Re: [Isis-wg] [Technical Errata Reported] RFC5309 (5007)

Alexander Vainshtein <Alexander.Vainshtein@ecitele.com> Mon, 01 May 2017 07:43 UTC

Return-Path: <Alexander.Vainshtein@ecitele.com>
X-Original-To: isis-wg@ietfa.amsl.com
Delivered-To: isis-wg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74C7812704A for <isis-wg@ietfa.amsl.com>; Mon, 1 May 2017 00:43:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.069
X-Spam-Level:
X-Spam-Status: No, score=-4.069 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, RCVD_IN_SORBS_SPAM=0.5, SPF_PASS=-0.001, T_DKIM_INVALID=0.01, T_FILL_THIS_FORM_SHORT=0.01, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=eci365.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4DyiQ61v3U97 for <isis-wg@ietfa.amsl.com>; Mon, 1 May 2017 00:43:36 -0700 (PDT)
Received: from mail1.bemta6.messagelabs.com (mail1.bemta6.messagelabs.com [193.109.254.105]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 21213129B4B for <isis-wg@ietf.org>; Mon, 1 May 2017 00:40:51 -0700 (PDT)
Received: from [193.109.255.99] by server-1.bemta-6.messagelabs.com id 6B/3D-03869-186E6095; Mon, 01 May 2017 07:40:49 +0000
X-Brightmail-Tracker: H4sIAAAAAAAAA1WTa0xTZxjH9567DXWHm32oaEI16EzAQiaeL15 jln5walhmAkHxoGdtY1tIT8EiG3YumgjEIRIzKgaVesHNcFHjJTCkGcwxJgq7GKAaGJLirYRg DAKyc/pOxfPp95z//3n+73PyHo6MmmT0nOR2SU6HaDMwGurThVfdSQdGmAxj771UYXywhxSmK sZIYWbyGhJOXGkjhd6SUlZomG5khbY7HlJo94do4W4zIxxsfcms15gOjbTQptHvq5HpYaCWMF VONdKmm94Aaxq6nm3y+SYJk+dwB72Ny6Stjpxc9y7acv/X4ryaKsp97Ls2woMqK6gSpOEo/jA JwYlguIjijxFw4ZdSFhePEHS0+5ViHsfwa6DpxwCjcgxvhL7W52Em+ZMkeAYSVI7mN8DR8/0s 9myEmrEuEvNn0N05RqtM8UvhB18tUlnLZ8G12wM0DnuJ4M7gRLhhnhI2de4yoTLiF8Crzp8IH KaDvuGaMAPPg6+5m8QcC6P/vgkPQnwpgr+HyhksGKCkvjm8DvBlJLSEmpQOTik+h46zizEuga vBHdii9JZ1VVG4dy+0PxpEmL+Gf0L9JDb1ERB6epTFQjxcKKujsdDPgOfNXQp/Cz0E/jyCMMd DcKCFxis4oMd/6//9I+G3qmGqHCV652znnWPzzrF5lcOS/CdQf2sltiRAZekgi3k5HKo+xc59 fxqxl9AyWXIWSM6k1OQcp9VscdlFqy0pxZiWbJdkWTRLNjFHTt6da29CypX8SHluoPMzG/0oj iMMsdqOYiYjan5O7p5Ciyhbsp35Nkn2o3iOM4B2+WNFi3RKZsn9ldWm3Ou3MnARhhjtflXWyn miXbaasdSJEvQ67XxV4FXBku941/b2j+hBi/TRWqQcJCoiT3Lara4P9SdIxyFDtHZkWJkSYXW 43k1/ogQTSvCBREoNdonvJb0HRfc2jmRVbv19aF1/hi3OSNn+Kp+e9dQtXbtTrHbN1r/en3l6 02TFqme+OPOy8aruIhTIIjP7Rh+kF1RvGZ8+nrQ+8dszaR/v0+wzF84eObk5Ubch7en2LuPuO s2X7a2pwZkXWxekp86wNvrxnpVfZBeFCmP0q+4Xf3Ou4eeLGt3qP+oMlGwRU1aQTln8D7YMAE EMBAAA
X-Env-Sender: Alexander.Vainshtein@ecitele.com
X-Msg-Ref: server-8.tower-48.messagelabs.com!1493624444!101925129!1
X-Originating-IP: [52.27.180.120]
X-StarScan-Received:
X-StarScan-Version: 9.4.12; banners=ecitele.com,-,-
X-VirusChecked: Checked
Received: (qmail 26472 invoked from network); 1 May 2017 07:40:46 -0000
Received: from ec2-52-27-180-120.us-west-2.compute.amazonaws.com (HELO EUR02-AM5-obe.outbound.protection.outlook.com) (52.27.180.120) by server-8.tower-48.messagelabs.com with AES256-SHA256 encrypted SMTP; 1 May 2017 07:40:46 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ECI365.onmicrosoft.com; s=selector1-ecitele-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=WeLiVqrOHwuEZa37bkJbYM2N9sqcq620yC1GDLJuW84=; b=NJVNRG2C4lS+84XVUXECg8zT1NSgRNuCArLDhQ8eLKbvlHMzR95cRbOjXMhuNBt8s2OUZGKps1GVvVJdG0Ohkp+5nfwynMWWhlVJQ98dLGjjpjxqcjT4uWJIlRQIS8gW8m1LPd/xdLIyn9NZAKqRHmqfg4VrXnxYlgk6XUq48Ok=
Received: from AM4PR03MB1713.eurprd03.prod.outlook.com (10.167.88.15) by AM4PR03MB1713.eurprd03.prod.outlook.com (10.167.88.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1047.13; Mon, 1 May 2017 07:40:42 +0000
Received: from AM4PR03MB1713.eurprd03.prod.outlook.com ([fe80::dd45:832a:e658:e737]) by AM4PR03MB1713.eurprd03.prod.outlook.com ([fe80::dd45:832a:e658:e737%14]) with mapi id 15.01.1047.019; Mon, 1 May 2017 07:40:42 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
To: "Naiming Shen (naiming)" <naiming@cisco.com>
