Re: [lisp] Confirm/Deny changes on draft 6830bis

"Joel M. Halpern" <jmh@joelhalpern.com> Mon, 29 January 2018 03:17 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: lisp@ietfa.amsl.com
Delivered-To: lisp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E95F13155F for <lisp@ietfa.amsl.com>; Sun, 28 Jan 2018 19:17:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.72
X-Spam-Level:
X-Spam-Status: No, score=-2.72 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PuZzpTMtOc-G for <lisp@ietfa.amsl.com>; Sun, 28 Jan 2018 19:17:20 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4350D13156D for <lisp@ietf.org>; Sun, 28 Jan 2018 19:17:19 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 295B11C0DA8; Sun, 28 Jan 2018 19:17:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=1.tigertech; t=1517195839; bh=7cZ0mKsRVdBCvzPTc+T5sm9qrVVHxoUFW4UGou8GONg=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=Qkme3ZPpnLdJXpxCWOxxKj0Ke/8uAXDdr5jWt85/OIzJ6hylKyZYezt+jbybVcjgI goAdIzBPmKVxLn6L/wUTewh1ampL90eWqpoGF8DxDUuWF38BrPtjLDtSYeYCKtc45R 2aDHdv8pZpJzD5w/X5uVsctYPD0aFoF1TRpTqWCQ=
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (unknown [111.223.96.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 388981C0657; Sun, 28 Jan 2018 19:17:15 -0800 (PST)
To: Dino Farinacci <farinacci@gmail.com>, Albert Cabellos <albert.cabellos@gmail.com>
Cc: lisp-chairs@tools.ietf.org, "lisp@ietf.org list" <lisp@ietf.org>
References: <CAGE_Qex--1pS5ivDmSZXVXLsFRgO+a9F32YmJL_dO7h4+4QMCA@mail.gmail.com> <EE6A9B4D-5852-40B6-A780-2FF6B574C62B@gmail.com> <E1C72747-5AB4-455A-A478-21771CE29A92@gigix.net> <545E1F14-2386-47CF-9337-E1FF1354CD03@gmail.com> <CAG-CQxp9kBOiOLvS4Wy93ezF5t4GQfqaurCj+aw+f=7Wjvc_uw@mail.gmail.com> <2893FDD0-35A6-4D41-90B6-3E794BEFE421@gmail.com> <CAGE_QexRF4fKwLRsP5n6HQiQgM=HqFauuYn_=eT_mB8E42p2ow@mail.gmail.com> <784FC076-8BA8-42E4-9891-2685A3DE40F5@gmail.com>
From: "Joel M. Halpern" <jmh@joelhalpern.com>
Message-ID: <73829a96-aa11-066b-b5a0-2a6d6721c76b@joelhalpern.com>
Date: Sun, 28 Jan 2018 22:17:21 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <784FC076-8BA8-42E4-9891-2685A3DE40F5@gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/lisp/SXSf75L0AiOwsAGJcQGpfenLLTY>
Subject: Re: [lisp] Confirm/Deny changes on draft 6830bis
X-BeenThere: lisp@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: List for the discussion of the Locator/ID Separation Protocol <lisp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lisp>, <mailto:lisp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lisp/>
List-Post: <mailto:lisp@ietf.org>
List-Help: <mailto:lisp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lisp>, <mailto:lisp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jan 2018 03:17:23 -0000

Assuming Luigi agrees, there should be a version of this dcoument 
submitted that incorporates what Dino did for A and C, and addresses D - G.

Yours,
Joel

On 1/28/18 10:07 PM, Dino Farinacci wrote:
> Note A and C are addressed in the -09 revision I sent out in Friday.
> 
> Dino
> 
> On Jan 28, 2018, at 5:57 PM, Albert Cabellos <albert.cabellos@gmail.com 
> <mailto:albert.cabellos@gmail.com>> wrote:
> 
>> Hi all
>>
>> Thanks for all the comments, from my understanding of this thread the 
>> following list of items *seem* to have rough consensus (all except B - 
>> change definitions for EID and RLOC).
>>
>> Joel, Luigi->How should we proceed now?
>>
>> Albert
>>
>> ---
>>
>>     A.- Remove definitions of PA and PI
>>
>>     C.- In section 5.3, change the description of the encap/decap
>>     operation concerning how to deal with ECN and DSCP bits to (new
>>     text needs to be validated by experts):
>>
>>         When doing ITR/PITR encapsulation:
>>
>>
>>         o  The outer-header 'Time to Live' field (or 'Hop Limit'
>>         field, in the case of IPv6) SHOULD be copied from the
>>         inner-header 'Time to Live' field.
>>
>>
>>         o  The outer-header 'Differentiated Services Code Point'
>>         (DSCP) field (or the 'Traffic Class' field, in the case of
>>         IPv6) SHOULD be copied from the inner-header DSCP field
>>         ('Traffic Class' field, in the case of IPv6) considering the
>>         exception listed below.
