Re: [L2tpext] Propagating IP/ECN field when L2TP sits between IP as both L2 payload and PSN

Ignacio Goyret <ignacio.goyret@nokia.com> Wed, 31 May 2017 01:52 UTC

Return-Path: <ignacio.goyret@nokia.com>
X-Original-To: l2tpext@ietfa.amsl.com
Delivered-To: l2tpext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 426F6129B2E for <l2tpext@ietfa.amsl.com>; Tue, 30 May 2017 18:52:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.922
X-Spam-Level:
X-Spam-Status: No, score=-1.922 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hcNbisYF31RF for <l2tpext@ietfa.amsl.com>; Tue, 30 May 2017 18:52:11 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10131.outbound.protection.outlook.com [40.107.1.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4D68129B29 for <l2tpext@ietf.org>; Tue, 30 May 2017 18:52:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=gX0soOqJ5H2I2l4UzeBmsbuU3nu/UwD859e0YeA0ZWw=; b=OgIpF+Faw1ltWafkqSylM5QNZGUg1dXZOHruE4XtCipWnBilWINBven2xDA13YiNgXGlFDcgKW6Nh0xgmgBD3QU6CNFPLwuhzJNE02MEaQZNfA4ZErMYmIIc9oB9kUNypeEsVW3V8rqM4YWDaHXFm6/Za2K7EVhuZzw9uFvsIEE=
Received: from DB6PR07CA0096.eurprd07.prod.outlook.com (2603:10a6:6:2b::34) by DB4PR07MB0592.eurprd07.prod.outlook.com (2a01:111:e400:9845::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1143.6; Wed, 31 May 2017 01:52:08 +0000
Received: from VE1EUR03FT031.eop-EUR03.prod.protection.outlook.com (2a01:111:f400:7e09::207) by DB6PR07CA0096.outlook.office365.com (2603:10a6:6:2b::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1143.6 via Frontend Transport; Wed, 31 May 2017 01:52:08 +0000
Authentication-Results: spf=pass (sender IP is 135.245.43.121) smtp.mailfrom=nokia.com; emc.com; dkim=none (message not signed) header.d=none;emc.com; dmarc=pass action=none header.from=nokia.com;
Received-SPF: Pass (protection.outlook.com: domain of nokia.com designates 135.245.43.121 as permitted sender) receiver=protection.outlook.com; client-ip=135.245.43.121; helo=us70uusmtp4-o.zam.alcatel-lucent.com;
Received: from us70uusmtp4-o.zam.alcatel-lucent.com (135.245.43.121) by VE1EUR03FT031.mail.protection.outlook.com (10.152.18.69) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1101.12 via Frontend Transport; Wed, 31 May 2017 01:52:07 +0000
Received: from us70uusmtp4.zam.alcatel-lucent.com (us70uusmtp4-o.zam.alcatel-lucent.com [135.5.2.90]) by us70uusmtp4-o.zam.alcatel-lucent.com (GMO-o) with ESMTP id v4V1q5KC000991 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Wed, 31 May 2017 01:52:05 GMT
Received: from cliff.eng.ascend.com (cliff.eng.ascend.com [192.207.23.55]) by us70uusmtp4.zam.alcatel-lucent.com (GMO) with ESMTP id v4V1q44b000976 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Wed, 31 May 2017 01:52:04 GMT
Received: from igoyret-c1.nokia.com (igoyret-pc [135.227.139.12]) by cliff.eng.ascend.com (8.13.1/8.13.1) with ESMTP id v4V1sYQH013223 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 30 May 2017 18:54:34 -0700
Message-ID: <201705310154.v4V1sYQH013223@cliff.eng.ascend.com>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Tue, 30 May 2017 18:51:46 -0700
To: Bob Briscoe <ietf@bobbriscoe.net>
From: Ignacio Goyret <ignacio.goyret@nokia.com>
CC: l2tp IETF list <l2tpext@ietf.org>, "Black, David" <david.black@emc.com>
In-Reply-To: <e4c97c52-36c9-3091-b005-06ef82ec58e3@bobbriscoe.net>
References: <149618019740.19809.6421141487388928973.idtracker@ietfa.amsl.com> <435f45b8-9659-b06f-9adc-415f355ba743@bobbriscoe.net> <e4c97c52-36c9-3091-b005-06ef82ec58e3@bobbriscoe.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
X-EOPAttributedMessage: 0
X-MS-Office365-Filtering-HT: Tenant
X-Forefront-Antispam-Report: CIP:135.245.43.121; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(6009001)(39840400002)(39400400002)(39410400002)(39850400002)(39450400003)(39860400002)(2980300002)(438002)(24454002)(199003)(189002)(9170700003)(6916009)(2950100002)(46406003)(8936002)(8676002)(50226002)(81166006)(478600001)(229853002)(6666003)(97756001)(4720700003)(8666007)(50466002)(189998001)(76176999)(356003)(50986999)(305945005)(8276002)(2906002)(54906002)(6246003)(110136004)(38730400002)(4326008)(47776003)(106466001)(53416004)(53936002)(23726003)(1076002)(6306002)(5660300001)(86362001)(9686003); DIR:OUT; SFP:1102; SCL:1; SRVR:DB4PR07MB0592; H:us70uusmtp4-o.zam.alcatel-lucent.com; FPR:; SPF:Pass; MLV:sfv; A:1; MX:1; LANG:en;
X-Microsoft-Exchange-Diagnostics: 1; VE1EUR03FT031; 1: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
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: DB4PR07MB0592:
X-MS-Office365-Filtering-Correlation-Id: 0fdd0d69-632e-4e1d-6a90-08d4a7c7a536
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(8251501002)(2017030254075)(201703131423075)(201703031133081); SRVR:DB4PR07MB0592;
X-Microsoft-Exchange-Diagnostics: 1; DB4PR07MB0592; 3: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
X-Microsoft-Exchange-Diagnostics: 1; DB4PR07MB0592; 25:RyVkXTq5T94akPn9RZfxfayhi5xWPT9+EGUGqY9xmyf+XBXe90OmpJ100VvAGhNNvQKjHP1uyNod391qV/c2gd+/yGKsJUTgVwMrDO0lHsGHTRUghIW5Qtu8BmjWSw1cll+ThnFC3JIGDEByEjuec3aUyE+hAz4ME6xWt1XBRvEs+LOo3dzcpcqCm+6B3t3Y9bwjKFfyLO1ryvp3Zer0eX/iuWtRwHbSuBwEIk3g0OX5wkz58BmGzc8fAAOZrG/WpoADokJpisTIX2XhFK7KiU6YnGi0tGKy50YENWwdHiFyBmvnnFyDR27rgl3NeIwCo/Z+EGXi7gNS85eiT4sX5iAh7U6r+5unLgMJBhYb/hpl8spur27BF6eU3//J2ueFxj9IYi2ZTLi39ConcY/x1fwnTwBKyOwiA2pXegPNN/Rqa9NZDsd8XlyzWeQcFKT8gkYS7IfAocTEqq8f7HssvIcZOFhCHab3UVqQ7+lTVU4=; 31:SDcErljksYSFyLZNXc4qoatyhhFtRb8fBjS0fObpkBNVQZcgqlb0KhlNAIXgn4sVOTG6e5HqCy9W4tlOAyqTMnxOTi+cecqFNES8w5aJ3NQphPvh47qLmXDoxLQ49i1COqfw20XOomDIS7xr1rjUJVrs0zpoZegjImOTBTfFAD9mPVWDxpu6tuvAg7mA/JDrvmk8ufeqHGNOv1uMolnpE9fx1tZaFnn8b4J1vmrOwF4oj0gb1/lnHvClzjyaCRPVrv4HOSQltkph8p2RVg7G4w==
X-Microsoft-Exchange-Diagnostics: 1; DB4PR07MB0592; 20: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
X-Microsoft-Antispam-PRVS: <DB4PR07MB05923446C1C73E1B75490C3D8FF10@DB4PR07MB0592.eurprd07.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:;
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(13016025)(5005006)(8121501046)(13018025)(10201501046)(3002001)(93006095)(93004095)(6055026)(6041248)(20161123555025)(20161123564025)(20161123562025)(20161123560025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148); SRVR:DB4PR07MB0592; BCL:0; PCL:0; RULEID:; SRVR:DB4PR07MB0592;
X-Microsoft-Exchange-Diagnostics: 1; DB4PR07MB0592; 4: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
X-Forefront-PRVS: 0324C2C0E2
X-Microsoft-Exchange-Diagnostics: 1; DB4PR07MB0592; 23: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
X-Microsoft-Exchange-Diagnostics: 1; DB4PR07MB0592; 6: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; 5:SilK8uwRl7bigvIUjdOeMzqMqzqW5ZnSuvWUwAWtlSsOYPRhi8q/4m7obThyVnIaI/3mNSbFYX3n08zodYeQbPxSEhPls7VoRILh/E5zreRJWDN9htBkRL+SPy74I3Qaj8XsrFnRzIsyI1Ymcg/q3sG7QVuMhEGnVcz62y1tm/4=; 24:fs51V742jAmSYCBzbNhYY46C8INvIiVOaKUR9VXef0SXX3MwT8tsilxU2idR8YFWWPnIBU5pY1IBOHcKZlH7s1uGvyTfu+UqaD1RUSgrDQw=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; DB4PR07MB0592; 7:jBRdUeoq2Hygx/xf1yf6N6/uVCzoL2xesbJ8Ih7ygQzMzA6Gl9dHaqza9Pw+JKq8j8efk96EcxOcEpOgCLGDDs1JPbQzOsUNeFeRcDoIfphgoq174F9pdqWmudkeTwWUpYKjIwvNu8oXpSzSN8twUygROBOv167eWlrDl8v4J0/cn7hTVbDE4jFGMj2EbdEvayeP9WDhKaWJTiKQkeWSCWisyzXUjdr08BgmdMM8Cng7j7OjkTDUAjoY1rGjETUUNlXCYQk52OvrxQof360u5gBrBTUzhBC14v4Yuhu8goDC8VVKcASs3EQellASvM3O60iVUAn8r7X3OFmCr6YBVg==
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 May 2017 01:52:07.3063 (UTC)
X-MS-Exchange-CrossTenant-Id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5d471751-9675-428d-917b-70f44f9630b0; Ip=[135.245.43.121]; Helo=[us70uusmtp4-o.zam.alcatel-lucent.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB4PR07MB0592
Archived-At: <https://mailarchive.ietf.org/arch/msg/l2tpext/lL38hjSfwPNPOl4LTmzDimjOqsM>
Subject: Re: [L2tpext] Propagating IP/ECN field when L2TP sits between IP as both L2 payload and PSN
X-BeenThere: l2tpext@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Layer Two Tunneling Protocol Extensions <l2tpext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2tpext>, <mailto:l2tpext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/l2tpext/>
List-Post: <mailto:l2tpext@ietf.org>
List-Help: <mailto:l2tpext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2tpext>, <mailto:l2tpext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 May 2017 01:52:13 -0000