CC: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, "isis-wg@ietf.org" <isis-wg@ietf.org>, RFC Errata System <rfc-editor@rfc-editor.org>, "alex.zinin@alcatel-lucent.com" <alex.zinin@alcatel-lucent.com>, "akatlas@gmail.com" <akatlas@gmail.com>, "db3546@att.com" <db3546@att.com>, "Alvaro Retana (aretana)" <aretana@cisco.com>, "chopps@chopps.org" <chopps@chopps.org>, "hannes@gredler.at" <hannes@gredler.at>
Thread-Topic: [Isis-wg] [Technical Errata Reported] RFC5309 (5007)
Thread-Index: AQHSwYoCxBhcZtgLd0CoSDR/tVhrP6Hd9k4AgAAWr1CAALaTgIAAU2fw
Date: Mon, 01 May 2017 07:40:42 +0000
Message-ID: <AM4PR03MB171381904BE473010383FAD89D140@AM4PR03MB1713.eurprd03.prod.outlook.com>
References: <20170430081555.026C1B8183C@rfc-editor.org> <bd426412060143b18b888f9fb9135728@XCH-ALN-001.cisco.com> <AM4PR03MB171368B3A0BC936159ABE14A9D150@AM4PR03MB1713.eurprd03.prod.outlook.com> <F45DED94-22FE-436D-A2E9-AD01AB454832@cisco.com>
In-Reply-To: <F45DED94-22FE-436D-A2E9-AD01AB454832@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [109.64.130.250]
x-microsoft-exchange-diagnostics: 1; AM4PR03MB1713; 7:gAidfPA1VrAmdr4XPVNbNEpGbKfwZFM8yYVWkswW+dGzymGzk4yivjquNoJX6tdltWbiqJOxwPi1njT+kWu3lNUpfaT6/1+EzynFWfKD+W8przcjl2IRy7VBF57sfr0V3t1dkhYAu50njmEJCGrrNMZLdb/xbjznvpWfThZjD5UhG9ZVJUknHQPhG/pbvixnbHezEWcEa/OF0DpFZLIg03INpsMqCU1ZIAs2Xy66F15dT2k1lqCzCxAhlXxpWixYPQLXuXSdl71snVfXketN+z5qyUeaGYB9YU2Ri3LRxZz41js2XKp4wbc13yNmutWn4cGcU4Wg1C28Rd9b4eb/3Q==
x-ms-office365-filtering-correlation-id: 1cd13d5a-21f3-437c-dbf0-08d490655f18
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(48565401081)(201703131423075)(201703031133081); SRVR:AM4PR03MB1713;
x-microsoft-antispam-prvs: <AM4PR03MB1713A3BCFE7866CA5ED1F2FD9D140@AM4PR03MB1713.eurprd03.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(97927398514766)(95692535739014)(21748063052155)(279101305709854)(142525466485115);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(93006095)(93001095)(6055026)(6041248)(20161123564025)(20161123562025)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(20161123560025)(6072148); SRVR:AM4PR03MB1713; BCL:0; PCL:0; RULEID:; SRVR:AM4PR03MB1713;
x-forefront-prvs: 02945962BD
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39400400002)(39410400002)(39840400002)(39850400002)(39450400003)(377454003)(13464003)(24454002)(252514010)(85664002)(6916009)(6246003)(55016002)(66066001)(6506006)(229853002)(3280700002)(50986999)(2950100002)(6116002)(2906002)(6436002)(5660300001)(5890100001)(74316002)(7416002)(189998001)(2900100001)(5250100002)(966004)(3660700001)(33656002)(9686003)(790700001)(6306002)(99286003)(53546009)(53946003)(606005)(19609705001)(16799955002)(76176999)(3846002)(54356999)(4326008)(54906002)(15188155005)(236005)(93886004)(25786009)(508600001)(8936002)(7696004)(8676002)(110136004)(86362001)(7906003)(7736002)(38730400002)(39060400002)(81166006)(102836003)(53936002)(54896002); DIR:OUT; SFP:1102; SCL:1; SRVR:AM4PR03MB1713; H:AM4PR03MB1713.eurprd03.prod.outlook.com; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_AM4PR03MB171381904BE473010383FAD89D140AM4PR03MB1713eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ecitele.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 May 2017 07:40:42.6502 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2c514a61-08de-4519-b4c0-921fef62c42a
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR03MB1713
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/isis-wg/dOWpLGamNo2GRA2uqcSUjVA_og4>
Subject: Re: [Isis-wg] [Technical Errata Reported] RFC5309 (5007)
X-BeenThere: isis-wg@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF IS-IS working group <isis-wg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/isis-wg/>
List-Post: <mailto:isis-wg@ietf.org>
List-Help: <mailto:isis-wg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 01 May 2017 07:43:40 -0000