>>
>>
>>         o  The 'Explicit Congestion Notification' (ECN) field (bits 6
>>         and 7 of the IPv6 'Traffic Class' field) requires special
>>         treatment in order to avoid discarding indications of
>>         congestion [RFC3168]. ITR encapsulation MUST copy the 2-bit
>>         'ECN' field from the inner header to the outer header.
>>         Re-encapsulation MUST copy the 2-bit 'ECN' field from the
>>         stripped outer header to the new outer header.
>>
>>
>>         When doing ETR/PETR decapsulation:
>>
>>
>>          o  The inner-header 'Time to Live' field (or 'Hop Limit'
>>         field, in the case of IPv6) SHOULD be copied from the
>>         outer-header 'Time to Live' field, when the Time to Live value
>>         of the outer header is less than the Time to Live value of the
>>         inner header.  Failing to perform this check can cause the
>>         Time to Live of the inner header to increment across
>>         encapsulation/decapsulation cycles.  This check is also
>>         performed when doing initial encapsulation, when a packet
>>         comes to an ITR or PITR destined for a LISP site.
>>
>>
>>         o  The inner-header 'Differentiated Services Code Point'
>>         (DSCP) field (or the 'Traffic Class' field, in the case of
>>         IPv6) SHOULD be copied from the outer-header DSCP field
>>         ('Traffic Class' field, in the case of IPv6) considering the
>>         exception listed below.
>>
>>
>>         o  The 'Explicit Congestion Notification' (ECN) field (bits 6
>>         and 7 of the IPv6 'Traffic Class' field) requires special
>>         treatment in order to avoid discarding indications of
>>         congestion [RFC3168]. If the 'ECN' field contains a congestion
>>         indication codepoint (the value is '11', the Congestion
>>         Experienced (CE) codepoint), then ETR decapsulation MUST copy
>>         the 2-bit 'ECN' field from the stripped outer header to the
>>         surviving inner header that is used to forward the packet
>>         beyond the ETR.  These requirements preserve CE indications
>>         when a packet that uses ECN traverses a LISP tunnel and
>>         becomes marked with a CE indication due to congestion between
>>         the tunnel endpoints.
>>
>>
>>         Note that if an ETR/PETR is also an ITR/PITR and chooses to
>>         re-encapsulate after decapsulating, the net effect of this is
>>         that the new outer header will carry the same Time to Live as
>>         the old outer header minus 1.
>>
>>
>>         Copying the Time to Live (TTL) serves two purposes: first, it
>>         preserves the distance the host intended the packet to travel;
>>         second, and more importantly, it provides for suppression of
>>         looping packets in the event there is a loop of concatenated
>>         tunnels due to misconfiguration.  See Section 18.3 for TTL
>>         exception handling for traceroute packets.
>>
>>
>>     D.- Simplify section ‘Router Locator Selection’ stating that the
>>     data-plane MUST follow what´s stored in the map-cache (priorities
>>     and weights), the remaining text should go to an OAM document.
>>
>>     E.- Rewrite Section “Routing Locator Reachability” considering the
>>     following changes:
>>
>>     *    Keep bullet point 1 (examine LSB), 6 (receiving a
>>     data-packet) and Echo-Nonce
>>     *    Move to 6833bis bullet point 2 (ICMP Network/Host
>>     Unreachable),3 (hints from BGP),4 (ICMP Port Unreachable),5
>>     (receive a Map-Reply as a response) and RLOC probing
>>
>>     F.- Move Solicit-Map-Request to 6833bis
>>
>>     G.- Move sections 16 (Mobility Considerations), 17 (xTR Placement
>>     Considerations), 18 (Traceroute Consideration) to a new OAM document
>>
>>
>> On Fri, Jan 26, 2018 at 8:20 PM, Dino Farinacci <farinacci@gmail.com 
>> <mailto:farinacci@gmail.com>> wrote:
>>
>>     Thanks for the detail review Padma. A new update to -09 is
>>     enclosed with a diff file. I will wait until next week to post.
>>
>>     I have reflected all of your comments and most of Luigi’s
>>     comments. The only issues open are:
>>
>>     (1) Section movement from RFC6830 to RFC6833.
>>
>>     (2) If an OAM document is needed.
>>
>>     Waiting for more working group concensus on this.
>>
>>     > Dear Dino and Albert
>>     >
>>     > The doc reads well.
>>     > Please find thereafter some comments on the version- 09 you posted on the list
>>     >
>>     > Page 4
>>     > "Client-side:  Client-side is a term used in this document to indicate a connection initiation attempt by an EID."
>>     > PPE 1: Strictly speaking the EID is just an identifier and does not initiate anything. Suggest something like this.
>>     >
>>     > "Client-side:  Client-side is a term used in this document to
>>     indicate a connection initiation attempt by the end system
>>     (represented by an EID)”
>>
>>     Fixed. Put in your suggestion.
>>
>>     > Page 6
>>     > The source EID is obtained via existing mechanisms used to set a host's "local" IP address.  An EID used on the public Internet must have the same properties as any other IP address used in that manner; this means, among other things, that it must be globally unique.
>>     >
>>     > PPE 2: Shouldn't these two be MUST rather than must? Suggestion below
>>     >
>>     > The source EID is obtained via existing mechanisms used to set a host's "local" IP address.  An EID used on the public Internet MUST have the same properties as any other IP address used in that manner; this means, among other things, that it MUST be globally unique.
>>
>>     Changed.
>>
>>     > Page 8
>>     > An EID maps to one or more RLOCs.
>>     > PPE 3: Seems to contradict earlier explanation on negative mapping entry where it is possible that an EID has NO RLOC.
>>
>>     I changed to “zero or more RLOCs.”.
>>
>>     > Page 8
>>     > When using multiple mapping database systems, care must be taken to not create re-encapsulation loops through misconfiguration.
>>     >
>>     > PPE 4: Suggest to add "re-encapsulation" in the list in Security Considerations section as this is an exploit possibility.
>>
>>     I have removed the sentence. Because it actually is not true. If
>>     you use different mapping systems and circuitious forwarding
>>     occurs. The packet travels only until its TTL reaches 0. Using the
>>     rules for copy inner to outer and outer to inner during RTR
>>     re-encapsulation applies.
>>
>>     > Page 13
>>     > "gleaned" mapping
>>     >
>>     > PPE 5: Suggest adding “glean mapping” in the definition section.
>>
>>     Changed.
>>
>>     > Page 17
>>     > "The KK-bits are a 2-bit field used when encapsualted packets are encrypted."
>>     >
>>     > PPE 6: Nit - Typo "encapsualted" -> “encapsulated"
>>
>>     Fixed.
>>
>>     >
>>     > Page 20
>>     > "When the lookup succeeds, the locator-set  retrieved from the map-cache is used to send the packet to the EID's topological location."
>>     >
>>     > PPE 7: Nit - Suggest capitalize L and S of "locator-set" for consistency with rest of document.
>>
>>     Thanks. Done.
>>
>>     >
>>     > Page 23
>>     > "The server-side sets a Weight of 0..."
>>     > PPE 8: Nit - For consistency in text change to "Weight of zero”.
>>
>>     Changed.
>>
>>     > Page 23
>>     > "Control is shared by the server- side determining the list and the client determining load  distribution."
>>     >
>>     > PPE 9: Suggest use of "Client-side"
>>     >
>>     > "Control is shared by the server- side determining the list and
>>     the client-side determining load distribution.”
>>
>>     Done.
>>
>>     > Page 24
>>     > When a verified Map-Cache entry is stored, data gleaning no longer occurs for subsequent packets that have a source EID that matches
>>     > the EID-Prefix of the verified entry.[PE1]   This "gleaning" mechanism is OPTIONAL.
>>     >
>>     > PPE 10: In section 16.2 later gleaning is used as a solution.  Changes in the gleaned info could be an interesting way to update the cache fast …however this text make it sound that this is not an option after first packet.
>>
>>     It is an option when the ETR has no mapping to return packets.
>>     Once a mapping is cache, there is no point to glean since the
>>     mapping system verified the information the same as in the map-cache.
>>
>>     >
>>     > Page 25
>>     > "Note that trusting ICMP messages may  not be desirable, but neither is ignoring them completely. Implementations are encouraged to follow current best practices in treating these conditions."
>>     >
>>     > PPE 11: A reference would be useful if possible.
>>
>>     Added draft-ietf-opsec-icmp-filtering.
>>
>>     > Page 25
>>     > "An ITR that participates in the global routing system can determine that an RLOC is down if no BGP Routing Information Base (RIB) route exists that matches the RLOC IP address."
>>     >
>>     > PPE 12: Isn't this true for any protocol entry not just a BGP entry? We are really trying to determine if there is no route whatever the protocol.
>>
>>     Yes, we can generalize this. I changed text.
>>
>>     > Page 38
>>     > "For a more detailed networkd design deployment recommendation, refer to [RFC7215]."
>>     >
>>     > PPE 13: Nit typo "netword"-> “network"
>>
>>     Changed.
>>
>>     > Page 40
>>     > "By having the PE be the first router on the path to encapsulate, it can choose a TE path first, and the ETR can decapsulate and Re-Encapsulate for a new encapsuluation path to the destination end site."
>>     >
>>     > PPE 14: Nit Typo "encapsuluation" -> “encapsulation"
>>
>>     Changed.
>>
>>     > Page 43
>>     > "If the attacker spoofs the source RLOC, it can mount a DoS attack by redirecting traffic to the spoofed victim;s RLOC, potentially overloading it."
>>     >
>>
>>     > PPE 15: Nit  typo "victim;s" -> “victim’s”
>>
>>     Changed.
>>
>>     Dino
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
> 
> 
> _______________________________________________
> lisp mailing list
> lisp@ietf.org
> https://www.ietf.org/mailman/listinfo/lisp
>