Re: [MBONED] APPSDIR review of draft-ietf-mboned-64-multicast-address-format-01
Tina TSOU <Tina.Tsou.Zouting@huawei.com> Wed, 09 May 2012 22:47 UTC
Return-Path: <Tina.Tsou.Zouting@huawei.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7E91A11E80C1; Wed, 9 May 2012 15:47:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.476
X-Spam-Level:
X-Spam-Status: No, score=-2.476 tagged_above=-999 required=5 tests=[AWL=0.123, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ow1gAZNqK8P0; Wed, 9 May 2012 15:47:26 -0700 (PDT)
Received: from dfwrgout.huawei.com (dfwrgout.huawei.com [206.16.17.72]) by ietfa.amsl.com (Postfix) with ESMTP id 42EEA11E8086; Wed, 9 May 2012 15:47:26 -0700 (PDT)
Received: from 172.18.9.243 (EHLO dfweml202-edg.china.huawei.com) ([172.18.9.243]) by dfwrg02-dlp.huawei.com (MOS 4.2.3-GA FastPath) with ESMTP id AFT08510; Wed, 09 May 2012 18:47:26 -0400 (EDT)
Received: from DFWEML404-HUB.china.huawei.com (10.193.5.203) by dfweml202-edg.china.huawei.com (172.18.9.108) with Microsoft SMTP Server (TLS) id 14.1.323.3; Wed, 9 May 2012 15:44:38 -0700
Received: from SZXEML436-HUB.china.huawei.com (10.72.61.64) by dfweml404-hub.china.huawei.com (10.193.5.203) with Microsoft SMTP Server (TLS) id 14.1.323.3; Wed, 9 May 2012 15:44:36 -0700
Received: from SZXEML526-MBS.china.huawei.com ([169.254.7.48]) by szxeml436-hub.china.huawei.com ([10.72.61.64]) with mapi id 14.01.0323.003; Thu, 10 May 2012 06:44:31 +0800
From: Tina TSOU <Tina.Tsou.Zouting@huawei.com>
To: Carsten Bormann <cabo@tzi.org>
Subject: Re: [MBONED] APPSDIR review of draft-ietf-mboned-64-multicast-address-format-01
Thread-Topic: [MBONED] APPSDIR review of draft-ietf-mboned-64-multicast-address-format-01
Thread-Index: AQHNLhUlNH7HgXPKw06b6CUPyEH5epbCDmwE
Date: Wed, 09 May 2012 22:44:30 +0000
Message-ID: <D003B142-55BA-4DD6-B293-849CB828E1E6@huawei.com>
References: <92309DC0-A179-4B5B-9D8C-4B55F64A4668@tzi.org> <94C682931C08B048B7A8645303FDC9F36E29946F71@PUEXCB1B.nanterre.francetelecom.fr>, <9DBF9340-B04E-4A6A-98A1-B90525A1407C@tzi.org>
In-Reply-To: <9DBF9340-B04E-4A6A-98A1-B90525A1407C@tzi.org>
Accept-Language: en-US, zh-CN
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mailman-Approved-At: Wed, 09 May 2012 16:12:33 -0700
Cc: "6man@ietf.org" <6man@ietf.org>, "apps-discuss@ietf.org application-layer protocols" <apps-discuss@ietf.org>, "draft-ietf-mboned-64-multicast-address-format.all@tools.ietf.org" <draft-ietf-mboned-64-multicast-address-format.all@tools.ietf.org>, The IESG <iesg@ietf.org>, "mboned@ietf.org" <mboned@ietf.org>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipv6>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 May 2012 22:47:27 -0000
Sent from my iPad On May 9, 2012, at 11:54 AM, "Carsten Bormann" <cabo@tzi.org> wrote: > Hi Med, > > thanks for looking into my review. Let me take this opportunity to reiterate that, while I wrote this review for the Applications Area Directorate, it is not intended to bear more weight than any other comment submitted by an individual during a Last Call. > >> Med: There are plenty of applications using this address format: e.g., [I-D.ietf-softwire-mesh-multicast], [I-D.ietf-softwire-dslite-multicast], [I-D.ietf-softwire-multicast-prefix-option], [I-D.venaas-behave-v4v6mc-framework], [I-D.sarikaya-behave-netext-nat64-pmip], [I-D.sarikaya-behave-mext-nat64-dsmip], etc. We had pointers to some of those drafts in earlier versions of the document but we removed them and adopted the same approach as RFC6052: only the address format is defined while the usage is defined in companion documents. > > The problem with this is that you now have a bit allocation without any semantics. > What is different, then, from any other way to allocate multicast addresses? > If you want this part of the address space to have some specific semantics, you have to give it some. > >> More details are also documented here: http://tools.ietf.org/html/draft-boucadair-behave-64-multicast-address-format-03#appendix-A.1 and http://tools.ietf.org/html/draft-boucadair-behave-64-multicast-address-format-03#appendix-A.2. >> >> There is also a problem statement, available at: http://tools.ietf.org/html/draft-jaclee-behave-v4v6-mcast-ps-03 which can be cited in the introduction. > > I do believe that there needs to be some indication in the document. > Maybe some of the material from the problem statement can be