Re: [L2tpext] [Pppext] Technical Request about a correct protocol behavior (RFC2661)

Ignacio Goyret <ignacio.goyret@nokia.com> Sat, 20 February 2016 03:53 UTC

Return-Path: <ignacio.goyret@nokia.com>
X-Original-To: l2tpext@ietfa.amsl.com
Delivered-To: l2tpext@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7FA3E1B3632; Fri, 19 Feb 2016 19:53:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.328
X-Spam-Level:
X-Spam-Status: No, score=-6.328 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URG_BIZ=0.573] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cimRjiFy3sY0; Fri, 19 Feb 2016 19:53:48 -0800 (PST)
Received: from smtp-us.alcatel-lucent.com (us-hpatc-esg-01.alcatel-lucent.com [135.245.18.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6307C1B3542; Fri, 19 Feb 2016 19:53:48 -0800 (PST)
Received: from us70tumx1.dmz.alcatel-lucent.com (unknown [135.245.18.13]) by Websense Email Security Gateway with ESMTPS id B66C181ED0437; Sat, 20 Feb 2016 03:53:45 +0000 (GMT)
Received: from us70tusmtp1.zam.alcatel-lucent.com (us70tusmtp1.zam.alcatel-lucent.com [135.5.2.63]) by us70tumx1.dmz.alcatel-lucent.com (GMO) with ESMTP id u1K3r6GE006549 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Sat, 20 Feb 2016 03:53:46 GMT
Received: from cliff.eng.ascend.com (cliff.eng.ascend.com [192.207.23.55]) by us70tusmtp1.zam.alcatel-lucent.com (GMO) with ESMTP id u1K3r4Mm019901 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Sat, 20 Feb 2016 03:53:06 GMT
Received: from igoyret-c1.alcatel-lucent.com (vpn-4-46.vpn.alcatel-lucent.com [135.224.4.46]) by cliff.eng.ascend.com (8.13.1/8.13.1) with ESMTP id u1K3qsNr022878 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 19 Feb 2016 19:52:56 -0800
Message-Id: <201602200352.u1K3qsNr022878@cliff.eng.ascend.com>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Fri, 19 Feb 2016 19:52:48 -0800
To: Jewgenij.Bytschkow@t-systems.com
From: Ignacio Goyret <ignacio.goyret@nokia.com>
In-Reply-To: <56C63C13.4010204@workingcode.com>
References: <8DB67D970E0F5D4AB8FD7C6FEF9D2FA9064BD172FC1A@HE113670.emea1.cds.t-internal.com> <56C63C13.4010204@workingcode.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Archived-At: <http://mailarchive.ietf.org/arch/msg/l2tpext/IV4viJM93AEMPmbcZ_i4u49oy7M>
Cc: pppext@ietf.org, James Carlson <carlsonj@workingcode.com>, l2tpext@ietf.org
Subject: Re: [L2tpext] [Pppext] Technical Request about a correct protocol behavior (RFC2661)
X-BeenThere: l2tpext@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Layer Two Tunneling Protocol Extensions <l2tpext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2tpext>, <mailto:l2tpext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/l2tpext/>
List-Post: <mailto:l2tpext@ietf.org>
List-Help: <mailto:l2tpext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2tpext>, <mailto:l2tpext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 20 Feb 2016 04:22:08 -0000

I believe James reading is correct.

RFC2661 describes the reliable delivery in detail in section 5.8.

Unfortunately, 2661 and 3931 didn't make it crystal clear that
the reliable layer should operate as a logically independent layer [*]
from the rest of L2TP. Section 5.8 makes no mention of the special
case for M=0 on an unknown Message Type AVP because it doesn't apply
at the reliability layer.

With this in mind, it is easy to figure out the correct behavior,
as detailed by James.

For further questions, I suggest contacting the L2TPEXT WG mailing list.

-Ignacio

[*] It doesn't need to be 100% independent - it just needs to act
as if it were.


