Re: [lisp] Confirm/Deny changes on draft 6830bis
"Joel M. Halpern" <jmh@joelhalpern.com> Mon, 29 January 2018 03:17 UTC
Return-Path: <jmh@joelhalpern.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E95F13155F for <lisp@ietfa.amsl.com>; Sun, 28 Jan 2018 19:17:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.72
X-Spam-Level:
X-Spam-Status: No, score=-2.72 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PuZzpTMtOc-G for <lisp@ietfa.amsl.com>; Sun, 28 Jan 2018 19:17:20 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4350D13156D for <lisp@ietf.org>; Sun, 28 Jan 2018 19:17:19 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 295B11C0DA8; Sun, 28 Jan 2018 19:17:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1517195839; bh=7cZ0mKsRVdBCvzPTc+T5sm9qrVVHxoUFW4UGou8GONg=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=Qkme3ZPpnLdJXpxCWOxxKj0Ke/8uAXDdr5jWt85/OIzJ6hylKyZYezt+jbybVcjgI goAdIzBPmKVxLn6L/wUTewh1ampL90eWqpoGF8DxDUuWF38BrPtjLDtSYeYCKtc45R 2aDHdv8pZpJzD5w/X5uVsctYPD0aFoF1TRpTqWCQ=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [111.223.96.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 388981C0657; Sun, 28 Jan 2018 19:17:15 -0800 (PST)
To: Dino Farinacci <farinacci@gmail.com>, Albert Cabellos <albert.cabellos@gmail.com>
Cc: lisp-chairs@tools.ietf.org, "lisp@ietf.org list" <lisp@ietf.org>
References: <CAGE_Qex--1pS5ivDmSZXVXLsFRgO+a9F32YmJL_dO7h4+4QMCA@mail.gmail.com> <EE6A9B4D-5852-40B6-A780-2FF6B574C62B@gmail.com> <E1C72747-5AB4-455A-A478-21771CE29A92@gigix.net> <545E1F14-2386-47CF-9337-E1FF1354CD03@gmail.com> <CAG-CQxp9kBOiOLvS4Wy93ezF5t4GQfqaurCj+aw+f=7Wjvc_uw@mail.gmail.com> <2893FDD0-35A6-4D41-90B6-3E794BEFE421@gmail.com> <CAGE_QexRF4fKwLRsP5n6HQiQgM=HqFauuYn_=eT_mB8E42p2ow@mail.gmail.com> <784FC076-8BA8-42E4-9891-2685A3DE40F5@gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <73829a96-aa11-066b-b5a0-2a6d6721c76b@joelhalpern.com>
Date: Sun, 28 Jan 2018 22:17:21 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <784FC076-8BA8-42E4-9891-2685A3DE40F5@gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/SXSf75L0AiOwsAGJcQGpfenLLTY>
Subject: Re: [lisp] Confirm/Deny changes on draft 6830bis
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jan 2018 03:17:23 -0000
Assuming Luigi agrees, there should be a version of this dcoument submitted that incorporates what Dino did for A and C, and addresses D - G. Yours, Joel On 1/28/18 10:07 PM, Dino Farinacci wrote: > Note A and C are addressed in the -09 revision I sent out in Friday. > > Dino > > On Jan 28, 2018, at 5:57 PM, Albert Cabellos <albert.cabellos@gmail.com > <mailto:albert.cabellos@gmail.com>> wrote: > >> Hi all >> >> Thanks for all the comments, from my understanding of this thread the >> following list of items *seem* to have rough consensus (all except B - >> change definitions for EID and RLOC). >> >> Joel, Luigi->How should we proceed now? >> >> Albert >> >> --- >> >> A.- Remove definitions of PA and PI >> >> C.- In section 5.3, change the description of the encap/decap >> operation concerning how to deal with ECN and DSCP bits to (new >> text needs to be validated by experts): >> >> When doing ITR/PITR encapsulation: >> >> >> o The outer-header 'Time to Live' field (or 'Hop Limit' >> field, in the case of IPv6) SHOULD be copied from the >> inner-header 'Time to Live' field. >> >> >> o The outer-header 'Differentiated Services Code Point' >> (DSCP) field (or the 'Traffic Class' field, in the case of >> IPv6) SHOULD be copied from the inner-header DSCP field >> ('Traffic Class' field, in the case of IPv6) considering the >> exception listed below. >> >> >> o The 'Explicit Congestion Notification' (ECN) field (bits 6 >> and 7 of the IPv6 'Traffic Class' field) requires special >> treatment in order to avoid discarding indications of >> congestion [RFC3168]. ITR encapsulation MUST copy the 2-bit >> 'ECN' field from the inner header to the outer header. >> Re-encapsulation MUST copy the 2-bit 'ECN' field from the >> stripped outer header to the new outer header. >> >> >> When doing ETR/PETR decapsulation: >> >> >> o The inner-header 'Time to Live' field (or 'Hop Limit' >> field, in the case of IPv6) SHOULD be copied from the >> outer-header 'Time to Live' field, when the Time to Live value >> of the outer header is less than the Time to Live value of the >> inner header. Failing to perform this check can cause the >> Time to Live of the inner header to increment across >> encapsulation/decapsulation cycles. This check is also >> performed when doing initial encapsulation, when a packet >> comes to an