put into an appendix. > BTW, what is the plan with the problem statement document? Was this too contentious to make it a WG document? It's has been adopted as MBONED WG item. The authors will submit the WG draft soon. > >>> ** Major Issues: >>> >>> To continue the summary: I don't understand which network elements >>> need to be able to determine, by looking at an IP address, that this >>> document is in use. What for? More generally, which entities need to >>> interoperate based on a common understanding of this format? >> >> Med: Elements which make use of the address format are deployment-specific; this can be a receiver, an IPv4-IPv6 PIM interworking function, IGMP/MLD Interworking function. We didn't quoted these interworking functions because this is deployment-specific. Do you think your issue can be solved if we add a pointer to one of the solutions documented listed above? > > So the idea is that this is a common format that can be used by any number of transition mechanisms? > How do you avoid the mechanisms getting confused (e.g., one mechanism allocating an address that is then processed incorrectly by a network element that is using another mechanism)? > > Yes, I think standardizing this document in a cluster with one or more transition mechanism documents and adding mutual references would be the best way to handle this. As long as the question above has a good answer... http://datatracker.ietf.org/doc/draft-perreault-mboned-igmp-mld-translation/ http://datatracker.ietf.org/doc/draft-taylor-pim-v4v6-translation/ > >>> Of the various fields left "configurable according to local policies >>> of the entity managing the IPv4-IPv6 Interconnection Function", which >>> are important for applications? How do they know these policies? >> >> Med: The content of this filed is left configurable. Its value will depend on the policies enforced by the administrative entity. Examples of these policies are: embedded-RF, use unicast-based prefix, etc. Applications are not aware of these policies since a prefix will (likely /96) will be provisioned (see Section 6). >> >> If >>> that information is all in the two parameters "ASM_MPREFIX64" and >>> "SSM_MPREFIX64", what is the protocol that will be used to make this >>> information available to applications? I don't think this can be a >>> standards-track document without defining at least one MTI protocol >>> for disseminating this information. >> >> Med: The provisioning of the ASM_PREFIX64 and the SSM_PREFIX is orthogonal to the address format itself. Various methods can be used but this is out of scope of the document. We can add a pointer to http://tools.ietf.org/html/draft-ietf-softwire-multicast-prefix-option-00 as a provisioning example. Would you be fine with adding such reference? > > Are there any requirements on the provisioning mechanism to maintain the integrity of the semantics you desire? > I think the format just needs to state those. > Pointing to a protocol as an existence proof would also be an improvement. Good suggestion. > >> What is an implementation >>> supposed to do that receives an address that looks like it is governed >>> by this document but does not conform to either of the agreed >>> prefixes disseminated to the implementation? >> >> Med: This is an issue for the provisioning method and not for the specification of the address format itself. > > I'm not sure about that. If I get a conflicting address using some control protocol, should I deny that? Just go ahead anyway? > Will this confuse the network elements performing the transition mechanisms? > (My questions may sound very theoretic, but that is because the draft just doesn't tell me enough to even know whether these are good questions.) > >> Med: Could you please suggest a better title? > > Well, given that RFC 6052 already uses "IPv4-embedded" in what I read as the inverted semantics, this naming is hard to fix. > But maybe > > IPv6 Multicast Address Format With Embedded IPv4 Multicast Address > > is not too long and much less ambiguous. > >>> 3 >>> >>> The role of 64IX is very unclear. My conjecture is that this draft is >>> defining the address format for the case M=1 only (i.e., address[16] = >>> 1). No text defines what happens for M=0, so the assumption appears >>> to be that RFC 4291 applies unchanged in this case. If this >>> conjecture is correct, this needs to