Re: [magma] Comments draft-ietf-magma-snoop-11.txt (SSM)

Isidor Kouvelas <kouvelas@cisco.com> Mon, 17 May 2004 21:27 UTC

Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA00994 for <magma-archive@ietf.org>; Mon, 17 May 2004 17:27:11 -0400 (EDT)
Received: from ietf-mx.ietf.org ([132.151.6.1] helo=ietf-mx) by ietf-mx with esmtp (Exim 4.32) id 1BPpdg-0001Yb-Be for magma-archive@ietf.org; Mon, 17 May 2004 17:27:12 -0400
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1BPpZq-0000P5-00 for magma-archive@ietf.org; Mon, 17 May 2004 17:23:14 -0400
Received: from [65.246.255.50] (helo=mx2.foretec.com) by ietf-mx with esmtp (Exim 4.12) id 1BPpUh-00075d-00; Mon, 17 May 2004 17:17:55 -0400
Received: from optimus22.ietf.org ([132.151.6.22] helo=optimus.ietf.org) by mx2.foretec.com with esmtp (Exim 4.24) id 1BPpUi-0002nh-Cc; Mon, 17 May 2004 17:17:56 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1BPos7-0002pc-PT; Mon, 17 May 2004 16:38:03 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1BPoCq-0002Ed-CA for magma@optimus.ietf.org; Mon, 17 May 2004 15:55:24 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA20234 for <magma@ietf.org>; Mon, 17 May 2004 15:55:22 -0400 (EDT)
Received: from ietf-mx.ietf.org ([132.151.6.1] helo=ietf-mx) by ietf-mx with esmtp (Exim 4.32) id 1BPoCo-0002Wx-UY for magma@ietf.org; Mon, 17 May 2004 15:55:22 -0400
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1BPoBk-00027H-00 for magma@ietf.org; Mon, 17 May 2004 15:54:16 -0400
Received: from sj-iport-2-in.cisco.com ([171.71.176.71] helo=sj-iport-2.cisco.com) by ietf-mx with esmtp (Exim 4.12) id 1BPoAd-0001Mu-00 for magma@ietf.org; Mon, 17 May 2004 15:53:08 -0400
Received: from sj-core-1.cisco.com (171.71.177.237) by sj-iport-2.cisco.com with ESMTP; 17 May 2004 11:58:05 +0000
Received: from cypher.cisco.com (cypher.cisco.com [171.69.11.143]) by sj-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id i4HJqWC1022475 for <magma@ietf.org>; Mon, 17 May 2004 12:52:36 -0700 (PDT)
Received: from localhost (kouvelas@localhost) by cypher.cisco.com (8.8.8/2.6/Cisco List Logging/8.8.8) with ESMTP id MAA12458 for <magma@ietf.org>; Mon, 17 May 2004 12:52:31 -0700 (PDT)
Message-Id: <200405171952.MAA12458@cypher.cisco.com>
To: magma@ietf.org
Subject: Re: [magma] Comments draft-ietf-magma-snoop-11.txt (SSM)
In-reply-to: Your message of "Mon, 17 May 2004 10:32:05 PDT." <20040517173205.GQ305@cisco.com>
Date: Mon, 17 May 2004 12:52:31 -0700
From: Isidor Kouvelas <kouvelas@cisco.com>
Sender: magma-admin@ietf.org
Errors-To: magma-admin@ietf.org
X-BeenThere: magma@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/magma>, <mailto:magma-request@ietf.org?subject=unsubscribe>
List-Id: Multicast and Anycast Group Membership <magma.ietf.org>
List-Post: <mailto:magma@ietf.org>
List-Help: <mailto:magma-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/magma>, <mailto:magma-request@ietf.org?subject=subscribe>
X-Spam-Checker-Version: SpamAssassin 2.60 (1.212-2003-09-23-exp) on ietf-mx.ietf.org
X-Spam-Status: No, hits=0.0 required=5.0 tests=none autolearn=no version=2.60

Excuse me but were you hybernating during the last call etc for this
draft? This is currently in the RFC editor queue!

Isidor

Toerless Eckert writes:
>I would hereby like to express my opinion that subject draft MUST
>mentioned SSM explicitly (and provide appropriate detail) before
>progressing any further. Without mentioning ASM and SSM service model support
>explicitly, we will solely get yet another document that will not
>support SSM sufficiently anmore and given that SSM is recognized by
>mboned to be the one service model the IETF should focus further
>work on, it is unacceptable to over and over get the excuse of
>"oh well, the SSM support side can be done later in a different document".
>
>[ Cc'ed ssm and mboned working groups to alert them about this lack
>  of right focus of that draft. Please keep replies to the 
>  Reply-To: magma@ietf.org, to avoid flooding three mailing lists with this. ]
>
>Specifically this is what i think is needed:
>
>  SSM can be used in varying IPv4 address ranges, a decision as to limit
>  it to specific address ranges (like only the default 232.0.0.0/8 ) has
>  not been made (i would also oppose that). IGMP snooping switches on
>  the other hand should be zero-config simply deployable devices that
>  do not necessarily need to be configured to know L3 specifics like
>  an SSM range.
>
>  For this reason i would recommend that a default mode of operations
>  of IGMPv3 switches is mandated which provides for SM-safe-reporting, 
>  meaning that receiver systems expecting to use SSM will not be impacted by
>  (erroneous) receiver systems using ASM style membership reports on
>  any addresses.
>
>  Problem:
>    Reporter 1 on port 1 sending an INCLUDE({S},G) IGMPv3 report, reporter
>    2 on port 2 sending an EXCLUDE({},G) IGMPv3 report. IGMP snooping
>    switch builds aggregate state for G to report to upstream router(s).
>    This aggregate state is (according to IGMPv3 specs) EXCLUDE({},G).
>    If only this is reported, reporter 1 SSM application will fail because
>    the router never receives any INCLUDE({S},G) reports.
>  
>  Solution:
>    Define SSM-safe-reporting to be a condition for an IGMP snooping switch
>    in which it ensures that all include({S},G) membership state will
>    be reported correctly to router ports irrespective of exclude({..},G)
>    reports.
>
>    There are lots of alternatives on how a switch can do this, the
>    most simple one is to pass on _all_ membership reports from
>    hosts without suppressing any of them on ports connected to routers.
>    That way in above example both the INCLUDE and EXCLUDE mode report
>    would be seen by the router and if G is SSM, the router can correctly
>    ignore the EXCLUDE mode report. 
>
>    There are alternatives on how to do SSM-safe-reporting which are
>    more complex but provide more membership report suppression/aggregation
>    towards router ports, but i think details of those should be left
>    up for individual implementations.
>    
>    I would simply mandate that the default operations of an IGMP snooping
>    switch must provide for SSM-safe-reporting without explicit manual
>    configuration of the SSM range and without expecting SSM to be only
>    operated on a well known SSM-range (IPv4).
>
>  Obviously, this is only a problem for IPv4, as in IPv6 the SSM-range
>  is well defined, MLD-snooping routers can thus rely on that
>  range definition.
>
>  And yes, i understand that this is only an informational document, but
>  that's all we have. Hugh also does not mentiones snooping in
>  draft-holbrook-idmr-igmpv3-ssm-06.txt.
>
>Thanks
>	Toerless
>
>_______________________________________________
>magma mailing list
>magma@ietf.org
>https://www1.ietf.org/mailman/listinfo/magma
>

_______________________________________________
magma mailing list
magma@ietf.org
https://www1.ietf.org/mailman/listinfo/magma