Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: New Version Notification for draft-liu-isis-auto-conf-04.txt
"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Sun, 19 July 2015 20:19 UTC
Return-Path: <ginsberg@cisco.com>
X-Original-To: isis-wg@ietfa.amsl.com
Delivered-To: isis-wg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 93D1F1B2BFE for <isis-wg@ietfa.amsl.com>; Sun, 19 Jul 2015 13:19:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mbtiGcoh2Cmz for <isis-wg@ietfa.amsl.com>; Sun, 19 Jul 2015 13:19:11 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ECEC81B2BF7 for <isis-wg@ietf.org>; Sun, 19 Jul 2015 13:19:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11099; q=dns/txt; s=iport; t=1437337150; x=1438546750; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=U8pL8gmhvYZx4jP/vD+ZmXsMqvCs4VBVqV7rNfJC8DU=; b=cIP+6syb1ZHtWScgBjlO31b4t87TtIPswn2aFS0JOQOHo9105aIfadC0 1S3FSz6H03JGVlDkEqAagBKMzs3vE5IAbGXk7sEwJ75fcuqLIjyq1/N0C jGjUM+8Oa/bruyTqD5Dj+/NsBF7pHKMz8DSPanu2OcBZ1mPe9MFSz7J9K 8=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BIBQAjBaxV/5BdJa1TBgODE4E9Brtoh2wCgRs5EwEBAQEBAQGBCoQjAQEBBDo6Aw4EAgEIEQQBAQsOBgkHMhQIAQgCBAESCIgmxGEBAQEBAQEBAQEBAQEBAQEBAQEBAQEXikqBAoQqKzgGBgUHgn+BFAEEjDiEf4MbAY1jhBqPSYNhJmOBKgEbFYE+b4EEJB+BBAEBAQ
X-IronPort-AV: E=Sophos;i="5.15,504,1432598400"; d="scan'208";a="170105792"
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by alln-iport-7.cisco.com with ESMTP; 19 Jul 2015 20:19:09 +0000
Received: from xhc-rcd-x06.cisco.com (xhc-rcd-x06.cisco.com [173.37.183.80]) by rcdn-core-8.cisco.com (8.14.5/8.14.5) with ESMTP id t6JKJ9qd003749 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Sun, 19 Jul 2015 20:19:09 GMT
Received: from xmb-aln-x02.cisco.com ([169.254.5.220]) by xhc-rcd-x06.cisco.com ([173.37.183.80]) with mapi id 14.03.0195.001; Sun, 19 Jul 2015 15:19:09 -0500
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: "Liubing (Leo)" <leo.liubing@huawei.com>, "isis-wg@ietf.org list" <isis-wg@ietf.org>
Thread-Topic: ISIS-autoconf-04 submitted //FW: New Version Notification for draft-liu-isis-auto-conf-04.txt
Thread-Index: AQHQmsUvhOb/9lHMUk2S32rA0gaCAZ2+NYzwgBSD/NCACOMe8IACA39ggAXnN1A=
Date: Sun, 19 Jul 2015 20:19:08 +0000
Message-ID: <F3ADE4747C9E124B89F0ED2180CC814F5949AD72@xmb-aln-x02.cisco.com>
References: <8AE0F17B87264D4CAC7DE0AA6C406F45A678E17E@nkgeml506-mbx.china.huawei.com> <F3ADE4747C9E124B89F0ED2180CC814F5947F857@xmb-aln-x02.cisco.com> <8AE0F17B87264D4CAC7DE0AA6C406F45C220267E@nkgeml506-mbx.china.huawei.com> <F3ADE4747C9E124B89F0ED2180CC814F5949536D@xmb-aln-x02.cisco.com> <8AE0F17B87264D4CAC7DE0AA6C406F45C2212AA1@nkgeml506-mbx.china.huawei.com>
In-Reply-To: <8AE0F17B87264D4CAC7DE0AA6C406F45C2212AA1@nkgeml506-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.24.113.148]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/isis-wg/StudTno6peMSGRzOq-Uwzd7GTLI>
Subject: Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: New Version Notification for draft-liu-isis-auto-conf-04.txt
X-BeenThere: isis-wg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF IS-IS working group <isis-wg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/isis-wg/>
List-Post: <mailto:isis-wg@ietf.org>
List-Help: <mailto:isis-wg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 19 Jul 2015 20:19:13 -0000
Bing - > -----Original Message----- > From: Liubing (Leo) [mailto:leo.liubing@huawei.com] > Sent: Thursday, July 16, 2015 11:41 PM > To: Les Ginsberg (ginsberg); isis-wg@ietf.org list > Subject: RE: ISIS-autoconf-04 submitted //FW: New Version Notification for > draft-liu-isis-auto-conf-04.txt > > Hi Les, > > Thanks for your quick response! Please see inline. > > > > > 2)What you have written in the draft defines a way to make > > > > conflicts low probability and defines a means of resolving > > > > conflicts when they occur - but it does not attempt to minimize > > > > the occurrence of system-id changes for a router once it has become > fully operational. > > > > This should also be a goal. To make this a reality I propose some > > additions: > > > > > > > > Define a "startup mode" wherein a router does not start > > > > advertising neighbors/reachability and/or sets the OL bit until > > > > after an initial delay has expired. During this time it acquires > > > > the LSPDB and verifies that duplicate system-id is not detected. > > > > If duplicate system-id is detected we make the starting node the > > > > one which changes its system-id regardless of fingerprint content. > > > > This has minimal impact on a running network because the startup > > > > node is not yet being used for forwarding traffic. Once duplicate > > > > system-id has been resolved (if > > > necessary) the router begins normal operation. > > > > > > > > If two routers are both in startup mode (or both NOT in startup > > > > mode) and duplicate system-id is detected then we use the rules > > > > set forth in the draft to determine which one changes its > > > > system-id based on > > > fingerprint. > > > > > > > > Indication of being in startup mode can easily be included in the > > > > fingerprint TLV with a flag. > > > > > > [Bing] I thinks it is a thoughtful complementary. Very good idea. > > > But I have a concern: anyway the duplication is a corner case, the > > > initial delay might slow down the overall speed of auto-configuring > > > the network? Is it worth to have the cost to fulfill the corner case? > > > > > [Les:] I don't believe there is a speed requirement as regards > > bringing up a new node. The network has been running fine w/o the new > > node - if after the new node comes up we delay using it for > > forwarding for a period long enough to ensure that LSPDB sync has been > > achieved and possible disruption to forwarding caused by duplicate > > system-ids is guaranteed to be avoided this seems to me be a positive > without any negatives. > > > > Using such delays on startup is a well-established practice - see RFC > > 3277. In the case of auto-configured networks we are less concerned > > about BGP convergence and more concerned w avoiding unnecessary IGP > > disruption caused by duplicate system-id. > > [Bing] For a new node that joining an existing autoconf network, I also agree > the delay should be a positive without negatives. > But my concern was mostly for the scenario that several (or even more) > routers initiate at the same timeslot, which means they will all delay, then > the LSPDB won't be built for a while, then they can't do the duplicate > detecting according to LSPDB... it seems a temporary break there and I'm a > bit confused how long should they waiting for to stop the break? > [Les:] New/restarting nodes still generate and flood LSP #0 as a minimum - which will have the fingerprint TLV - so duplicate system-id detection can still be done - which of course is essential. The delay proposal does not compromise duplicate detection in any way. What it does do is minimize disruption caused by a node assuming an identity before it has been able to perform duplicate detection - and it also prevents a node being used for forwarding before that node has had time to acquire the full LSPDB. > > > > > 3. NET duplication detection and resolution > > > > > > > > LES: More correctly "NET" should be replaced by "system-id". > > > [Bing] It is indeed essentially the sys-id duplication problem. My > > > previous concern is that NET is a complete entity and sys-id is only > > > a key > > part of it. > > > But considering your comments regarding to Section 3.3 below, I > > > think it's right to revise it as sys-id. Thanks. > > > > [Les:] This (mis)perception comes from the unfortunate (but > > widespread) practice of using a single configuration command "net" . > > Functionally what is required is: > > > > 1)Configure one or more area addresses 2)Configure a system-id > > 3)n-selector does not need to be configured since it MUST be "00" > > > > Using a single "net" command introduces confusion and leads to silly > > requirements like "when multiple nets are configured the system-id > > MUST be the same in all of them". > > I don't expect configuration commands to be changed, but we do need to > > understand what the actual protocol requirements are. > > [Bing] Thanks for your elaborate explanation. It's much clearer for me now. > > > > [Bing] The logic is this: > > > 1. At the initial stage, there is not much entropy for generating a > > > high quality Fingerprint. (This is the feedback from the > > > implementation team.) 2. Then, very unfortunately, the sys-id and > > Fingerprint both duplicated. > > > 3. At the time the Double-Duplication is detected, there should be > > > enough entropy (e.g. lots of random packets, LSP num etc.) to make > > > tiebreaker of the duplication. > > > Does this sound reasonable for you? > > > > [Les:] I would prefer that we define a robust fingerprint. This is not > > that difficult. If there are concerns about the difficulties please > > make them public. > > [Bing] It's not difficult to "define" one, but for small devices, there is some > practical difficulties. > I'll initiate another thread to discuss this issue. > > > > > Section 3.4.1. Authentication TLV > > > > > > > > LES: If security is a real concern I think cleartext password has > > > > been proven to be of not much value. I would suggest that you > > > > provide the ability to specify a password which would be used in > > > > MD5 authentication (RFC 5304) or perhaps Generic Crypto (RFC > > > > 5310). If security is not a concern, then no password/authentication is > fine. > > > > If you choose a unique area address then it is unlikely that a > > > > non-autoconf router would be configured w the same area address so > > > > you > > > would never form an adjacency with it. > > > [Bing] The Auth TLV is not for security, but just for preventing > > > non-autoconf routers joint in the autoconf area. > > > A unique area address is also an alternative, let us discuss it when > > > do the next version. Thanks for your suggestion. > > > > [Les:] You already have chosen a unique area address. (If someone > > thinks "00.0000.0000.0000" is in use in networks today it would be > > good to know > > that.) To