ITR or PITR destined for a LISP site. >> >> >> o The inner-header 'Differentiated Services Code Point' >> (DSCP) field (or the 'Traffic Class' field, in the case of >> IPv6) SHOULD be copied from the outer-header DSCP field >> ('Traffic Class' field, in the case of IPv6) considering the >> exception listed below. >> >> >> o The 'Explicit Congestion Notification' (ECN) field (bits 6 >> and 7 of the IPv6 'Traffic Class' field) requires special >> treatment in order to avoid discarding indications of >> congestion [RFC3168]. If the 'ECN' field contains a congestion >> indication codepoint (the value is '11', the Congestion >> Experienced (CE) codepoint), then ETR decapsulation MUST copy >> the 2-bit 'ECN' field from the stripped outer header to the >> surviving inner header that is used to forward the packet >> beyond the ETR. These requirements preserve CE indications >> when a packet that uses ECN traverses a LISP tunnel and >> becomes marked with a CE indication due to congestion between >> the tunnel endpoints. >> >> >> Note that if an ETR/PETR is also an ITR/PITR and chooses to >> re-encapsulate after decapsulating, the net effect of this is >> that the new outer header will carry the same Time to Live as >> the old outer header minus 1. >> >> >> Copying the Time to Live (TTL) serves two purposes: first, it >> preserves the distance the host intended the packet to travel; >> second, and more importantly, it provides for suppression of >> looping packets in the event there is a loop of concatenated >> tunnels due to misconfiguration. See Section 18.3 for TTL >> exception handling for traceroute packets. >> >> >> D.- Simplify section ‘Router Locator Selection’ stating that the >> data-plane MUST follow what´s stored in the map-cache (priorities >> and weights), the remaining text should go to an OAM document. >> >> E.- Rewrite Section “Routing Locator Reachability” considering the >> following changes: >> >> * Keep bullet point 1 (examine LSB), 6 (receiving a >> data-packet) and Echo-Nonce >> * Move to 6833bis bullet point 2 (ICMP Network/Host >> Unreachable),3 (hints from BGP),4 (ICMP Port Unreachable),5 >> (receive a Map-Reply as a response) and RLOC probing >> >> F.- Move Solicit-Map-Request to 6833bis >> >> G.- Move sections 16 (Mobility Considerations), 17 (xTR Placement >> Considerations), 18 (Traceroute Consideration) to a new OAM document >> >> >> On Fri, Jan 26, 2018 at 8:20 PM, Dino Farinacci <farinacci@gmail.com >> <mailto:farinacci@gmail.com>> wrote: >> >> Thanks for the detail review Padma. A new update to -09 is >> enclosed with a diff file. I will wait until next week to post. >> >> I have reflected all of your comments and most of Luigi’s >> comments. The only issues open are: >> >> (1) Section movement from RFC6830 to RFC6833. >> >> (2) If an OAM document is needed. >> >> Waiting for more working group concensus on this. >> >> > Dear Dino and Albert >> > >> > The doc reads well. >> > Please find thereafter some comments on the version- 09 you posted on the list >> > >> > Page 4 >> > "Client-side: Client-side is a term used in this document to indicate a connection initiation attempt by an EID." >> > PPE 1: Strictly speaking the EID is just an identifier and does not initiate anything. Suggest something like this. >> > >> > "Client-side: Client-side is a term used in this document to >> indicate a connection initiation attempt by the end system >> (represented by an EID)” >> >> Fixed. Put in your suggestion. >> >> > Page 6 >> > The source EID is obtained via existing mechanisms used to set a host's "local" IP address. An EID used on the public Internet must have the same properties as any other IP address used in that manner; this means, among other things, that it must be globally unique. >> > >> > PPE 2: Shouldn't these two be MUST rather than must? Suggestion below >> > >> > The source EID is obtained via existing mechanisms used to set a host's "local" IP address. An EID used on the public Internet MUST have the same properties as any other IP address used in that manner; this means, among other things, that it MUST be globally unique. >> >> Changed. >> >> > Page 8 >> > An EID maps to one or more RLOCs. >> > PPE 3: Seems to contradict earlier explanation on negative mapping entry where it is possible that an EID has NO RLOC. >> >> I changed to “zero or more RLOCs.”