Re: [lisp] 6830bis Review

Luigi Iannone <ggx@gigix.net> Tue, 09 January 2018 15:03 UTC

Return-Path: <ggx@gigix.net>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EEBB128959 for <lisp@ietfa.amsl.com>; Tue, 9 Jan 2018 07:03:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gigix-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CMJ7jqaA3WdJ for <lisp@ietfa.amsl.com>; Tue, 9 Jan 2018 07:03:28 -0800 (PST)
Received: from mail-wm0-x22b.google.com (mail-wm0-x22b.google.com [IPv6:2a00:1450:400c:c09::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 17C7F126C0F for <lisp@ietf.org>; Tue, 9 Jan 2018 07:03:28 -0800 (PST)
Received: by mail-wm0-x22b.google.com with SMTP id i11so21179743wmf.4 for <lisp@ietf.org>; Tue, 09 Jan 2018 07:03:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gigix-net.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=MrD0NXWNYSCvFOqduHHKrbIm4b+xXPOUI9s8YY5yiIQ=; b=LQeAuxFUzL8gvsgnLyBMjV+L2iM3bP4Znfqfb9n9h28ARzcJDw5DVApXQnrCzNGp+F V0PcAOLT6JAgylToXDHyDYAeEzJvlzU3MZ2jfG1Nmws8+48yCM+RjcEQ8uDONtmLyJyW CwB6EzBsWN6P7e5jm2bp7kNm0Okx+T0zUbIs42GpnOUrdYv8gqVlTxLZmN3x6NQ+xSa6 pmPfFcbc8j/TELrkH9UJk5sPhjtgx4TgWfbH5DGooqkp+lj+wIGl0V5B5FSknTEPf3DD NThut9sByXGN3nf18kWNqN46wo7KzcD95FU2Zrc91R9nqp8TA01xDiIxBv/YsC5wFYOx yGjw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=MrD0NXWNYSCvFOqduHHKrbIm4b+xXPOUI9s8YY5yiIQ=; b=QUGT5Q94NQNxKlk9pPLiwL5015HgM1KYjssFPg6EfVjVnYIoz5xSXZHvr24Cl6XMWz kG9DNtG2ABl6liEIYwIeMlnrnSX14kXAl7aJdvNUiNKR6jwSOvbb61SW5vrzXFp8OaT+ i2x/kWHFw6uhn9EUuKYrXVW03WemmZ9T4sxwZQjvFmN7H3rZ03y4herdmcUPMyZvmFlN R7mRtf9zWSI7OCjalF+5x58Lyn/fCDPfUjf0GD4mQB5mzcH6/lVXHi1xXpgvRGzLiAwA DI2TmWz05tc0CEmeHeJNniX+aqDmxeARCfTc43mQCUXKeNMm5yzmE0nBZf52JkKrJWez YEbQ==
X-Gm-Message-State: AKGB3mIbFO+X/3tyl+9Fn5D+QWVvQwGwy0gmAOjpmg20B7T6vavNSIW+ 6/C+/tDv5i7qrvmtV0wAnwi2dxjg4WA=
X-Google-Smtp-Source: ACJfBosj/g72HBw3G/oNjpbieHeJEqZmuTY22EEXQby41OEJXOnMHen/TpcJRIS8vaJWmviVdxM0UA==
X-Received: by 10.28.234.10 with SMTP id i10mr11871865wmh.14.1515510206360; Tue, 09 Jan 2018 07:03:26 -0800 (PST)
Received: from ?IPv6:2001:660:330f:a4:c4aa:2fae:3f8:10d4? ([2001:660:330f:a4:c4aa:2fae:3f8:10d4]) by smtp.gmail.com with ESMTPSA id w195sm13600173wmw.46.2018.01.09.07.03.24 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 09 Jan 2018 07:03:24 -0800 (PST)
From: Luigi Iannone <ggx@gigix.net>
Message-Id: <98C25E20-BD78-462A-BDB4-572AA24C1A97@gigix.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_A7E7F0CE-63A9-4095-A0BA-50E081433178"
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Date: Tue, 09 Jan 2018 16:04:04 +0100
In-Reply-To: <49EE7D2D-FC59-42F1-A93A-B315D4D6420E@gigix.net>
Cc: "lisp@ietf.org list" <lisp@ietf.org>
To: Albert Cabellos <albert.cabellos@gmail.com>
References: <907CD955-B043-4728-ABD6-5AD96192EC5F@inria.fr> <4EAD1E98-E8E7-4A0A-8300-2D185B9109CC@gigix.net> <CAGE_QexqW=q51kXR9fo_8YDu6VVUHCBz-XrGt5iZ6FOTRxDLiA@mail.gmail.com> <49EE7D2D-FC59-42F1-A93A-B315D4D6420E@gigix.net>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/LftulvVtai2zEtqiy0ObMZMzKL4>
Subject: Re: [lisp] 6830bis Review
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Jan 2018 15:03:35 -0000

