Re: [Lsr] [Technical Errata Reported] RFC5838 (7644)

Acee Lindem <acee.ietf@gmail.com> Thu, 11 January 2024 19:37 UTC

Return-Path: <acee.ietf@gmail.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57D11C14F6E3 for <lsr@ietfa.amsl.com>; Thu, 11 Jan 2024 11:37:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zb_nWB2KE0M7 for <lsr@ietfa.amsl.com>; Thu, 11 Jan 2024 11:37:47 -0800 (PST)
Received: from mail-qv1-xf32.google.com (mail-qv1-xf32.google.com [IPv6:2607:f8b0:4864:20::f32]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 74CC3C14F600 for <lsr@ietf.org>; Thu, 11 Jan 2024 11:37:47 -0800 (PST)
Received: by mail-qv1-xf32.google.com with SMTP id 6a1803df08f44-6810751e1fdso24105526d6.2 for <lsr@ietf.org>; Thu, 11 Jan 2024 11:37:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1705001866; x=1705606666; darn=ietf.org; h=to:references:message-id:content-transfer-encoding:cc:date :in-reply-to:from:subject:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=spmd0LJYuN2gLP7pHW7j+wTRIIaVQH4YnpQrKmN2Gbs=; b=iAadi5TgoVFFJUU/PMmZ9U2Xs3wpM9GK8StB1brkQGxNda5SAIEmTNUz8d/AnkpgBw mC2fBnB3WzLAcuOVFLHjy1lk8v7T+AxWP094S8uZat/2rjkzTjHqzEYe2wEsV2z1hv8a eFfWxTZR7Xje2uO31e74pVhvHkJhvRRXY30s68hDwW6wbQRWwiaaYH4a/xy6RVP/qeoh s96pypvYbvweWyn8S0LtgFn1ND+7201aFHdZKfHntF0//C/Y7UHzvTObUK4Jv6MvxgwQ lA7smFGB4FfOHBstozsiQqLY/91ees9VTMIj/IjyRrAicaUtdAo1S1WBUileugkZcNmQ 1jEg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1705001866; x=1705606666; h=to:references:message-id:content-transfer-encoding:cc:date :in-reply-to:from:subject:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=spmd0LJYuN2gLP7pHW7j+wTRIIaVQH4YnpQrKmN2Gbs=; b=Vh9u7vbOsFEK+V2fPCsya1pr5cceUg0Iw52M/6eNJJWtVs+Vo2HWBIKqIRvLOIfrlp uyVsGI4JkhZkek6u+ILyAdqAahqMQMA9aTvTSBTvbYXGelmc+a9zSaGrNvTsf7RuS20X cd4ssRXcrr1/aX8X8kDyK4+FTBSmQGKuxlQ+HIZSePs8TW0abhxbPla6DfSeKlov9P4h 1Kt4k91Rtdamy+C0Y/sYJwML2Z8QZ536QhtsQo6lc7oj0pTpO2pjjIjk0AKqEt+Htm/A EEUUTxxVHhPa9Be+P2Pcs9Lb9pUg/+s/K9JKsSN4DPddNlqqvQajuIFruc4aBi4ZcjY/ TdiA==
X-Gm-Message-State: AOJu0YwML5DrIUYd7t6FNDHF7U8U2HIBh5hM/e2Pi7kS7mxusnvm+bY/ uUq7FBXCLajCgiMQrjWQWiI=
X-Google-Smtp-Source: AGHT+IHpx3SiniQ/O/Nl9HKmzrZwRcblDlGAmnOo0Ym68Lp8n5Uqm5cBPt71AgiTBRArj142ASNS/Q==
X-Received: by 2002:a05:6214:2b0f:b0:680:a521:c57 with SMTP id jx15-20020a0562142b0f00b00680a5210c57mr192376qvb.52.1705001866500; Thu, 11 Jan 2024 11:37:46 -0800 (PST)
Received: from smtpclient.apple ([136.54.28.118]) by smtp.gmail.com with ESMTPSA id y10-20020a0ce80a000000b00680b34d52f8sm509828qvn.13.2024.01.11.11.37.45 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 11 Jan 2024 11:37:46 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.300.61.1.2\))
From: Acee Lindem <acee.ietf@gmail.com>
In-Reply-To: <E1253638-A740-4854-B0EB-1FD10ACE423B@juniper.net>
Date: Thu, 11 Jan 2024 14:37:35 -0500
Cc: RFC Errata System <rfc-editor@rfc-editor.org>, "acee.lindem@ericsson.com" <acee.lindem@ericsson.com>, "smirtora@cisco.com" <smirtora@cisco.com>, "akr@cisco.com" <akr@cisco.com>, "mjbarnes@cisco.com" <mjbarnes@cisco.com>, "rahul@juniper.net" <rahul@juniper.net>, Alvaro Retana <aretana.ietf@gmail.com>, Andrew Alston - IETF <andrew-ietf@liquid.tech>, "acee@cisco.com" <acee@cisco.com>, Owen DeLong <owen@delong.com>, lsr <lsr@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <EE5840C1-2B33-42EB-BB48-D4634A2EC077@gmail.com>
References: <20230917195809.395BC7FDC1@rfcpa.amsl.com> <B42F42AB-7440-48B4-A57D-0BCA57543609@gmail.com> <D13281C1-2BA3-43B8-B3B7-17DCE1F1AAD7@juniper.net> <E1253638-A740-4854-B0EB-1FD10ACE423B@juniper.net>
To: John Scudder <jgs@juniper.net>
X-Mailer: Apple Mail (2.3774.300.61.1.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/wXdOtU9H2vIoA1xs10xZ4oh8bwU>
Subject: Re: [Lsr] [Technical Errata Reported] RFC5838 (7644)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jan 2024 19:37:51 -0000

Hi John, 

I now recall this discussion. In the context of OSPFv3, an OSPFv3 adjacency over a tunnel should NOT be misconstrued as an OSPFv3 virtual link and the Errata is invalid. 

Thanks,
Acee

> On Jan 11, 2024, at 14:30, John Scudder <jgs@juniper.net> wrote:
> 
> Quickly reversing myself, and to quote my other reply just now: "Actually, upon reviewing this one, I'm leaning back toward simply rejecting both this erratum and erratum 7644. As we discussed earlier in the thread on this one, the best fix (assuming the working group agrees is a fix is merited, of course) is a draft to update or replace the base spec.”
> 
> In short, “never mind!”
> 
> —John
> 
>> On Jan 11, 2024, at 2:24 PM, John Scudder <jgs@juniper.net> wrote:
>> 
>> Hi Acee, WG,
>> 
>> I'm convinced this doesn't meet the criteria to be verified as a technical erratum. I am considering verifying it as "Hold for Document Update”, though. The definition for HFDU is "The erratum is not a necessary update to the RFC. However, any future update of the document might consider this erratum, and determine whether it is correct and merits including in the update.” [1]
>> 
>> Please let me know soon if you have any concerns about that disposition.
>> 
>> --John
>> 
>> [1] https://www.ietf.org/about/groups/iesg/statements/processing-rfc-errata/
>> 
>> 
>>> On Sep 17, 2023, at 6:25 PM, Acee Lindem <acee.ietf@gmail.com> wrote:
>>> 
>>> Given that the context of the “Interface MTU” is specifically the “interface MTU” field in OSPFv3 Database Description packets and OSPF virtual links (RFC 2328), the additions recommended in this Errata are unnecessary. The Errata should be rejected.
>>> 
>>> Thanks,
>>> Acee
>>>> On Sep 17, 2023, at 15:58, RFC Errata System <rfc-editor@rfc-editor.org> wrote:
>>>> 
>>>> The following errata report has been submitted for RFC5838,
>>>> "Support of Address Families in OSPFv3".
>>>> 
>>>> --------------------------------------
>>>> You may review the report below and at:
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/errata/eid7644__;!!NEt6yMaO-gk!EqM7dBCk2SJzfxt702pp2Pbbk_Bes0OWPmR7eRHvIT3bmb7J2x7frRsHKbUzctMtiDBrCxmW7pFbpMU$
>>>> 
>>>> --------------------------------------
>>>> Type: Technical
>>>> Reported by: Owen DeLong <owen@delong.com>
>>>> 
>>>> Section: 2.7
>>>> 
>>>> Original Text
>>>> -------------
>>>> Interface MTU
>>>>   The size in octets of the largest address family specific datagram
>>>>   that can be sent on the associated interface without
>>>>   fragmentation.  The MTUs of common Internet link types can be
>>>>   found in Table 7-1 of [MTUDISC].  The Interface MTU SHOULD be set
>>>>   to 0 in Database Description packets sent over virtual links.
>>>> 
>>>> 
>>>> Corrected Text
>>>> --------------
>>>> Interface MTU
>>>>   The size in octets of the largest address family specific datagram
>>>>   that can be sent on the associated interface without
>>>>   fragmentation.  The MTUs of common Internet link types can be
>>>>   found in Table 7-1 of [MTUDISC].  The Interface MTU SHOULD be set
>>>>   to 0 in Database Description packets sent over (OSPF3) virtual links.
>>>>   This recommendation MUST NOT be applied to tunnel and other virtual
>>>>   or software interfaces which carry traffic other than OSPF protocol packets.
>>>> 
>>>> Notes
>>>> -----
>>>> Currently, the language is ambiguous and at least one vendor has implemented OSPF3 sending an MTU of zero on GRE interfaces (and possibly others such as IPIP, IPSEC, etc., as I have not tested these). I believe that the intent of the RFC is to refer strictly to OSPF virtual-links which carry only OSPF protocol data and therefore have no meaningful MTU. When this is mistakenly applied to other forms of "virtual" interfaces such as tunnels, the results can be quite harmful.
>>>> 
>>>> As such, I think that clarification is in order, since the vendor in question is unrepentant and claims their current implementation to be compliant with the RFC.
>>>> 
>>>> Instructions:
>>>> -------------
>>>> This erratum is currently posted as "Reported". If necessary, please
>>>> use "Reply All" to discuss whether it should be verified or
>>>> rejected. When a decision is reached, the verifying party
>>>> can log in to change the status and edit the report, if necessary.
>>>> 
>>>> --------------------------------------
>>>> RFC5838 (draft-ietf-ospf-af-alt-10)
>>>> --------------------------------------
>>>> Title               : Support of Address Families in OSPFv3
>>>> Publication Date    : April 2010
>>>> Author(s)           : A. Lindem, Ed., S. Mirtorabi, A. Roy, M. Barnes, R. Aggarwal
>>>> Category            : PROPOSED STANDARD
>>>> Source              : Open Shortest Path First IGP
>>>> Area                : Routing
>>>> Stream              : IETF
>>>> Verifying Party     : IESG
>>>> 
>>>> _______________________________________________
>>>> Lsr mailing list
>>>> Lsr@ietf.org
>>>> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/lsr__;!!NEt6yMaO-gk!EqM7dBCk2SJzfxt702pp2Pbbk_Bes0OWPmR7eRHvIT3bmb7J2x7frRsHKbUzctMtiDBrCxmWKATRhUo$
>> 
>