Re: [Isis-wg] draft-ietf-isis-genapp

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Wed, 17 September 2008 06:46 UTC

Return-Path: <isis-wg-bounces@ietf.org>
X-Original-To: isis-archive@megatron.ietf.org
Delivered-To: ietfarch-isis-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 78E3F28C264; Tue, 16 Sep 2008 23:46:59 -0700 (PDT)
X-Original-To: isis-wg@core3.amsl.com
Delivered-To: isis-wg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A596B28C264 for <isis-wg@core3.amsl.com>; Tue, 16 Sep 2008 23:46:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oQo8qeMb5i-T for <isis-wg@core3.amsl.com>; Tue, 16 Sep 2008 23:46:52 -0700 (PDT)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117]) by core3.amsl.com (Postfix) with ESMTP id A629428C0FC for <isis-wg@ietf.org>; Tue, 16 Sep 2008 23:46:52 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,413,1217808000"; d="scan'208";a="156947110"
Received: from sj-dkim-5.cisco.com ([171.68.10.79]) by sj-iport-6.cisco.com with ESMTP; 17 Sep 2008 06:47:05 +0000
Received: from sj-core-4.cisco.com (sj-core-4.cisco.com [171.68.223.138]) by sj-dkim-5.cisco.com (8.12.11/8.12.11) with ESMTP id m8H6l5bw017318; Tue, 16 Sep 2008 23:47:05 -0700
Received: from xbh-sjc-231.amer.cisco.com (xbh-sjc-231.cisco.com [128.107.191.100]) by sj-core-4.cisco.com (8.13.8/8.13.8) with ESMTP id m8H6l5u1029786; Wed, 17 Sep 2008 06:47:05 GMT
Received: from xmb-sjc-222.amer.cisco.com ([128.107.191.106]) by xbh-sjc-231.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 16 Sep 2008 23:47:05 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Tue, 16 Sep 2008 23:46:39 -0700
Message-ID: <AE36820147909644AD2A7CA014B1FB5206655498@xmb-sjc-222.amer.cisco.com>
In-Reply-To: <7000E71D8C525042A815432358B2F1240138D679@paul.adoffice.local.de.easynet.net>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Isis-wg] draft-ietf-isis-genapp
Thread-Index: AckMTLNnAlJoySDjSVmfT0NksyZpeQMQATfA
References: <7000E71D8C525042A815432358B2F1240138D679@paul.adoffice.local.de.easynet.net>
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: "Ilya Varlashkin" <Ilya.Varlashkin@de.easynet.net>, "IETF IS-IS" <isis-wg@ietf.org>
X-OriginalArrivalTime: 17 Sep 2008 06:47:05.0243 (UTC) FILETIME=[32720EB0:01C91891]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=5465; t=1221634025; x=1222498025; c=relaxed/simple; s=sjdkim5002; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=ginsberg@cisco.com; z=From:=20=22Les=20Ginsberg=20(ginsberg)=22=20<ginsberg@cisc o.com> |Subject:=20RE=3A=20[Isis-wg]=20draft-ietf-isis-genapp |Sender:=20; bh=12Am9w/JetAx1xO3zz2kSdrUeG9HhYCMiw448jltNL8=; b=Gmx8QqDgOa2zpNsv/HshXN6Zf1Ba3nd14Ar/vQ04T4vCjjdb3jGhDzMwbi /k3jt7a8PhEwYDO+cUAQ1LgkViUNHa7u1sHXi8YBC6HiU15riE77ivZOMd/5 tOzBKxGGsZ;
Authentication-Results: sj-dkim-5; header.From=ginsberg@cisco.com; dkim=pass ( sig from cisco.com/sjdkim5002 verified; );
Subject: Re: [Isis-wg] draft-ietf-isis-genapp
X-BeenThere: isis-wg@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF IS-IS working group <isis-wg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/isis-wg>
List-Post: <mailto:isis-wg@ietf.org>
List-Help: <mailto:isis-wg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: isis-wg-bounces@ietf.org
Errors-To: isis-wg-bounces@ietf.org

Ilya -

I have been away - but I do not see that any response to your questions
has been sent in the interim - so hopefully this belated reply is still
useful.

Inline.