Naiming,
Lots of thanks for a prompt response.

Unfortunately, I do not think that your response addresses your concern.

RFC 5309 explicitly mentions “ARP implementation (which checks that the subnet of the source address of the ARP request matches the local interface address)”. Actually, ARP implementations frequently check that the source IP address in an ARP request is in the subnet of the local interface address. E.g., AFAIK, this is the standard behavior of the Linux ARP implementation. To the best of my understanding this was the check that RFC 5309 implied, because there is no way the subnet of the source address of the ARP request could be known.

If such check is applied, then the scenario I’ve described becomes valid. I can add that I have observed several implementations that experience the described behavior (i.e., blackholing of unicast IP traffic that OSPF tries to route via such a link). Some other implementations seem to behave better.

Regards,
Sasha





Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@ecitele.com

From: Naiming Shen (naiming) [mailto:naiming@cisco.com]
Sent: Monday, May 01, 2017 5:34 AM
To: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com>
Cc: Les Ginsberg (ginsberg) <ginsberg@cisco.com>; isis-wg@ietf.org; RFC Errata System <rfc-editor@rfc-editor.org>; alex.zinin@alcatel-lucent.com; akatlas@gmail.com; db3546@att.com; Alvaro Retana (aretana) <aretana@cisco.com>; chopps@chopps.org; hannes@gredler.at
Subject: Re: [Isis-wg] [Technical Errata Reported] RFC5309 (5007)


Alexander,

If you are saying the local LAN interface is explicitly configured with
a different subnet IP address then the peer, I don’t think there is any
problem with the ARP, and also with this RFC. Since ARP will always
reply to answer its own IP addresses on the interface upon request.