me the point of adding authentication is either because we > > don't think unique area address is sufficient for a given deployment > > and/or we are worried about attackers. Supporting cryptographic > > authentication allows us to address both issues - plaintext password does > not. > > [Bing] I'll consider to use cryptographic authentication carefully when do the > next version. [Les:] As discussed on a side thread, the problem w the current content is that you make cleartext password a MUST. Since the protocol does not support multiple authentication TLVs in a PDU this makes the use of cryptographic authentication not possible. I think you need to allow choices here: o Run w/o authentication o Run w authentication - the type and key subject to provisioning > > > > > Also, there is more to wide metrics than 1 TLV. For completeness > > > > you should specify the list of TLVs which can/cannot be used (TLV > > > > 22, 135, etc.). Also, are you forbidding the use of MT (e.g. TLV > > > > 222, 235, etc.)? > > > [Bing] Well, my thought was that except for the explicitly mentioned > > > TLVs, the others are all NOT supposed to use. > > > > [Les:] Not sure what you mean here. But I think the draft should be > > clear on what TLVs are allowed and which are not. The text as written > > suggests (I am sure unintentionally) that you are only talking about TLV 22. > > [Bing] Ok, explicitly listing the supported/unsupported TLVs should be good. > > > > > Section 3.4.3. Dynamic Host Name TLV > > > > > > > > LES: "vendor" or "device type" won't provide uniqueness - not very > > > > helpful to have a bunch of devices all named "vendor-a". Serial #s > > > > - while likely unique - might be reasonable - assuming they are > > > > less cryptic than the chosen system-id - which is debatable. > > > > Unless there is a convenient way to get a name that the user can > > > > easily recognize I don't > > > see much value here. > > > [Bing] My thought on this TLV is "Better Than Nothing". At least it > > > is not harmful. Does this make sense for you? > > > > [Les:] Having multiple ISs advertising the same hostname (which is > > likely what would happen if you used manufacturer name) is decidedly > > "worse than nothing". > > [Bing] I agree that in theory the manufacturer name uniqueness are not > guaranteed. But I believe most of the time the uniqueness should be > sufficient in practice. Even if the uniqueness is broken, I also can't really see > essential harm. Would you elaborating a bit more about what the worse > thing you referred to? > [Les:] It is quite likely that multiple devices from the same manufacturer will be in a network. This then leads to multiple devices with the same hostname but different system-ids. I think this is confusing - not clarifying. Les > > > > Section 3.5.2. Co-existing with Other IGP Auto-configuration > > > > > > > > LES: So what you stated in Section 2 about "Interworking with > > > > other routing protocols" being out of scope apparently isn't true?? > > > > Otherwise why did you write this section? > > > [Bing] This is some complementary explanation of the Section 2 > > > relevant item. Although it is out of scope, it is a reasonable > > > practical issue, and there had been some people raised this problem, > > > so we thought it might be worth to specifically explain this. > > > > > [Les:] Problem is I cannot tell if you are saying: > > > > 1)This is unsupported > > 2)This is forbidden > > 3)This is allowed but not recommended > > > > ??? > > > > Note that you say (emphasis added): > > > > " decide which IGP to be used, or EVEN BOTH." > [Bing] For this document, it is clearly 1) This is unsupported. I'll make it more > explicit. > > > Best regards, > Bing > > > Les > > > > > Best regards, > > > Bing > > > > > > > Les > > > >
- [Isis-wg] ISIS-autoconf-04 submitted //FW: New Ve… Liubing (Leo)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Karsten Thomann
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Liubing (Leo)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Uma Chunduri
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Acee Lindem (acee)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Karsten Thomann
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Liubing (Leo)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Liubing (Leo)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Liubing (Leo)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Karsten Thomann
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Liubing (Leo)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Karsten Thomann
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Liubing (Leo)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Karsten Thomann
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Les Ginsberg (ginsberg)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Liubing (Leo)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Les Ginsberg (ginsberg)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Liubing (Leo)
- Re: [Isis-wg] ISIS-autoconf-04 submitted //FW: Ne… Les Ginsberg (ginsberg)