be made much clearer. >> >> Med: The current text says: "When "M-bit" is set to 1, it indicates that a multicast >> IPv4 address is embedded in the low-order 32 bits of the multicast >> IPv6 address.". I can add: "When "M-bit" is set to 0, the address format follows [RFC4291].". Would this be fine with you? > > Yes, maybe make even more explicit that this document just governs those addresses where the M bit is set to 1. > >>> What is "r"? Define. >> >> Med: This means "reserved". The text says: "All the remaining bits are reserved and MUST be set >> to 0.". Do you think the text should be clarified further? > > Yes. I think you should not talk about a "64IX" nibble at all (which then requires you to reserve three of those four bits) but just talk about the one M bit that you are assigning semantics to. > >>> 4 >>> >>> Why is 64IX moving around here? >>> (The discriminating bit M now seems to be address[32].) >>> How does one find out which of the two positions of the M bit to use? >> >> Med: Once the prefix is configured to a receiver, an IPv4-IPv6 PIM interworking function, the question of the location of the M-bit is not relevant anymore. If both ASM and SSM modes are supported, two prefixes will be used. > > Again, that is true if all network elements agree on the provisioned prefixes. > But if they do, what is the point of this document? > Just saying "transition mechanisms can allocate a 96-bit prefix to which a 32-bit IPv4 multicast address is appended" would be enough then, no? > > I get the idea that people want to write code that looks at this bit and exhibits different behavior based on whether it is set or not. > If that is not the case, there is no need for that bit... > >>> . o sub-group-id: The default value is all zeros. >>> How does an application find out when to choose a different one? >> >> Med: Applications are provisioned with the full prefix; see Section 6. > > But what does "default value" mean then? Who is doing the defaulting, and what does it mean to use the default or to not use it? > >>> . 232.0.0.1-232.0.0.255 range is being >>> . reserved to IANA. >>> Who is making this reservation? ("is being reserved" means the >>> resernation is going on right now, but I don't find anything in 9.) >> >> Med: We removed that sentence as a result of a comment I received from SM (see mboned archives). > > Fine. > >>> 7 >>> >>> 7 seems to imply this format is only useful where RFC 6052 is in use. >>> If this is true, this should be clearly stated. More specifically, >>> the assumption appears to be that all nodes that need to exchange >>> information that concerns IPv4 sources need to have the same RFC 6052 >>> parameters in effect. How is that ensured? >> >> Med: This is a generic issue for RFC6052. We can document the issue if it is specific to the multicast context. > > I actually think it is more interesting in the multicast case, because multicast can span multiple domains (where a unicast address is assigned to one node that is "in" a specific domain). > > Grüße, Carsten > > _______________________________________________ > MBONED mailing list > MBONED@ietf.org > https://www.ietf.org/mailman/listinfo/mboned
- APPSDIR review of draft-ietf-mboned-64-multicast-… Carsten Bormann
- RE: APPSDIR review of draft-ietf-mboned-64-multic… mohamed.boucadair
- Re: APPSDIR review of draft-ietf-mboned-64-multic… Carsten Bormann
- Re: [MBONED] APPSDIR review of draft-ietf-mboned-… Tina TSOU
- Re: APPSDIR review of draft-ietf-mboned-64-multic… Lee, Yiu
- Re: [MBONED] APPSDIR review of draft-ietf-mboned-… Jacni Qin
- RE: APPSDIR review of draft-ietf-mboned-64-multic… mohamed.boucadair
- Re: [MBONED] APPSDIR review of draft-ietf-mboned-… Carsten Bormann
- RE: [MBONED] APPSDIR review of draft-ietf-mboned-… mohamed.boucadair
- Re: [MBONED] APPSDIR review of draft-ietf-mboned-… Brian Haberman
- RE: [MBONED] APPSDIR review of draft-ietf-mboned-… Manfredi, Albert E
- RE: [MBONED] APPSDIR review of draft-ietf-mboned-… Tina TSOU
- RE: [MBONED] APPSDIR review of draft-ietf-mboned-… mohamed.boucadair
- Re: [MBONED] APPSDIR review of draft-ietf-mboned-… Lee, Yiu
- Re: [MBONED] APPSDIR review of draft-ietf-mboned-… Stig Venaas
- Re: [MBONED] APPSDIR review of draft-ietf-mboned-… Lee, Yiu
- Re: [MBONED] APPSDIR review of draft-ietf-mboned-… Behcet Sarikaya
- Re: [MBONED] APPSDIR review of draft-ietf-mboned-… Jacni Qin