This RFC is only saying, if it’s p2p-over-lan over an unnumbered IP address,
and this LAN interface needs to proxy-ARP the IP address it binds to.
If the ARP already replies since you have an IP address, and our
p2p-over-LAN intf also uses this IP address, nothing is broken.

thanks.
- Naiming

On Apr 30, 2017, at 8:50 AM, Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>> wrote:

Les,
Lots of thanks for a prompt response.

As I see it, the difference between the P2P and LAN modes is essential for OSPF:
- If an OSPF interface is a LAN (broadcast) interface, there is a check of the same subnet for received Hello packets. If the received Hello packets do not pass this check, they are discarded and an error is reported via SNMP.
- However, if an OSPF interface is a P2P interface, then the subnet check on the Hello packets is bypassed  by design as defined in Section 10.5 of RFC 2328:

                     The generic input processing of OSPF packets will
        have checked the validity of the IP header and the OSPF packet
        header.  Next, the values of the Network Mask, HelloInterval,
        and RouterDeadInterval fields in the received Hello packet must
        be checked against the values configured for the receiving
        interface.  Any mismatch causes processing to stop and the
        packet to be dropped.  In other words, the above fields are
        really describing the attached network's configuration. However,
        there is one exception to the above rule: on point-to-point
        networks and on virtual links, the Network Mask in the received
        Hello Packet should be ignored.

I.e., having different subnets on two ends of a PPP link would not cause any problems for OSPF - the adjacency would be successfully recognized, it would progress to its FULL state, and unicast traffic would cross such a link without any problem.

But if we have a P2P-over-LAN link (which is the case for RFC 5309), the result would be quite different - unless the ARP implementations go beyond what 5309 says and relax the check for all such links, be they numbered or unnumbered.

Do I miss something substantial here?



Regards,
Sasha

Office: +972-39266302
Cell:      +972-549266302
Email:   Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>


-----Original Message-----
From: Les Ginsberg (ginsberg) [mailto:ginsberg@cisco.com]
Sent: Sunday, April 30, 2017 5:19 PM
To: RFC Errata System <rfc-editor@rfc-editor.org<mailto:rfc-editor@rfc-editor.org>>; Naiming Shen (naiming) <naiming@cisco.com<mailto:naiming@cisco.com>>; alex.zinin@alcatel-lucent.com<mailto:alex.zinin@alcatel-lucent.com>; akatlas@gmail.com<mailto:akatlas@gmail.com>; db3546@att.com<mailto:db3546@att.com>; Alvaro Retana (aretana) <aretana@cisco.com<mailto:aretana@cisco.com>>; chopps@chopps.org<mailto:chopps@chopps.org>; hannes@gredler.at<mailto:hannes@gredler.at>
Cc: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>>; isis-wg@ietf.org<mailto:isis-wg@ietf.org>
Subject: RE: [Isis-wg] [Technical Errata Reported] RFC5309 (5007)

Alexander -

I am not speaking for the RFC authors, but regarding your point:

> o          Are assigned with IP addresses and subnet masks yielding different
> subnets

I fail to see why this issue is unique to (or associated with) running in P2P mode.

The unnumbered case is specifically mentioned because in such a case it can be expected that the next hop address will be a loopback address and therefore there will be no common subnet.
But in the numbered case whether you have one neighbor in P2P mode or many neighbors in multi-access mode the msimatched subnet issue is the same. Therefore I see no reason why these RFCs should discuss it.

???

