Re: [Int-area] Fwd: New Version Notification for draft-nordmark-intarea-ippl-01.txt

Erik Nordmark <nordmark@acm.org> Mon, 21 March 2016 17:39 UTC

Return-Path: <nordmark@acm.org>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6AEE312D661 for <int-area@ietfa.amsl.com>; Mon, 21 Mar 2016 10:39:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.935
X-Spam-Level:
X-Spam-Status: No, score=-1.935 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_SOFTFAIL=0.665] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mtGLQwBZN6rX for <int-area@ietfa.amsl.com>; Mon, 21 Mar 2016 10:39:19 -0700 (PDT)
Received: from d.mail.sonic.net (d.mail.sonic.net [64.142.111.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B896812D797 for <int-area@ietf.org>; Mon, 21 Mar 2016 10:38:22 -0700 (PDT)
Received: from [172.22.227.238] ([162.210.130.3]) (authenticated bits=0) by d.mail.sonic.net (8.15.1/8.15.1) with ESMTPSA id u2LHcK2d029817 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Mon, 21 Mar 2016 10:38:20 -0700
To: Dave Thaler <dthaler@microsoft.com>
References: <56253854.40808@acm.org> <562538AE.8010703@sonic.net> <BY2PR03MB412ED1EEF31451409003FB4A3290@BY2PR03MB412.namprd03.prod.outlook.com>
From: Erik Nordmark <nordmark@acm.org>
Message-ID: <56F0318C.3000502@acm.org>
Date: Mon, 21 Mar 2016 10:38:20 -0700
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:38.0) Gecko/20100101 Thunderbird/38.6.0
MIME-Version: 1.0
In-Reply-To: <BY2PR03MB412ED1EEF31451409003FB4A3290@BY2PR03MB412.namprd03.prod.outlook.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Sonic-CAuth: UmFuZG9tSVY3V5Oc3MaoA6Kc6AuMnQbccMqI0i3l91Jpw5SZPxgtycx5DJa6AWaNsgBv65ciDfy8JAOIAbrw+SFygFo7VkQ1
X-Sonic-ID: C;auDQs4vv5RGPm436ZLXa/Q== M;GG3/s4vv5RGPm436ZLXa/Q==
X-Sonic-Spam-Details: 0.0/5.0 by cerberusd
Archived-At: <http://mailarchive.ietf.org/arch/msg/int-area/rz3TlRFMHKoj8-vfTS92rruyByY>
Cc: Internet Area <int-area@ietf.org>
Subject: Re: [Int-area] Fwd: New Version Notification for draft-nordmark-intarea-ippl-01.txt
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2016 17:39:21 -0000

[With better from address]

On 11/5/15 1:24 AM, Dave Thaler wrote:
>
> I notice that currently RFC 4389 is not referenced at all.
>
> It’s Experimental since there are many ways of proxying and it just 
> describes one of them,
>
> but I still think it bears referencing informatively, especially since 
> section 6 of that RFC is
>
> very relevant to the discussion on loops in the document.
>
Dave,

Sorry for the tardy response. I'll definitely add an explicit reference 
to RFC4389 in the text that currently reads "Hence a NS/NA proxy MUST 
NOT be used with private VLANs."

I don't know if you want some more analysis in the document (in the form 
of an appendix) of why packet proxies don't work.
The short form is that the assumption in RFC4389 is that there is a 
notion of upstream and downstream, but in a PVLAN with multiple routers 
(i.e. promiscuous ports) those ports are peers with no upstream vs. 
downstream notion. Forcing such a notion, e.g., by building a spanning 
tree, would remove the rapid failover and load-balancing benefits that 
motivated having multiple promiscuous ports.

AFAICT this applies to what I'd call "packet proxies" in general. Such 
proxies send a NS (with ttl=255) when receiving a NS.
What we could call "state proxies" do not have such an issue; an example 
of such is DAD proxy (RFC 6957) where a packet received from one host is 
used to build/maintain state which is then used to respond to a NS from 
another host. That approach never emits a NS as a result of receiving an 
NS hence does not have the same looping hazard.

I'll add something along the above lines and submit an update to the draft.

Thanks,
    Erik

*From:*Int-area [mailto:int-area-bounces@ietf.org] *On Behalf Of *Erik 
Nordmark
*Sent:* Tuesday, October 20, 2015 3:39 AM
*To:* Internet Area <int-area@ietf.org>
*Subject:* [Int-area] Fwd: New Version Notification for 
draft-nordmark-intarea-ippl-01.txt

This update adds one more issue about Proxy ARP/ND when there are 
multiple routers.

    Erik


-------- Forwarded Message --------

*Subject: *

	

New Version Notification for draft-nordmark-intarea-ippl-01.txt

*Date: *

	

Mon, 19 Oct 2015 11:34:04 -0700

*From: *

	

internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>

*To: *

	

Erik Nordmark <nordmark@arista.com> <mailto:nordmark@arista.com>

A new version of I-D, draft-nordmark-intarea-ippl-01.txt

has been successfully submitted by Erik Nordmark and posted to the

IETF repository.

Name:          draft-nordmark-intarea-ippl

Revision:      01

Title:         IP over Intentionally Partially Partitioned Links

Document date: 2015-10-19

Group:         intarea

Pages:         11

URL:https://www.ietf.org/internet-drafts/draft-nordmark-intarea-ippl-01.txt 
<https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww.ietf.org%2finternet-drafts%2fdraft-nordmark-intarea-ippl-01.txt&data=01%7c01%7cdthaler%40microsoft.com%7c8ffc9ba75e0f4c85b95708d2da8f0702%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=zj%2b6dMfG1dO5XaChivn3HhaPj5W3m6ppjqDTmFazqz0%3d>

Status:https://datatracker.ietf.org/doc/draft-nordmark-intarea-ippl/ 
<https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fdatatracker.ietf.org%2fdoc%2fdraft-nordmark-intarea-ippl%2f&data=01%7c01%7cdthaler%40microsoft.com%7c8ffc9ba75e0f4c85b95708d2da8f0702%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=wlAdu3Uoe2o%2bYd2c%2fyUAuSDW5GXpxJO2sFnc6zw5s2U%3d>

Htmlized:https://tools.ietf.org/html/draft-nordmark-intarea-ippl-01 
<https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2ftools.ietf.org%2fhtml%2fdraft-nordmark-intarea-ippl-01&data=01%7c01%7cdthaler%40microsoft.com%7c8ffc9ba75e0f4c85b95708d2da8f0702%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=1ZE87Hn665vt5%2bmIO%2fRS9JjpIqfaD3x%2fCikCWIikA7o%3d>

Diff:https://www.ietf.org/rfcdiff?url2=draft-nordmark-intarea-ippl-01 
<https://na01.safelinks.protection.outlook.com/?url=https%3a%2f%2fwww.ietf.org%2frfcdiff%3furl2%3ddraft-nordmark-intarea-ippl-01&data=01%7c01%7cdthaler%40microsoft.com%7c8ffc9ba75e0f4c85b95708d2da8f0702%7c72f988bf86f141af91ab2d7cd011db47%7c1&sdata=OCw2%2fxbBn1NCymhy6snJXV4g%2f2%2bZce3IWtXEC1Ax1xk%3d>

Abstract:

    IP makes certain assumptions about the L2 forwarding behavior of a

    multi-access IP link.  However, there are several forms of

    intentional partitioning of links ranging from split-horizon to

    Private VLANs that violate some of those assumptions.  This document

    specifies that link behavior and how IP handles links with those

    properties.

                                                                                   

Please note that it may take a couple of minutes from the time of submission

until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat