Re: [Lsvr] Initiating LSVR re-chartering discussion - draft#1 proposal

Randy Bush <randy@psg.com> Thu, 07 December 2023 19:53 UTC

Return-Path: <randy@psg.com>
X-Original-To: lsvr@ietfa.amsl.com
Delivered-To: lsvr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7880C14CF05 for <lsvr@ietfa.amsl.com>; Thu, 7 Dec 2023 11:53:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.909
X-Spam-Level:
X-Spam-Status: No, score=-6.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R-Dkg_t1cj9M for <lsvr@ietfa.amsl.com>; Thu, 7 Dec 2023 11:53:29 -0800 (PST)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:8006::18]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2243EC14F60A for <lsvr@ietf.org>; Thu, 7 Dec 2023 11:53:29 -0800 (PST)
Received: from localhost ([127.0.0.1] helo=ryuu.rg.net) by ran.psg.com with esmtp (Exim 4.93) (envelope-from <randy@psg.com>) id 1rBKR5-000tDM-Jx; Thu, 07 Dec 2023 19:53:27 +0000
Date: Thu, 07 Dec 2023 11:53:27 -0800
Message-ID: <m2r0jxoklk.wl-randy@psg.com>
From: Randy Bush <randy@psg.com>
To: Paul Congdon <paul.congdon@outlook.com>
Cc: "lsvr@ietf.org" <lsvr@ietf.org>
In-Reply-To: <BY3PR06MB80529998FDB03A1DED3FDF949A84A@BY3PR06MB8052.namprd06.prod.outlook.com>
References: <AS1PR07MB85897E82BA2DFFEDFB7C08FBE085A@AS1PR07MB8589.eurprd07.prod.outlook.com> <CA+RyBmVAgM7d2eN3S2+mnw1vzkMKm4VoVEuyMmLXExVY4kiYGQ@mail.gmail.com> <AS1PR07MB85891B2E18F6A9F826247C10E084A@AS1PR07MB8589.eurprd07.prod.outlook.com> <BY3PR06MB80525FC7A1751CCD26126C619A84A@BY3PR06MB8052.namprd06.prod.outlook.com> <m2msunqd4s.wl-randy@psg.com> <BY3PR06MB80529998FDB03A1DED3FDF949A84A@BY3PR06MB8052.namprd06.prod.outlook.com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/27.2 Mule/6.0
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsvr/1uACaRhuXYKwCjPSaBGCiyIEn7U>
Subject: Re: [Lsvr] Initiating LSVR re-chartering discussion - draft#1 proposal
X-BeenThere: lsvr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Vector Routing <lsvr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsvr>, <mailto:lsvr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsvr/>
List-Post: <mailto:lsvr@ietf.org>
List-Help: <mailto:lsvr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsvr>, <mailto:lsvr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Dec 2023 19:53:33 -0000

hey paul,

>>> Back in 2021, IEEE 802.1 enhanced LLDP to support the discovery
>>> requirements of LSVR.
>> uh, did lldpv2 get through the ieee sausage machine yet?  i think we
>> had a race to see which machine could take the longest :)
> The first draft was September 2020.  Technical changes were completed
> in September of 2021 and it was published in April of 2022.  I think
> IEEE 802.1 won that race šŸ˜‰

read again.  the race was to see which org could take the *longest*.  so
the ietf has won!  but the contest was not really fair.  we practiced;
it took the ietf eight years to change the constant 4,096 to 65,535 (see
RFC 8654).  :)

>> as i remember, there were two problems with using lldpv2 in this
>> space which l3dl addresses, security and serious scale.  has lldpv2
>> managed to move forward on these?  truth is, it has all been so long,
>> i did not keep my eyes on the ball.
> 
> LLDP itself does not have any inherent security features and that was
> never part of its scope. It would be expected to run ontop of MACSec
> or people could security their own TLVs using other approaches.

to me, this is a show-stopper.  this is like the ietf in the old days
"no this is not secure.  run it over ipsec."  it's not the 1990s any
more; though i sure wish it was.

one of the lessons we have learned over the years is that a protocol
designed for the LAN will be deployed on the WAN, and vice versa.  heck,
this WG is hacking BGP for the LAN :)  security is pretty much required
these days.

> I'm not sure what you mean by serious scale issues.

think of a pod with 20 or whatever racks, 40 servers each, and a jillion
micro-services on each server.  and they want service mobility.  observe
the serious scale of l3dl.  and, with l3dl, there are some *simple* and
*efficient* ways to achieve this.

randy