Re: [lisp] Confirm/Deny changes on draft 6830bis
Albert Cabellos <albert.cabellos@gmail.com> Mon, 29 January 2018 01:57 UTC
Return-Path: <albert.cabellos@gmail.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BF9C1314DD for <lisp@ietfa.amsl.com>; Sun, 28 Jan 2018 17:57:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dfj3OIcgLbfK for <lisp@ietfa.amsl.com>; Sun, 28 Jan 2018 17:57:03 -0800 (PST)
Received: from mail-yb0-x22f.google.com (mail-yb0-x22f.google.com [IPv6:2607:f8b0:4002:c09::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 23D921314B7 for <lisp@ietf.org>; Sun, 28 Jan 2018 17:57:03 -0800 (PST)
Received: by mail-yb0-x22f.google.com with SMTP id 65so2205929ybz.6 for <lisp@ietf.org>; Sun, 28 Jan 2018 17:57:03 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=tfb/AIBdxUPKWztRNUQGzZKRgd4lYIH7hKBcv/2u7hs=; b=NBNXlE1bHlrZ7XVmZ4gQFIzkdTIeBmVFsHjDV3bnxKQCU8rFBhXzeL+CXHA/kWquNS 6tDVHl5rzy1SvIawvQFhk6qsSXy8laBe0UvjkRHe+zl336uVqXVZB/2uAwiJP0+f1tLh /5VDRXCyrM8mIQn9lHGuf3wGfSRKKOPIQ614Ow55saCD/sxbRs1mrPr5xBYK11IUMIaF ZqznyXDYj9CcBDU0O2r0XwWo82/BcaDE0giwalPMIna+WIuv2dxrpIvL1ara4Csl2aQT I5bCa1XnIq5StkYIStVFvO9K1cTzEH0sqw0Y1XqzgiiLrgIG2LPhQf2VoEpHojZrazE/ SODg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=tfb/AIBdxUPKWztRNUQGzZKRgd4lYIH7hKBcv/2u7hs=; b=Guc8DJ4TYwvluryDJyQ+RRESiu2KhPijY7VQtfdgREh088yQHjGeMEnRgNdj9JF0DO gbi/f2o78bI12KIFxqmamXjYj1qXA9R2v1AB1L+04kfUj8tiuyDO+wps/jTaoA84LyZx K92JvHQM3h4TTcjr1i6BM82DjWHWjpn4+s3AXhRdqpsPgFg/iL3YoEqnPmdvZlh+FIzp AdfvmUBdvtCZkPAXCXeddHuQzCOV8QtF6IeMdx9wpNhe7pcVc99UVprybqWVdH1cVQtG IhKJLvkJTq0YX75zqZrUejXma8A7lfrvZ2WIl3nTUC6yt7mwqk9YNzYK8AMLGhCcEufl XjnA==
X-Gm-Message-State: AKwxytftGUAZ9zYIGI8M6gSPlJYs5gbBR9E2FzL/n4IuiwGos9Zq6jyP LYjiglKYsWg+SO0V20HTc3Q4Y8rOf5aBShmNcUk=
X-Google-Smtp-Source: AH8x225ME9K1i05FvfS4gloA8PK0uVr5SLT/5lCIknBDnuF9qmSoAKP4A0QYH+D6CLHci+5jYU4/TVeTds6HRetJqMY=
X-Received: by 10.37.104.72 with SMTP id d69mr8176809ybc.281.1517191022186; Sun, 28 Jan 2018 17:57:02 -0800 (PST)
MIME-Version: 1.0
Received: by 10.37.16.69 with HTTP; Sun, 28 Jan 2018 17:57:01 -0800 (PST)
In-Reply-To: <2893FDD0-35A6-4D41-90B6-3E794BEFE421@gmail.com>
References: <CAGE_Qex--1pS5ivDmSZXVXLsFRgO+a9F32YmJL_dO7h4+4QMCA@mail.gmail.com> <EE6A9B4D-5852-40B6-A780-2FF6B574C62B@gmail.com> <E1C72747-5AB4-455A-A478-21771CE29A92@gigix.net> <545E1F14-2386-47CF-9337-E1FF1354CD03@gmail.com> <CAG-CQxp9kBOiOLvS4Wy93ezF5t4GQfqaurCj+aw+f=7Wjvc_uw@mail.gmail.com> <2893FDD0-35A6-4D41-90B6-3E794BEFE421@gmail.com>
From: Albert Cabellos <albert.cabellos@gmail.com>
Date: Mon, 29 Jan 2018 02:57:01 +0100
Message-ID: <CAGE_QexRF4fKwLRsP5n6HQiQgM=HqFauuYn_=eT_mB8E42p2ow@mail.gmail.com>
To: Dino Farinacci <farinacci@gmail.com>
Cc: Padma Pillay-Esnault <padma.ietf@gmail.com>, Albert Cabellos <acabello@ac.upc.edu>, Luigi Iannone <ggx@gigix.net>, "lisp@ietf.org list" <lisp@ietf.org>, lisp-chairs@tools.ietf.org
Content-Type: multipart/alternative; boundary="f403045c059aef17df0563e08f6b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/F-iUJbmbXKe4PLD2A8VpqwrVudY>
Subject: Re: [lisp] Confirm/Deny changes on draft 6830bis
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jan 2018 01:57:06 -0000
Hi all Thanks for all the comments, from my understanding of this thread the following list of items *seem* to have rough consensus (all except B - change definitions for EID and RLOC). Joel, Luigi->How should we proceed now? Albert --- A.- Remove definitions of PA and PI C.- In section 5.3, change the description of the encap/decap operation concerning how to deal with ECN and DSCP bits to (new text needs to be validated by experts): When doing ITR/PITR encapsulation: o The outer-header 'Time to Live' field (or 'Hop Limit' field, in the case of IPv6) SHOULD be copied from the inner-header 'Time to Live' field. o The outer-header 'Differentiated Services Code Point' (DSCP) field (or the 'Traffic Class' field, in the case of IPv6) SHOULD be copied from the inner-header DSCP field ('Traffic Class' field, in the case of IPv6) considering the exception listed below. o The 'Explicit Congestion Notification' (ECN) field (bits 6 and 7 of the IPv6 'Traffic Class' field) requires special treatment in order to avoid discarding indications of congestion [RFC3168]. ITR encapsulation MUST copy the 2-bit 'ECN' field from the inner header to the outer header. Re-encapsulation MUST copy the 2-bit 'ECN' field from the stripped outer header to the new outer header. When doing ETR/PETR decapsulation: o The inner-header 'Time to Live' field (or 'Hop Limit' field, in the