For OPS-Dir, this security concern falls under A.1.5 in Appendix A of
RFC 5706: Has the impact on network operation been discussed?

This is because dealing with any such misdelivery will have an operational
impact.

-- Nits/Editorial Comments --

- Top of p.4:

   The initial motivation in the LISP effort is to be find in the

"find" -> "found"

- Section 3.1, first bullet item

      Devices are assigned with relatively opaque identity
      meaningful addresses that are independent of their topological
      location.

I don't understand "relatively opaque identity meaningful" and
suggest rewriting the sentence.  In particular - opaque to what?
meaningful to what in what manner?

- Section 3.2, second paragraph

Judging from the figure, xTRs are the common case, with single-
function ITRs and ETRs being rare.  It might be good to say that
and discuss when ITRs and ETRs that are not xTRs are appropriate
to use.

- 3rd paragraph on p.7:


   Finally, the LISP architecture emphasizes a cost effective
   incremental deployment.

I'd delete "cost effective" here and look for other occurrences
of "cost" as candidates for deletion.  This is supposed to be
a technical document, so discussion of costs is a bit off-target.

- First item after Figure 2:

   1.  HostA retrieves the EID_B of HostB, typically querying the DNS
       and obtaining and A or AAAA record.

"and A" -> "an A"  (spelling checkers don't catch everything).

- 3.3.1.  LISP Encapsulation

   On the other hand, Recursive
   tunnels are nested tunnels and are implemented by using multiple LISP
   encapsulations on a packet.

The above sentence seems out of place in the middle of a paragraph about
Re-encapsulating tunnels and routers - I suggest moving it down into its
own paragraph and perhaps adding a sentence about where/how Recursive
tunnels may be useful.

- 3.3.2.  LISP Forwarding State

   In the LISP architecture, ITRs keep just enough information to route
   traffic flowing through it.

"it." -> "them."

   Meaning that, ITRs retrieve from the
   LISP Mapping System mappings between EID prefixes and RLOCs that are
   used to encapsulate packets.

This is the first use of the notion of EID prefixes.  That concept should
be explained before it is used, although a forward reference to section
3.4.1 may suffice.  It might be better to rewrite this paragraph in terms
of EIDs and leave the notion of EID prefixes to section 3.4.1.

- 4.4.  MTU Handling

   Additionally, LISP also recommends inferring reachability of locators
   by using information provided by the underlay, in particular:

It'd be useful to add a sentence or two about how LISP and the techniques
in this section interact with host use of PMTUD and PLPMTUD.

- Next to last paragraph on p.17:

   Additionally, LISP also recommends inferring reachability of locators
   by using information provided by the underlay, in particular:

This looks like it's a paragraph early and needs to be moved down to
after the paragraph that follows it.

idnits 2.13.01 didn't find any nits.

Thanks,
--David
----------------------------------------------------
David L. Black, Distinguished Engineer
EMC Corporation, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953             FAX: +1 (508) 293-7786
david.black@emc.com        Mobile: +1 (978) 394-7754
----------------------------------------------------