. >> >> > Page 8 >> > When using multiple mapping database systems, care must be taken to not create re-encapsulation loops through misconfiguration. >> > >> > PPE 4: Suggest to add "re-encapsulation" in the list in Security Considerations section as this is an exploit possibility. >> >> I have removed the sentence. Because it actually is not true. If >> you use different mapping systems and circuitious forwarding >> occurs. The packet travels only until its TTL reaches 0. Using the >> rules for copy inner to outer and outer to inner during RTR >> re-encapsulation applies. >> >> > Page 13 >> > "gleaned" mapping >> > >> > PPE 5: Suggest adding “glean mapping” in the definition section. >> >> Changed. >> >> > Page 17 >> > "The KK-bits are a 2-bit field used when encapsualted packets are encrypted." >> > >> > PPE 6: Nit - Typo "encapsualted" -> “encapsulated" >> >> Fixed. >> >> > >> > Page 20 >> > "When the lookup succeeds, the locator-set retrieved from the map-cache is used to send the packet to the EID's topological location." >> > >> > PPE 7: Nit - Suggest capitalize L and S of "locator-set" for consistency with rest of document. >> >> Thanks. Done. >> >> > >> > Page 23 >> > "The server-side sets a Weight of 0..." >> > PPE 8: Nit - For consistency in text change to "Weight of zero”. >> >> Changed. >> >> > Page 23 >> > "Control is shared by the server- side determining the list and the client determining load distribution." >> > >> > PPE 9: Suggest use of "Client-side" >> > >> > "Control is shared by the server- side determining the list and >> the client-side determining load distribution.” >> >> Done. >> >> > Page 24 >> > When a verified Map-Cache entry is stored, data gleaning no longer occurs for subsequent packets that have a source EID that matches >> > the EID-Prefix of the verified entry.[PE1] This "gleaning" mechanism is OPTIONAL. >> > >> > PPE 10: In section 16.2 later gleaning is used as a solution. Changes in the gleaned info could be an interesting way to update the cache fast …however this text make it sound that this is not an option after first packet. >> >> It is an option when the ETR has no mapping to return packets. >> Once a mapping is cache, there is no point to glean since the >> mapping system verified the information the same as in the map-cache. >> >> > >> > Page 25 >> > "Note that trusting ICMP messages may not be desirable, but neither is ignoring them completely. Implementations are encouraged to follow current best practices in treating these conditions." >> > >> > PPE 11: A reference would be useful if possible. >> >> Added draft-ietf-opsec-icmp-filtering. >> >> > Page 25 >> > "An ITR that participates in the global routing system can determine that an RLOC is down if no BGP Routing Information Base (RIB) route exists that matches the RLOC IP address." >> > >> > PPE 12: Isn't this true for any protocol entry not just a BGP entry? We are really trying to determine if there is no route whatever the protocol. >> >> Yes, we can generalize this. I changed text. >> >> > Page 38 >> > "For a more detailed networkd design deployment recommendation, refer to [RFC7215]." >> > >> > PPE 13: Nit typo "netword"-> “network" >> >> Changed. >> >> > Page 40 >> > "By having the PE be the first router on the path to encapsulate, it can choose a TE path first, and the ETR can decapsulate and Re-Encapsulate for a new encapsuluation path to the destination end site." >> > >> > PPE 14: Nit Typo "encapsuluation" -> “encapsulation" >> >> Changed. >> >> > Page 43 >> > "If the attacker spoofs the source RLOC, it can mount a DoS attack by redirecting traffic to the spoofed victim;s RLOC, potentially overloading it." >> > >> >> > PPE 15: Nit typo "victim;s" -> “victim’s” >> >> Changed. >> >> Dino >> >> >> >> >> >> >> >> >> >> >> >> >> > > > _______________________________________________ > lisp mailing list > lisp@ietf.org > https://www.ietf.org/mailman/listinfo/lisp >
- [lisp] Confirm/Deny changes on draft 6830bis Albert Cabellos
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Luigi Iannone
- Re: [lisp] Confirm/Deny changes on draft 6830bis Luigi Iannone
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Alberto Rodriguez-Natal
- Re: [lisp] Confirm/Deny changes on draft 6830bis Fabio Maino
- Re: [lisp] Confirm/Deny changes on draft 6830bis Luigi Iannone
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Luigi Iannone
- Re: [lisp] Confirm/Deny changes on draft 6830bis Padma Pillay-Esnault
- Re: [lisp] Confirm/Deny changes on draft 6830bis Padma Pillay-Esnault
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Albert Cabellos
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Joel M. Halpern
- Re: [lisp] Confirm/Deny changes on draft 6830bis Dino Farinacci
- Re: [lisp] Confirm/Deny changes on draft 6830bis Luigi Iannone