case of IPv6) SHOULD be copied from the outer-header 'Time to Live' field, when the Time to Live value of the outer header is less than the Time to Live value of the inner header. Failing to perform this check can cause the Time to Live of the inner header to increment across encapsulation/decapsulation cycles. This check is also performed when doing initial encapsulation, when a packet comes to an ITR or PITR destined for a LISP site. o The inner-header 'Differentiated Services Code Point' (DSCP) field (or the 'Traffic Class' field, in the case of IPv6) SHOULD be copied from the outer-header DSCP field ('Traffic Class' field, in the case of IPv6) considering the exception listed below. o The 'Explicit Congestion Notification' (ECN) field (bits 6 and 7 of the IPv6 'Traffic Class' field) requires special treatment in order to avoid discarding indications of congestion [RFC3168]. If the 'ECN' field contains a congestion indication codepoint (the value is '11', the Congestion Experienced (CE) codepoint), then ETR decapsulation MUST copy the 2-bit 'ECN' field from the stripped outer header to the surviving inner header that is used to forward the packet beyond the ETR. These requirements preserve CE indications when a packet that uses ECN traverses a LISP tunnel and becomes marked with a CE indication due to congestion between the tunnel endpoints. Note that if an ETR/PETR is also an ITR/PITR and chooses to re-encapsulate after decapsulating, the net effect of this is that the new outer header will carry the same Time to Live as the old outer header minus 1. Copying the Time to Live (TTL) serves two purposes: first, it preserves the distance the host intended the packet to travel; second, and more importantly, it provides for suppression of looping packets in the event there is a loop of concatenated tunnels due to misconfiguration. See Section 18.3 for TTL exception handling for traceroute packets. D.- Simplify section ‘Router Locator Selection’ stating that the data-plane MUST follow what´s stored in the map-cache (priorities and weights), the remaining text should go to an OAM document. E.- Rewrite Section “Routing Locator Reachability” considering the following changes: * Keep bullet point 1 (examine LSB), 6 (receiving a data-packet) and Echo-Nonce * Move to 6833bis bullet point 2 (ICMP Network/Host Unreachable),3 (hints from BGP),4 (ICMP Port Unreachable),5 (receive a Map-Reply as a response) and RLOC probing F.- Move Solicit-Map-Request to 6833bis G.- Move sections 16 (Mobility Considerations), 17 (xTR Placement Considerations), 18 (Traceroute Consideration) to a new OAM document On Fri, Jan 26, 2018 at 8:20 PM, Dino Farinacci <farinacci@gmail.com> wrote: > Thanks for the detail review Padma. A new update to -09 is enclosed with a > diff file. I will wait until next week to post. > > I have reflected all of your comments and most of Luigi’s comments. The > only issues open are: > > (1) Section movement from RFC6830 to RFC6833. > > (2) If an OAM document is needed. > > Waiting for more working group concensus on this. > > > Dear Dino and Albert > > > > The doc reads well. > > Please find thereafter some comments on the version- 09 you posted on > the list > > > > Page 4 > > "Client-side: Client-side is a term used in this document to indicate a > connection initiation attempt by an EID." > > PPE 1: Strictly speaking the EID is just an identifier and does not > initiate anything. Suggest something like this. > > > > "Client-side: Client-side is a term used in this document to indicate a > connection initiation attempt by the end system (represented by an EID)” > > Fixed. Put in your suggestion. > > > Page 6 > > The source EID is obtained via existing mechanisms used to set a host's > "local" IP address. An EID used on the public Internet must have the same > properties as any other IP address used in that manner; this means, among > other things, that it must be globally unique. > > > > PPE 2: Shouldn't these two be MUST rather than must? Suggestion below > > > > The source EID is obtained via existing mechanisms used to set a host's > "local" IP address. An EID used on the public Internet MUST have the same > properties as any other IP address used in that manner; this means, among > other things, that it MUST be globally unique. > > Changed. > > > Page 8 > > An EID maps to one or more RLOCs. > > PPE 3: Seems to contradict earlier explanation on negative mapping entry > where it is possible that an EID has NO RLOC. > > I changed to “zero or more RLOCs.”