Re: [Isis-wg] draft-ietf-isis-genapp
"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Wed, 17 September 2008 06:46 UTC
Return-Path: <isis-wg-bounces@ietf.org>
X-Original-To: isis-archive@megatron.ietf.org
Delivered-To: ietfarch-isis-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1])
by core3.amsl.com (Postfix) with ESMTP id 78E3F28C264;
Tue, 16 Sep 2008 23:46:59 -0700 (PDT)
X-Original-To: isis-wg@core3.amsl.com
Delivered-To: isis-wg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1])
by core3.amsl.com (Postfix) with ESMTP id A596B28C264
for <isis-wg@core3.amsl.com>; Tue, 16 Sep 2008 23:46:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Level:
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5
tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32])
by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id oQo8qeMb5i-T for <isis-wg@core3.amsl.com>;
Tue, 16 Sep 2008 23:46:52 -0700 (PDT)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117])
by core3.amsl.com (Postfix) with ESMTP id A629428C0FC
for <isis-wg@ietf.org>; Tue, 16 Sep 2008 23:46:52 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.32,413,1217808000"; d="scan'208";a="156947110"
Received: from sj-dkim-5.cisco.com ([171.68.10.79])
by sj-iport-6.cisco.com with ESMTP; 17 Sep 2008 06:47:05 +0000
Received: from sj-core-4.cisco.com (sj-core-4.cisco.com [171.68.223.138])
by sj-dkim-5.cisco.com (8.12.11/8.12.11) with ESMTP id m8H6l5bw017318;
Tue, 16 Sep 2008 23:47:05 -0700
Received: from xbh-sjc-231.amer.cisco.com (xbh-sjc-231.cisco.com
[128.107.191.100])
by sj-core-4.cisco.com (8.13.8/8.13.8) with ESMTP id m8H6l5u1029786;
Wed, 17 Sep 2008 06:47:05 GMT
Received: from xmb-sjc-222.amer.cisco.com ([128.107.191.106]) by
xbh-sjc-231.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830);
Tue, 16 Sep 2008 23:47:05 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Tue, 16 Sep 2008 23:46:39 -0700
Message-ID: <AE36820147909644AD2A7CA014B1FB5206655498@xmb-sjc-222.amer.cisco.com>
In-Reply-To: <7000E71D8C525042A815432358B2F1240138D679@paul.adoffice.local.de.easynet.net>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Isis-wg] draft-ietf-isis-genapp
Thread-Index: AckMTLNnAlJoySDjSVmfT0NksyZpeQMQATfA
References: <7000E71D8C525042A815432358B2F1240138D679@paul.adoffice.local.de.easynet.net>
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: "Ilya Varlashkin" <Ilya.Varlashkin@de.easynet.net>,
"IETF IS-IS" <isis-wg@ietf.org>
X-OriginalArrivalTime: 17 Sep 2008 06:47:05.0243 (UTC)
FILETIME=[32720EB0:01C91891]
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; l=5465; t=1221634025;
x=1222498025; c=relaxed/simple; s=sjdkim5002;
h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version;
d=cisco.com; i=ginsberg@cisco.com;
z=From:=20=22Les=20Ginsberg=20(ginsberg)=22=20<ginsberg@cisc
o.com> |Subject:=20RE=3A=20[Isis-wg]=20draft-ietf-isis-genapp
|Sender:=20; bh=12Am9w/JetAx1xO3zz2kSdrUeG9HhYCMiw448jltNL8=;
b=Gmx8QqDgOa2zpNsv/HshXN6Zf1Ba3nd14Ar/vQ04T4vCjjdb3jGhDzMwbi
/k3jt7a8PhEwYDO+cUAQ1LgkViUNHa7u1sHXi8YBC6HiU15riE77ivZOMd/5
tOzBKxGGsZ;
Authentication-Results: sj-dkim-5; header.From=ginsberg@cisco.com; dkim=pass (
sig from cisco.com/sjdkim5002 verified; );
Subject: Re: [Isis-wg] draft-ietf-isis-genapp
X-BeenThere: isis-wg@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF IS-IS working group <isis-wg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>,
<mailto:isis-wg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/isis-wg>
List-Post: <mailto:isis-wg@ietf.org>
List-Help: <mailto:isis-wg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>,
<mailto:isis-wg-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: isis-wg-bounces@ietf.org
Errors-To: isis-wg-bounces@ietf.org
Ilya - I have been away - but I do not see that any response to your questions has been sent in the interim - so hopefully this belated reply is still useful. Inline. > -----Original Message----- > From: isis-wg-bounces@ietf.org [mailto:isis-wg-bounces@ietf.org] On Behalf > Of Ilya Varlashkin > Sent: Monday, September 01, 2008 9:07 AM > To: IETF IS-IS > Subject: [Isis-wg] draft-ietf-isis-genapp > > Hi All, > > I've went once more through the draft and have few questions. > > 1) What correct implementation should do if it received GENINFO TLV when > specific node doesn't have a client for arbitrary Application ID or when > it has given AppID but expected different format of the address? Section 2 states: " The manner in which the information contained in GENINFO TLVs is exchanged between an instance of the IS-IS protocol and the application which generates/consumes the GENINFO