At 13:48 2/18/2016, James Carlson wrote:
>On 02/18/16 08:09, Jewgenij.Bytschkow@t-systems.com wrote:
>> Dear IETF colleagues,
>> 
>> we, at Deutsche Telekom Germany, have an urgent technical request
>> regarding behavior of LAC/LNS during L2TPv2 (RFC2661) protocol
>> communication. The question is not an errata report. We need only to
>> verify the MUST behavior of a LAC/LNS implementation on the basis
>> of the RFC2661.
>
>Although design of L2TP was started in the IETF PPPEXT working group,
>most of the original people involved have moved over to the L2TPEXT
>working group.  You may also wish to consult with them:
>
>https://datatracker.ietf.org/wg/l2tpext/charter/
>
>> It is needed to clarify a proper, standard-compliant behavior of
>> L2TP protocol implementations related to the following use case.
>> 
>> RFC 2661 (L2TPv2 standard):
>> 
>>       "The Mandatory (M) bit within the Message Type AVP has special
>>       meaning. Rather than an indication as to whether the AVP itself
>>       should be ignored if not recognized, it is an indication as to
>>       whether the control message itself should be ignored.
>>       If the M-bit is not set, then the implementation may ignore an unknown
>>       message type."  
>> 
>> According to the RFC2661 statement quoted above, an unknown non-mandatory (M=0)
>> control message received from the peer may be ignored. While ignoring that
>> unknown control message in our use case, the implementation does not send
>> ZLB-Ack also after several retransmissions of that control message by the peer.
>
>Although I agree that the text of the document is somewhat ambiguous, I
>don't believe that common sense supports reading it that way.
>
>L2TP is designed to operate on unreliable media, so simply omitting ZLB
>ACK sounds quite wrong to me.  There would be no way to recover from
>such an omission.
>
>My understanding is that when the Message Type AVP has M=0 and the type
>is unknown to the receiver, the receiver is expected to skip
>*processing* of that message -- including all of the AVPs contained in
>the message, and sending no new message in reply -- but then resume
>normal handling of the message stream, including any acknowledgement
>requirements.
>
>In other words, a sequence with multiple ignored (non-mandatory)
>messages might look like this:
>
>Peer A                Peer B
>SCCRQ ->
>Nr: 0, Ns: 0
>                   <- UNKNOWN1
>                      Nr: 1, Ns: 0
>ZLB ->
>Nr: 1, Ns: 1
>                   <- SCCRP
>                      Nr: 1, Ns: 1
>UNKNOWN2 ->
>Nr: 2, Ns: 1
>SCCN ->
>Nr: 2, Ns: 2
>                   <- ZLB
>                      Nr: 3, Ns: 2
>
>> Questions:
>> ---------
>> - If the implementation receives and ignores (without ZLB Acknowledgement) an
>>   unknown non-mandatory (M=0) control message, what should happen with the Nr
>>   counters in the implementation according to the RFC2661?
>
>This should not happen.  I argue that failing to send a proper ZLB when
>the transmission queue is empty is an error, and a system that does this
>is faulty.
>
>> - Should the local Nr counter be incremented in the implementation or not?
>
>Nr reflects the number of in-order messages received, regardless of
>whether or not those messages were understood.  So, yes.
>
>> - Should the peer's (sender's) Ns counter be incremented after several
>>   unacknowledged retransmissions of that control message or not?
>
>No, the Ns number is not incremented for retransmissions.  See B.2 in
>the spec.
>
>The sender should, in my estimation, retry multiple times and then
>terminate the connection.  Once the sender has determined that the
>recipient is broken, there's no need to send it any more packets.
>
>-- 
>James Carlson         42.703N 71.076W         <carlsonj@workingcode.com>
>
>_______________________________________________
>Pppext mailing list
>Pppext@ietf.org
>https://www.ietf.org/mailman/listinfo/pppext