. > > > Page 8 > > When using multiple mapping database systems, care must be taken to not > create re-encapsulation loops through misconfiguration. > > > > PPE 4: Suggest to add "re-encapsulation" in the list in Security > Considerations section as this is an exploit possibility. > > I have removed the sentence. Because it actually is not true. If you use > different mapping systems and circuitious forwarding occurs. The packet > travels only until its TTL reaches 0. Using the rules for copy inner to > outer and outer to inner during RTR re-encapsulation applies. > > > Page 13 > > "gleaned" mapping > > > > PPE 5: Suggest adding “glean mapping” in the definition section. > > Changed. > > > Page 17 > > "The KK-bits are a 2-bit field used when encapsualted packets are > encrypted." > > > > PPE 6: Nit - Typo "encapsualted" -> “encapsulated" > > Fixed. > > > > > Page 20 > > "When the lookup succeeds, the locator-set retrieved from the map-cache > is used to send the packet to the EID's topological location." > > > > PPE 7: Nit - Suggest capitalize L and S of "locator-set" for consistency > with rest of document. > > Thanks. Done. > > > > > Page 23 > > "The server-side sets a Weight of 0..." > > PPE 8: Nit - For consistency in text change to "Weight of zero”. > > Changed. > > > Page 23 > > "Control is shared by the server- side determining the list and the > client determining load distribution." > > > > PPE 9: Suggest use of "Client-side" > > > > "Control is shared by the server- side determining the list and the > client-side determining load distribution.” > > Done. > > > Page 24 > > When a verified Map-Cache entry is stored, data gleaning no longer > occurs for subsequent packets that have a source EID that matches > > the EID-Prefix of the verified entry.[PE1] This "gleaning" mechanism > is OPTIONAL. > > > > PPE 10: In section 16.2 later gleaning is used as a solution. Changes > in the gleaned info could be an interesting way to update the cache fast > …however this text make it sound that this is not an option after first > packet. > > It is an option when the ETR has no mapping to return packets. Once a > mapping is cache, there is no point to glean since the mapping system > verified the information the same as in the map-cache. > > > > > Page 25 > > "Note that trusting ICMP messages may not be desirable, but neither is > ignoring them completely. Implementations are encouraged to follow current > best practices in treating these conditions." > > > > PPE 11: A reference would be useful if possible. > > Added draft-ietf-opsec-icmp-filtering. > > > Page 25 > > "An ITR that participates in the global routing system can determine > that an RLOC is down if no BGP Routing Information Base (RIB) route exists > that matches the RLOC IP address." > > > > PPE 12: Isn't this true for any protocol entry not just a BGP entry? We > are really trying to determine if there is no route whatever the protocol. > > Yes, we can generalize this. I changed text. > > > Page 38 > > "For a more detailed networkd design deployment recommendation, refer to > [RFC7215]." > > > > PPE 13: Nit typo "netword"-> “network" > > Changed. > > > Page 40 > > "By having the PE be the first router on the path to encapsulate, it can > choose a TE path first, and the ETR can decapsulate and Re-Encapsulate for > a new encapsuluation path to the destination end site." > > > > PPE 14: Nit Typo "encapsuluation" -> “encapsulation" > > Changed. > > > Page 43 > > "If the attacker spoofs the source RLOC, it can mount a DoS attack by > redirecting traffic to the spoofed victim;s RLOC, potentially overloading > it." > > > > > PPE 15: Nit typo "victim;s" -> “victim’s” > > Changed. > > Dino > > > > > > > > > > > > >
- [lisp] Confirm/Deny changes on draft 6830bis Albert Cabellos
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Luigi Iannone
- Re: [lisp] Confirm/Deny changes on draft 6830bis Luigi Iannone
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Alberto Rodriguez-Natal
- Re: [lisp] Confirm/Deny changes on draft 6830bis Fabio Maino
- Re: [lisp] Confirm/Deny changes on draft 6830bis Luigi Iannone
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Luigi Iannone
- Re: [lisp] Confirm/Deny changes on draft 6830bis Padma Pillay-Esnault
- Re: [lisp] Confirm/Deny changes on draft 6830bis Padma Pillay-Esnault
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Albert Cabellos
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Joel M. Halpern
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Luigi Iannone