Re: [lisp] Mirja Kühlewind's Discuss on draft-ietf-lisp-rfc6830bis-16: (with DISCUSS and COMMENT)

"Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net> Thu, 20 September 2018 15:10 UTC

Return-Path: <ietf@kuehlewind.net>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58DDA1277CC for <lisp@ietfa.amsl.com>; Thu, 20 Sep 2018 08:10:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); domainkeys=pass (1024-bit key) header.from=ietf@kuehlewind.net header.d=kuehlewind.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eB2aTvGTqpZI for <lisp@ietfa.amsl.com>; Thu, 20 Sep 2018 08:10:08 -0700 (PDT)
Received: from kuehlewind.net (kuehlewind.net [83.169.45.111]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 84A66130DD9 for <lisp@ietf.org>; Thu, 20 Sep 2018 08:10:01 -0700 (PDT)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=kuehlewind.net; b=bLFbsGVZjRDsC5SxYVZ/wQ0uHw5qS07epJ7GZU/c7x/kCvFyjN+aKJ309Y4Gl+d9TIMb/e364chlUY4ne7gYujWclcyPvaiQ/z62McrykK4zSmIv5Chp9YGxYLTOYO2YqSrKZn9+MHqEBbKkMkl0x7a7cyEpSU1I8sl3SV27m5I=; h=Received:Received:Content-Type:Mime-Version:Subject:From:In-Reply-To:Date:Cc:Content-Transfer-Encoding:Message-Id:References:To:X-Mailer:X-PPP-Message-ID:X-PPP-Vhost;
Received: (qmail 25940 invoked from network); 20 Sep 2018 17:03:18 +0200
Received: from mue-88-130-61-247.dsl.tropolys.de (HELO ?192.168.178.24?) (88.130.61.247) by kuehlewind.net with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 20 Sep 2018 17:03:18 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
In-Reply-To: <CAKKJt-e9R=mtfaVZcnA95ctDyr+0MtDLyY0GxKo_5TKFkdft_Q@mail.gmail.com>
Date: Thu, 20 Sep 2018 17:03:16 +0200
Cc: lisp-chairs@ietf.org, draft-ietf-lisp-rfc6830bis@ietf.org, IESG <iesg@ietf.org>, Dino Farinacci <farinacci@gmail.com>, Luigi Iannone <ggx@gigix.net>, lisp@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <0B314B5A-5F7C-45B3-B1B3-690F050A5424@kuehlewind.net>
References: <153667905625.16761.12157659372502604927.idtracker@ietfa.amsl.com> <7DEBCA24-9D55-4325-85AA-48AB3FAAB91D@gmail.com> <0201F06C-DA9E-445A-A995-54BA805B595C@kuehlewind.net> <DDA9C261-44DD-4389-9463-3A84E4C176BB@gmail.com> <5EC21C57-D217-48A9-AFD0-24710299CF7F@kuehlewind.net> <5A3C4B1F-EA31-4698-96F4-915A77400A56@gmail.com> <2CAF25CC-01EE-49D4-B970-F8EFB24940A8@kuehlewind.net> <5F9D8F39-871D-4A96-9C0A-7BACD2ABB1F7@gmail.com> <AC0C4ACA-0E15-441E-B05A-64F034CBF2F1@kuehlewind.net> <CDF10486-2CD1-43C2-BF1B-BA8CA8C29444@gmail.com> <2DC6D38E-C46B-4D38-B093-B88720BCD550@kuehlewind.net> <CAKKJt-e9R=mtfaVZcnA95ctDyr+0MtDLyY0GxKo_5TKFkdft_Q@mail.gmail.com>
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-PPP-Message-ID: <20180920150318.25930.38263@lvps83-169-45-111.dedicated.hosteurope.de>
X-PPP-Vhost: kuehlewind.net
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/ST3kvbTAWFSQl6GiM53C24JSEIM>
Subject: Re: [lisp] Mirja Kühlewind's Discuss on draft-ietf-lisp-rfc6830bis-16: (with DISCUSS and COMMENT)
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Sep 2018 15:10:10 -0000

Hi Spencer,

this conversation was mostly on ECN. For the MTU issue, I think the solution is to restrict the message size of lisp messages such that no PMTU discovery is needed.

Mirja


> Am 20.09.2018 um 15:44 schrieb Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>:
> 
> I haven't balloted on this document yet, but since I will, and would love to ballot No-Objection ... 
> 
> On Thu, Sep 20, 2018 at 5:58 AM Mirja Kuehlewind (IETF) <ietf@kuehlewind.net> wrote:
> Hi Dino,
> 
> it’s fine with me to leave the details to rfc6040 but then also the details in the current text should be removed (because giving only half the details really doesn’t seem right).
> 
> However, I totally disagree with your comment on providing details that are not implemented. If they are not implemented correctly, it might even be more important to spell them out in this document, so implementors have chance to update their (future) implementation to do the correct thing. Having deployed implementations that are non standard-conform always happens and in this case it is probably not specifically problematic as it doesn’t impact interoperability. However, it is important though that the spec is correct.
> 
> Tl;dr - you're both right. Do the right thing. 
> 
> If I'm following this conversation correctly, the situation is 
> 
> - IP fragmentation can be problematic, roughly as a function of the number of fragments that any given IP packet is fragmented into, but 
> - most deployed LISP implementations don't do path MTU discovery now
> 
> Is that it?
> 
> If so, what I'd suggest, is actually saying it that way. 
> 
> Mirja's right, that we're advising people to do path MTU discovery of some type (and I'm pretty sure https://tools.ietf.org/html/rfc4821#section-10.3 is what we would recommend in this case). 
> 
> Dino's right, that putting out a standard that doesn't reflect deployed implementations won't inspire people to conform to standards. 
> 
> But do the right thing, of course ....
> 
> Spencer
>  
> Mirja
> 
> 
> > Am 18.09.2018 um 18:56 schrieb Dino Farinacci <farinacci@gmail.com>:
> > 
> > As I already said, this text is too detailed and repeats what is in other RFCs. And since implementations do what they already do, adding more details that are not implemented, IMO, is not good form.
> > 
> > Dino
> > 
> >> On Sep 18, 2018, at 3:32 AM, Mirja Kuehlewind (IETF) <ietf@kuehlewind.net> wrote:
> >> 
> >> Hi Dino,
> >> 
> >> please see below.
> >> 
> >>> Am 17.09.2018 um 19:48 schrieb Dino Farinacci <farinacci@gmail.com>:
> >>> 
> >>>> PROPOSED
> >>>> "The 'Explicit Congestion Notification' (ECN) field (bits 6 and 7
> >>>>   of the IPv6 'Traffic Class' field) [RFC3168] requires special treatment in
> >>>>   order to preserve the use of ECN on the path.
> >>>>   ITR encapsulation MUST copy the 2-bit 'ECN' field from the inner
> >>>>   header to the outer header, inline with the ’Normal Mode’ in section 4.1 
> >>>>   of [RFC6040].  Re-encapsulation SHOULD follow the decapsulation as described 
> >>>>   below and then 2-bit 'ECN' field from the stripped inner header to the 
> >>>>   new outer header.“
> >>> 
> >>> I did not include this text because the last sentence is not formed well. Please restate. A verb is missing.
> >> 
> >> copy
> >> 
> >>> 
> >>>> "The 'Explicit Congestion Notification' (ECN) field (bits 6 and 7
> >>>>   of the IPv6 'Traffic Class' field) requires special treatment on 
> >>>>   decapsulation in
> >>>>   order to avoid discarding indications of congestion, 
> >>>>   inline with section 4.2 of [RFC6040]. If
> >>>>   the 'ECN‘ field of the outer header contains a congestion indication     
> >>>>   codepoint (the
> >>>>   value is '11', the Congestion Experienced (CE) codepoint) and the inner 
> >>>>   header indicates ECN support (either ECT(0) or ECT(1) codepoint is set), 
> >>>>   then ETR decapsulation MUST also set CE field in the inner header that is 
> >>>>   used
> >>>>   to forward the packet beyond the ETR. If the inner packet is marked as non-
> >>>>   ECT but the outer header has the CE mark set, the packet MUST be dropped 
> >>>>   instead. Any discrepancy between the inner and outer header for non-ECT, 
> >>>>   ECT(0) and ECT(1) MUST NOT be copied from the outer header. These 
> >>>>   requirements preserve
> >>>>   CE indications when a packet that is ECN-capable traverses a LISP tunnel
> >>>>   and becomes marked with a CE indication due to congestion between
> >>>>   the tunnel endpoints or transforms an CE into loss if that packet is not 
> >>>>   ECN-capable conserving the congestion indication towards a non-ECN enables 
> >>>>   endpoint.”
> >>> 
> >>> I didn’t include this text because (1) it under states what to do with IPv4, (2) it has too much detail that is already in RFC6040, and (3) it undoes text that other reviewers have offered.
> >> 
> >> I didn’t change the mentioning of IPv6 here. Yes please at IPv4.
> >> 
> >> You can remove all this text and only point to rfc6040. That would actually my preferred solution. I don’t think it „undoes“ text; it just adds what was missing in compliance with RFC6040. Anyway it doesn’t matter point being that it should specify the same things as RFC6040 does not matter what other have ofter because RFC6040 is the IETF-consensus doc how describing how to handle this.
> >> 
> >>> 
> >>> 
> >>>> Please also remove the duplicated text after these bullet lists in the draft!
> >>> 
> >>> You have to tell me what text. I am too confused at this point on what you want.
> >> 
> >> This is the text in the en-/ and decapsulation lists:
> >> 
> >> "The 'Explicit Congestion Notification' (ECN) field (bits 6 and 7
> >>     of the IPv6 'Traffic Class' field) requires special treatment in
> >>     order to avoid discarding indications of congestion [RFC3168].
> >>     ITR encapsulation MUST copy the 2-bit 'ECN' field from the inner
> >>     header to the outer header.  Re-encapsulation MUST copy the 2-bit
> >>     'ECN' field from the stripped outer header to the new outer
> >>     header."
> >> 
> >> "The 'Explicit Congestion Notification' (ECN) field (bits 6 and 7
> >>     of the IPv6 'Traffic Class' field) requires special treatment in
> >>     order to avoid discarding indications of congestion [RFC6040].  If
> >>     the 'ECN' field contains a congestion indication codepoint (the
> >>     value is '11', the Congestion Experienced (CE) codepoint), then
> >>     ETR decapsulation MUST copy the 2-bit 'ECN' field from the
> >>     stripped outer header to the surviving inner header that is used
> >>     to forward the packet beyond the ETR.  These requirements preserve
> >>     CE indications when a packet that uses ECN traverses a LISP tunnel
> >>     and becomes marked with a CE indication due to congestion between
> >>     the tunnel endpoints."
> >> 
> >> And this text comes up right after the list in the same section:
> >> 
> >> "The Explicit Congestion Notification ('ECN') field occupies bits 6
> >>  and 7 of both the IPv4 'Type of Service' field and the IPv6 'Traffic
> >>  Class' field [RFC6040].  The 'ECN' field requires special treatment
> >>  in order to avoid discarding indications of congestion [RFC6040].  An
> >>  ITR/PITR encapsulation MUST copy the 2-bit 'ECN' field from the inner
> >>  header to the outer header.  Re-encapsulation MUST copy the 2-bit
> >>  'ECN' field from the stripped outer header to the new outer header.
> >>  If the 'ECN' field contains a congestion indication codepoint (the
> >>  value is '11', the Congestion Experienced (CE) codepoint), then ETR/
> >>  PETR decapsulation MUST copy the 2-bit 'ECN' field from the stripped
> >>  outer header to the surviving inner header that is used to forward
> >>  the packet beyond the ETR.  These requirements preserve CE
> >>  indications when a packet that uses ECN traverses a LISP tunnel and
> >>  becomes marked with a CE indication due to congestion between the
> >>  tunnel endpoints."
> >> 
> >> The last text bit does not add any information; it just states all normative requirement twice, even using basically exactly the some words. This can lead to discrepancies and it really not necessary. I’d recommend to just remove the last text block here (and fix the IPv6/IPv4 issue in the other blocks).
> >> 
> >> Mirja
> >> 
> >> 
> >>> 
> >>>> Further I believe my discuss points 2) and 4) are not fully resolved yet. Also I would like to at least see more explanation about the approach for extensibility that was taken in this doc (point 6).
> >>> 
> >>> You are going to have to repeat what they are because too many emails have flown by since your initial post. And for extensibility, we discuss it in RFC8060 and don’t think anything more should be said here otherwise, we will duplicate unnecessary text.
> >>> 
> >>> Another new diff file enclosed.
> >>> 
> >>> Dino
> >>> 
> >>> 
> >>> 
> >>> 
> >>> 
> >>> 
> >> 
> > 
>