is outside the scope of this specification." Logically, if there is no consumer for information on a given router the information is simply unused. As far as format issues, that would represent a bug either in the originator of the information or the consumer - which again is out of scope for this draft (IS-IS is serving only as the transport and is not directly responsible for the correctness of the information). But generally information which appears erroneous in some way is best ignored. > > 2) Should address info really belong to GENINFO TLV itself and not to > e.g. "Additional Application Specific Info"? Consider GENAPP is used to > carry info about multiple AFI (e.g. IPv4, IPv6, VPNv4) for given node. > Wouldn't it be better to pack address along with AFI info either in > sub-TLV or in App-Specific info section of the TLV? Such approach could > avoid confusion as to which AFI address belong to when same application > (AppID) is used with multiple AFI. The inclusion of IPv4/IPv6 address information is optional - note the use of the I/V bits to indicate whether these fields are present. It is expected that the use of these fields would be a common practice. Providing an encoding scheme in the generic portion of the TLV eliminates the need for each application to define a subTLV for this information and is therefore more efficient. However a given application can choose NOT to include these fields. > > 3) Section 3.3 restricts usage of GENAPP for experimental and > propriatory usage. Does it have to be so? YES!! > Considering that GENAPP > doesn't really care what's inside App-Specific info, then anyone could > potentially put any sort of info to it (and take responsibility within > his/her realm for doing so), is it really bad? For example, I may want > to experiment with distribution of some network information using GENAPP > but I'm not yet sure whether it will benefit community at large or only > specific part of it, so this is sort of experiment. Doing so do I make > implementation non-compliant? The requirement is that users of GENAPP get IANA assignments for both the Application ID and any application specific subTLVs they require. If you want to play around with proprietary stuff please use TLV 250 (draft-ietf-isis-experimental-tlv-05.txt). > > 4) To section 4.1: it may sometimes be desirable to do selective > downwards leaking based on either AppID or even app-specific info (e.g. > I want some App's be leaked across whole Level1-level2-level1 path, > while others only Level1-Level2 and no further). Would it make sense to > add a word that this is valid thing to do? This is mostly to prevent > problems when one implementation provides such selective leaking > facility, while the other one (found on the same network) assumes that > is somebody leaked something then information was complete (and use it > for any sort of integrity/sanity) checking. I believe what is specified in Section 3.1 supports what you are describing. Note that the S/D bits apply to a single TLV - which is always associated with one - and only one - application. > > 5) To section 5: while it's definetely desirable to use multiple > instances, does it have to be restricted at the implementation level or > could choice be left to network operator (with defaulting to multiple > instances if GENAPP extentions are enable)? Note that Section 5 uses "SHOULD" - not "MUST". > > 6) Should or should not GENAPP extention be turned off by default and > enabled only by explicit knob (as follow-up on item (5) above)? I am not clear on your question here. As far as originating information, it seems clear that some configuration would be required in order to enable an application on a given router. This is, of course, out of scope of the draft. As far as flooding is concerned, IS-IS protocol forbids the modification of an LSP generated by one IS by another IS - so if GENAPP information is inserted it will always be flooded w/o modification by other routers. Inter-level leaking is another matter of course - but if a router supports the draft and it receives an LSP which contains a GENINFO TLV then it MUST follow the specified procedures regarding the S/D bits. Les > > Kind regards, > iLya > _______________________________________________ > Isis-wg mailing list > Isis-wg@ietf.org > https://www.ietf.org/mailman/listinfo/isis-wg _______________________________________________ Isis-wg mailing list Isis-wg@ietf.org https://www.ietf.org/mailman/listinfo/isis-wg
- [Isis-wg] draft-ietf-isis-genapp Ilya Varlashkin
- Re: [Isis-wg] draft-ietf-isis-genapp Les Ginsberg (ginsberg)