   Les


> -----Original Message-----
> From: Isis-wg [mailto:isis-wg-bounces@ietf.org] On Behalf Of RFC
> Errata System
> Sent: Sunday, April 30, 2017 1:16 AM
> To: Naiming Shen (naiming); alex.zinin@alcatel-lucent.com<mailto:alex.zinin@alcatel-lucent.com>;
> akatlas@gmail.com<mailto:akatlas@gmail.com>; db3546@att.com<mailto:db3546@att.com>; Alvaro Retana (aretana);
> chopps@chopps.org<mailto:chopps@chopps.org>; hannes@gredler.at<mailto:hannes@gredler.at>
> Cc: Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>; isis-wg@ietf.org<mailto:isis-wg@ietf.org>;
> rfc-editor@rfc- editor.org<http://webdefence.global.blackspider.com/urlwrap/?q=AXicE3RmiL7GwDDlCANDUU6lgUmSXnFRmV5uYmZOcn5eSVF-jl5yfi5DmYmhUUREcLmBkaGRuQmDY05qRWJeSmqRXlhiZl5xRklqZp5DanJmSWpOKlh9RklJgZW-fmpKZkl-kV5-UToDA0PFQQYGAOFQJGs&Z>
> Subject: [Isis-wg] [Technical Errata Reported] RFC5309 (5007)
>
> The following errata report has been submitted for RFC5309,
> "Point-to-Point Operation over LAN in Link State Routing Protocols".
>
> --------------------------------------
> You may review the report below and at:
> http://www.rfc-editor.org/errata_search.php?rfc=5309&eid=5007
>
> --------------------------------------
> Type: Technical
> Reported by: Alexander Vainshtein <Alexander.Vainshtein@ecitele.com<mailto:Alexander.Vainshtein@ecitele.com>>
>
> Section: 4.3
>
> Original Text
> -------------
> For the ARP implementation (which checks that the subnet of the source
> address of the ARP request matches the local interface address), this
> check needs to be relaxed for the unnumbered p2p-over-lan circuits.
>
> Corrected Text
> --------------
> For the ARP implementation (which checks that the subnet of the source
> address of the ARP request matches the local interface address), this
> check needs to be relaxed for the p2p-over-lan circuits (both numbered
> and unnumbered).
>
> Notes
> -----
> Consider the following situation:
> 1.         Two routers, R1 and R2, are connected by a physical P2P  Ethernet
> link
> 2.         OSPFv2 is enabled on the interfaces representing the endpoints of
> this link.
> 3.      From the OSPF POV these interfaces:
> o          Are configured as P2P
> o          Belong to the same area
> o          Are assigned with IP addresses and subnet masks yielding different
> subnets
> 4.    ARP check mentioned in the problematic text is not relaxed.
>
> Under this conditions:
> -Both R1 and R2 will accept Hello messages sent by the other router
> (becase it ignores subnet in Hello messages received via P2P
> interfaces)
> - Adjacency between R1 and R2 will progress to FULL state (because all
> OSPFv2 messages will be sent with AllSPFRouters multicast IPv4
> address)
> - Unicast traffic sent by R1 to R2 (and vice versa) will be blackholed
> because ARP will not resolve addresses assigned to the corresponding interfaces.
>
> Instructions:
> -------------
> This erratum is currently posted as "Reported". If necessary, please
> use "Reply All" to discuss whether it should be verified or rejected.
> When a decision is reached, the verifying party can log in to change
> the status and edit the report, if necessary.
>
> --------------------------------------
> RFC5309 (draft-ietf-isis-igp-p2p-over-lan-06)
> --------------------------------------
> Title               : Point-to-Point Operation over LAN in Link State Routing
> Protocols
> Publication Date    : October 2008
> Author(s)           : N. Shen, Ed., A. Zinin, Ed.
> Category            : INFORMATIONAL
> Source              : IS-IS for IP Internets
> Area                : Routing
> Stream              : IETF
> Verifying Party     : IESG
>
> _______________________________________________
> Isis-wg mailing list
> Isis-wg@ietf.org<mailto:Isis-wg@ietf.org>
> https://www.ietf.org/mailman/listinfo/isis-wg

___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this
transmission in error, please inform us by e-mail, phone or fax, and then delete the original
and all copies thereof.
___________________________________________________________________________


___________________________________________________________________________

This e-mail message is intended for the recipient only and contains information which is 
CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have received this 
transmission in error, please inform us by e-mail, phone or fax, and then delete the original 
and all copies thereof.
___________________________________________________________________________