> -----Original Message-----
> From: isis-wg-bounces@ietf.org [mailto:isis-wg-bounces@ietf.org] On
Behalf
> Of Ilya Varlashkin
> Sent: Monday, September 01, 2008 9:07 AM
> To: IETF IS-IS
> Subject: [Isis-wg] draft-ietf-isis-genapp
> 
> Hi All,
> 
> I've went once more through the draft and have few questions.
> 
> 1) What correct implementation should do if it received GENINFO TLV
when
> specific node doesn't have a client for arbitrary Application ID or
when
> it has given AppID but expected different format of the address?

Section 2 states:

" The manner in which the information contained in GENINFO TLVs is
   exchanged between an instance of the IS-IS protocol and the
   application which generates/consumes the GENINFO is outside the scope
   of this specification."

Logically, if there is no consumer for information on a given router the
information is simply unused.

As far as format issues, that would represent a bug either in the
originator of the information or the consumer - which again is out of
scope for this draft (IS-IS is serving only as the transport and is not
directly responsible for the correctness of the information). But
generally information which appears erroneous in some way is best
ignored.

> 
> 2) Should address info really belong to GENINFO TLV itself and not to
> e.g. "Additional Application Specific Info"? Consider GENAPP is used
to
> carry info about multiple AFI (e.g. IPv4, IPv6, VPNv4) for given node.
> Wouldn't it be better to pack address along with AFI info either in
> sub-TLV or in App-Specific info section of the TLV? Such approach
could
> avoid confusion as to which AFI address belong to when same
application
> (AppID) is used with multiple AFI.

The inclusion of IPv4/IPv6 address information is optional - note the
use of the I/V bits to indicate whether these fields are present. It is
expected that the use of these fields would be a common practice.
Providing an encoding scheme in the generic portion of the TLV
eliminates the need for each application to define a subTLV for this
information and is therefore more efficient. However a given application
can choose NOT to include these fields.

> 
> 3) Section 3.3 restricts usage of GENAPP for experimental and
> propriatory usage. Does it have to be so?

YES!!

> Considering that GENAPP
> doesn't really care what's inside App-Specific info, then anyone could
> potentially put any sort of info to it (and take responsibility within
> his/her realm for doing so), is it really bad? For example, I may want
> to experiment with distribution of some network information using
GENAPP
> but I'm not yet sure whether it will benefit community at large or
only
> specific part of it, so this is sort of experiment. Doing so do I make
> implementation non-compliant?

The requirement is that users of GENAPP get IANA assignments for both
the Application ID and any application specific subTLVs they require.

If you want to play around with proprietary stuff please use TLV 250
(draft-ietf-isis-experimental-tlv-05.txt).

> 
> 4) To section 4.1: it may sometimes be desirable to do selective
> downwards leaking based on either AppID or even app-specific info
(e.g.
> I want some App's be leaked across whole Level1-level2-level1 path,
> while others only Level1-Level2 and no further). Would it make sense
to
> add a word that this is valid thing to do? This is mostly to prevent
> problems when one implementation provides such selective leaking
> facility, while the other one (found on the same network) assumes that
> is somebody leaked something then information was complete (and use it
> for any sort of integrity/sanity) checking.

I believe what is specified in Section 3.1 supports what you are
describing. Note that the S/D bits apply to a single TLV - which is
always associated with one - and only one - application.

> 
> 5) To section 5: while it's definetely desirable to use multiple
> instances, does it have to be restricted at the implementation level
or
> could choice be left to network operator (with defaulting to multiple
> instances if GENAPP extentions are enable)?

Note that Section 5 uses "SHOULD" - not "MUST".

> 
> 6) Should or should not GENAPP extention be turned off by default and
> enabled only by explicit knob (as follow-up on item (5) above)?

I am not clear on your question here.

As far as originating information, it seems clear that some
configuration would be required in order to enable an application on a
given router. This is, of course, out of scope of the draft.

As far as flooding is concerned, IS-IS protocol forbids the modification
of an LSP generated by one IS by another IS - so if GENAPP information
is inserted it will always be flooded w/o modification by other routers.

Inter-level leaking is another matter of course - but if a router
supports the draft and it receives an LSP which contains a GENINFO TLV
then it MUST follow the specified procedures regarding the S/D bits.

   Les


> 
> Kind regards,
> iLya
> _______________________________________________
> Isis-wg mailing list
> Isis-wg@ietf.org
> https://www.ietf.org/mailman/listinfo/isis-wg
_______________________________________________
Isis-wg mailing list
Isis-wg@ietf.org
https://www.ietf.org/mailman/listinfo/isis-wg