HI Albert,

thanks for your reply. 

My comments inline. (trimming what is OK for me)

Luigi

> On 27 Dec 2017, at 02:48, Albert Cabellos <albert.cabellos@gmail.com <mailto:albert.cabellos@gmail.com>> wrote:
> 

[snip]
> >
> >
> >   Endpoint ID (EID):   An EID is a 32-bit (for IPv4) or 128-bit (for
> >      IPv6) value used in the source and destination address fields of
> >      the first (most inner) LISP header of a packet.  The host obtains
> >      a destination EID the same way it obtains a destination address
> >      today, for example, through a Domain Name System (DNS) [RFC1034]
> >      lookup or Session Initiation Protocol (SIP) [RFC3261] exchange.
> >      The source EID is obtained via existing mechanisms used to set a
> >      host's "local" IP address.  An EID used on the public Internet
> >      must have the same properties as any other IP address used in that
> >      manner; this means, among other things, that it must be globally
> >      unique.  An EID is allocated to a host from an EID-Prefix block
> >      associated with the site where the host is located.  An EID can be
> >      used by a host to refer to other hosts.  Note that EID blocks MAY
> >      be assigned in a hierarchical manner, independent of the network
> >      topology, to facilitate scaling of the mapping database.  In
> >      addition, an EID block assigned to a site may have site-local
> >      structure (subnetting) for routing within the site; this structure
> >      is not visible to the global routing system.  In theory, the bit
> >      string that represents an EID for one device can represent an RLOC
> >      for a different device.  As the architecture is realized, if a
> >      given bit string is both an RLOC and an EID, it must refer to the
> >      same entity in both cases.
> >
> >
> > Is the above sentence really necessary?
> >
> 
> Agreed, why not simplify the definitions. They are written from the ‘Internet scalability mindset’, why not say that an EID is an address of the overlay and an RLOC an address of the overlay. This change may require further changes on the document so I am not 100% sure if this is a good idea.

For clarification I was just referring to the sentence:

 " As the architecture is realized, if a given bit string is both an RLOC and an EID, it must refer to the same entity in both cases.” 

I am wondering if such constrain is really necessary. If namespaces are well scoped there is no need for this. 

[snip]

About the following:

> 
> >
> >   o  EIDs are typically IP addresses assigned to hosts.
> >
> >   o  Other types of EID are supported by LISP, see [RFC8060] for
> >      further information.
> >
> > I would put the last two bullets in the definition of EID. It simplifies the story here.
> >
> >
> 
> I suggest to leave them here, I don´t think that readers start from the ‘Definition of terms’, these are relevant concepts to understand LISP.

Good point about de definition of terms. What really bothers me is the bullet organisation. What can be done is to merge these two bullets with the previous one. 