I am a little confused by the double negative in "non-optional".
Do you mean "mandatory"? If so, why not just say that?

The lack of a capabilities AVP that you were looking for is mainly
because it hasn't been needed so far. You are welcome to submit a
draft with something like that. Generally speaking, adding a simple
binary AVP is easy and simpler to handle.

I have no problem with the new suggested AVP, but can you explain
why is it important to know if the remote supports or not this
extension? Can't a tunnel end deduce this information by observing
the IP header received?

Regarding the extension vs update question: if it is an update,
then why negotiate support? Wouldn't ECN propagation be mandated
by this update?

There is no section for L2TPv2 (RFC2661) or any further suggestion
on how to handle it. I'm not saying that it is necessary, but since
it is mentioned earlier in the document, you may want to add a few
words. Note that things are a bit more complicated in v2 because
it transports PPP packets, which may include IP packets (or portions
of PPP packets if using Multilink). I have no issue punting on L2TPv2
details.

-Ignacio


At 15:49 5/30/2017, Bob Briscoe wrote:

>Hi l2tpext list, 
>[repeating previous post, but with self-explanatory subject line]
>
>This is a plea for help on a short subsection of a short draft that updates L2TP (amongst other tunnel protocols).
>
>In the Transport Area WG (tsvwg) we have been working on defining propagation of the ECN field between IP headers separated by shim header(s):
>    draft-ietf-tsvwg-rfc6040update-shim
>
>L2TP is one such protocol (when the payload of the L2 protocol is IP, and the outer PSN is IP). This is particularly relevant at the moment, because of the low latency (L4S) work based on ECN and because deployment of ECN has finally taken off {Note 1}.
>
>I presented this tunnelling work in intarea just under a year ago. Since then tsvwg has adopted the draft and asked that we include specific update text for each affected tunnel protocol. I just posted my first attempt at L2TP update text:
>    <https://tools.ietf.org/html/draft-ietf-tsvwg-rfc6040update-shim-01>draft-ietf-tsvwg-rfc6040update-shim-01
>
>Specific questions:
>
>Prize for the best answer to all 3 questions: you get to become a co-author (if you want :)
>
>Q1. L2TP is meant for all sorts of outers and inners, so it is not clear where to define behaviour for the special (but very common) case of IP as the L2 payload and IP and as the PSN. That is:
>     IP    :    [UDP]    :    L2TP    :    L2-specific-sublayer    :    L2    :    IP
>
>I decided on updating <Specific%20questions:>S.4.5 of RFC3931, but suggestions for a better place are welcome.
>
>Q2. L2TP is usually extended not updated. However, in this case, compliance with RFC6040 is non-optional, so I think update rather than extension is appropriate. Reason: Although RFC6040 is non-optional it includes a compatibility mode that defines what has to happen when a tunnel endpoint doesn't support ECN propagation. 
>
>Pls read the (short) draft and, if you disagree, suggest how an extension can be non-optional.
>
>Q3. The tunnel initiator needs to check that the other end supports ECN propagation. I have proposed an Attribute Value Pair (AVP) for this that is effectively just a boolean choice from each end (Yes or silence). I expected to find an AVP with per-control-connection flags for tunnel endpoint capabilities that I could just extend with one more flag, but there doesn't seem to be such a thing already in L2TP. Did I miss it?
>
>
>Cheers
>
>
>Bob
>
>{Note 1}: ~70% of Web servers, ~50% of Apple client devices on fixed or WiFi access, and now increasing router deployment of ECN is appearing.