> 
> >
> > The description of the encap/decap operation lacks of clarity concerning how to deal with
> > ECN bits and DSCP .
> >
> > 1. I think that the text should make explicitly the difference between DSCP and ECN fields.
> >
> > 2. How to deal with ECN should be part of the description of the  encap/decap not a paragraph apart.
> >    This basically means that half of the last paragraph should be a bullet of the ITR/PITR encapsulation
> >    and the other half  in the ETR/PETR operation.
> 
> 
> Agreed, what about this (please comment):
> 
>    When doing ITR/PITR encapsulation:
> 
>     o  The outer-header 'Time to Live' field (or 'Hop Limit' field, in the case of IPv6) SHOULD be copied from the inner-header 'Time to Live' field.
>     o  The outer-header 'Differentiated Services Code Point' (DSCP) field (or the 'Traffic Class' field, in the case of IPv6) SHOULD be copied from the inner-header DSCP field ('Traffic Class' field, in the case of IPv6) considering the exception listed below.
>    o  The 'Explicit Congestion Notification' (ECN) field (bits 6 and 7 of the IPv6 'Traffic Class' field) requires special treatment in order to avoid discarding indications of congestion [RFC3168]. ITR encapsulation MUST copy the 2-bit 'ECN' field from the inner header to the outer header. Re-encapsulation MUST copy the 2-bit 'ECN' field from the stripped outer header to the new outer header.
> 
> When doing ETR/PETR decapsulation:
> 
>    o  The inner-header 'Time to Live' field (or 'Hop Limit' field, in the case of IPv6) SHOULD be copied from the outer-header 'Time to Live' field, when the Time to Live value of the outer header is less than the Time to Live value of the inner header.  Failing to perform this check can cause the Time to Live of the inner header to increment across encapsulation/decapsulation cycles.  This check is also performed when doing initial encapsulation, when a packet comes to an ITR or PITR destined for a LISP site.
>    o  The inner-header 'Differentiated Services Code Point' (DSCP) field (or the 'Traffic Class' field, in the case of IPv6) SHOULD be copied from the outer-header DSCP field ('Traffic Class' field, in the case of IPv6) considering the exception listed below.
>    o  The 'Explicit Congestion Notification' (ECN) field (bits 6 and 7 of the IPv6 'Traffic Class' field) requires special treatment in order to avoid discarding indications of congestion [RFC3168]. If the 'ECN' field contains a congestion indication codepoint (the value is '11', the Congestion Experienced (CE) codepoint), then ETR decapsulation MUST copy the 2-bit 'ECN' field from the stripped outer header to the surviving inner header that is used to forward the packet beyond the ETR.  These requirements preserve CE indications when a packet that uses ECN traverses a LISP tunnel and becomes marked with a CE indication due to congestion between the tunnel endpoints.
> 
> Note that if an ETR/PETR is also an ITR/PITR and chooses to re-encapsulate after decapsulating, the net effect of this is that the new outer header will carry the same Time to Live as the old outer header minus 1.
> 
> Copying the Time to Live (TTL) serves two purposes: first, it preserves the distance the host intended the packet to travel; second, and more importantly, it provides for suppression of looping packets in the event there is a loop of concatenated tunnels due to misconfiguration.  See Section 18.3 for TTL exception handling for traceroute packets.
> 

Text looks very good to me.


> 
> >
> > Large part of this section is about control plane issues and as such should be put in 6833bis.
> >
> > What this section should state is that priority and weight are used to select the RLOC to use.
> > Only exception is gleaning where we have one single RLOC and we do not know neither priority nor weight.
> >
> > All the other operational discussion goes elsewhere, but not in this document.
> >
> 
> Agree, I suggest moving it to 6833bis. What to leave in 6830bis is less obvious, maybe something like (not final, just a couple of ideas):
> 
> The data-plane must follow the state stored in the map-cache to encapsulate and decapsulate packets. The map-cache is populated using a control-plane, such as [6833bis]. ETRs encapsulate packets following the Priorities and Weights stored in the map-cache.
> 

Yes, this is what I meant.


> Actually we should merge this section with 'Routing Locator Hashing'
> 
> 

I think is a good idea.

[snip]
> > 13.  Changing the Contents of EID-to-RLOC Mappings
> >
> >
> > This is a control plane issue, as such it has to go in 6833bis, with two exception:
> > The very first paragraph stetting the problem, and the versioning subsection, because it is a data-plane mechanism.
> >
> > All of the rest 6833bis
> >
> > Actually I remember a suggestion about putting operations issues like this in an OAM document which would be a good idea.
> >
> >
> 
> So you are suggesting that the LISP control-plane does not define any mechanism to update EID-to-RLOC mappings? 
> 

Not exactly. Control-plane should discuss how to change the mappings, but things like clock sweep is just management not a control plane mechanism, as such it does not really needs to be standardised because there are no interoperability issues, hence it make really sense  to put it elsewhere.

Thanks

Luigi