Re: [magma] Comments draft-ietf-magma-snoop-11.txt (SSM)
Isidor Kouvelas <kouvelas@cisco.com> Mon, 17 May 2004 22:01 UTC
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA06328 for <magma-archive@ietf.org>; Mon, 17 May 2004 18:01:28 -0400 (EDT)
Received: from ietf-mx.ietf.org ([132.151.6.1] helo=ietf-mx) by ietf-mx with esmtp (Exim 4.32) id 1BPqAr-0004Bl-1a for magma-archive@ietf.org; Mon, 17 May 2004 18:01:29 -0400
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1BPq9D-0003Uc-00 for magma-archive@ietf.org; Mon, 17 May 2004 17:59:49 -0400
Received: from optimus.ietf.org ([132.151.1.19]) by ietf-mx with esmtp (Exim 4.12) id 1BPq6w-0002Yh-00; Mon, 17 May 2004 17:57:26 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1BPptk-00023S-HP; Mon, 17 May 2004 17:43:48 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1BPpf1-0000G3-MS for magma@optimus.ietf.org; Mon, 17 May 2004 17:28:35 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA01241 for <magma@ietf.org>; Mon, 17 May 2004 17:28:32 -0400 (EDT)
Received: from ietf-mx.ietf.org ([132.151.6.1] helo=ietf-mx) by ietf-mx with esmtp (Exim 4.32) id 1BPpez-0001ue-DX for magma@ietf.org; Mon, 17 May 2004 17:28:33 -0400
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1BPpbU-0000vo-00 for magma@ietf.org; Mon, 17 May 2004 17:24:58 -0400
Received: from sj-iport-3-in.cisco.com ([171.71.176.72] helo=sj-iport-3.cisco.com) by ietf-mx with esmtp (Exim 4.12) id 1BPpWH-0007Ho-00 for magma@ietf.org; Mon, 17 May 2004 17:19:33 -0400
Received: from sj-core-2.cisco.com (171.71.177.254) by sj-iport-3.cisco.com with ESMTP; 17 May 2004 13:26:10 +0000
Received: from cypher.cisco.com (cypher.cisco.com [171.69.11.143]) by sj-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id i4HLJ1Su012401; Mon, 17 May 2004 14:19:02 -0700 (PDT)
Received: from localhost (kouvelas@localhost) by cypher.cisco.com (8.8.8/2.6/Cisco List Logging/8.8.8) with ESMTP id OAA02978; Mon, 17 May 2004 14:19:01 -0700 (PDT)
Message-Id: <200405172119.OAA02978@cypher.cisco.com>
To: Isidor Kouvelas <kouvelas@cisco.com>
cc: magma@ietf.org
Subject: Re: [magma] Comments draft-ietf-magma-snoop-11.txt (SSM)
In-reply-to: Your message of "Mon, 17 May 2004 12:52:31 PDT." <200405171952.MAA12458@cypher.cisco.com>
Date: Mon, 17 May 2004 14:19:01 -0700
From: Isidor Kouvelas <kouvelas@cisco.com>
Sender: magma-admin@ietf.org
Errors-To: magma-admin@ietf.org
X-BeenThere: magma@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/magma>, <mailto:magma-request@ietf.org?subject=unsubscribe>
List-Id: Multicast and Anycast Group Membership <magma.ietf.org>
List-Post: <mailto:magma@ietf.org>
List-Help: <mailto:magma-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/magma>, <mailto:magma-request@ietf.org?subject=subscribe>
X-Spam-Checker-Version: SpamAssassin 2.60 (1.212-2003-09-23-exp) on ietf-mx.ietf.org
X-Spam-Status: No, hits=0.0 required=5.0 tests=none autolearn=no version=2.60
I am very sorry for the last public message. It was meant to be a private message to Toerless. Isidor Isidor Kouvelas writes: > >Excuse me but were you hybernating during the last call etc for this >draft? This is currently in the RFC editor queue! > >Isidor > >Toerless Eckert writes: >>I would hereby like to express my opinion that subject draft MUST >>mentioned SSM explicitly (and provide appropriate detail) before >>progressing any further. Without mentioning ASM and SSM service model support >>explicitly, we will solely get yet another document that will not >>support SSM sufficiently anmore and given that SSM is recognized by >>mboned to be the one service model the IETF should focus further >>work on, it is unacceptable to over and over get the excuse of >>"oh well, the SSM support side can be done later in a different document". >> >>[ Cc'ed ssm and mboned working groups to alert them about this lack >> of right focus of that draft. Please keep replies to the >> Reply-To: magma@ietf.org, to avoid flooding three mailing lists with this. >] >> >>Specifically this is what i think is needed: >> >> SSM can be used in varying IPv4 address ranges, a decision as to limit >> it to specific address ranges (like only the default 232.0.0.0/8 ) has >> not been made (i would also oppose that). IGMP snooping switches on >> the other hand should be zero-config simply deployable devices that >> do not necessarily need to be configured to know L3 specifics like >> an SSM range. >> >> For this reason i would recommend that a default mode of operations >> of IGMPv3 switches is mandated which provides for SM-safe-reporting, >> meaning that receiver systems expecting to use SSM will not be impacted by >> (erroneous) receiver systems using ASM style membership reports on >> any addresses. >> >> Problem: >> Reporter 1 on port 1 sending an INCLUDE({S},G) IGMPv3 report, reporter >> 2 on port 2 sending an EXCLUDE({},G) IGMPv3 report. IGMP snooping >> switch builds aggregate state for G to report to upstream router(s). >> This aggregate state is (according to IGMPv3 specs) EXCLUDE({},G). >> If only this is reported, reporter 1 SSM application will fail because >> the router never receives any INCLUDE({S},G) reports. >> >> Solution: >> Define SSM-safe-reporting to be a condition for an IGMP snooping switch >> in which it ensures that all include({S},G) membership state will >> be reported correctly to router ports irrespective of exclude({..},G) >> reports. >> >> There are lots of alternatives on how a switch can do this, the >> most simple one is to pass on _all_ membership reports from >> hosts without suppressing any of them on ports connected to routers. >> That way in above example both the INCLUDE and EXCLUDE mode report >> would be seen by the router and if G is SSM, the router can correctly >> ignore the EXCLUDE mode report. >> >> There are alternatives on how to do SSM-safe-reporting which are >> more complex but provide more membership report suppression/aggregation >> towards router ports, but i think details of those should be left >> up for individual implementations. >> >> I would simply mandate that the default operations of an IGMP snooping >> switch must provide for SSM-safe-reporting without explicit manual >> configuration of the SSM range and without expecting SSM to be only >> operated on a well known SSM-range (IPv4). >> >> Obviously, this is only a problem for IPv4, as in IPv6 the SSM-range >> is well defined, MLD-snooping routers can thus rely on that >> range definition. >> >> And yes, i understand that this is only an informational document, but >> that's all we have. Hugh also does not mentiones snooping in >> draft-holbrook-idmr-igmpv3-ssm-06.txt. >> >>Thanks >> Toerless >> >>_______________________________________________ >>magma mailing list >>magma@ietf.org >>https://www1.ietf.org/mailman/listinfo/magma >> > >_______________________________________________ >magma mailing list >magma@ietf.org >https://www1.ietf.org/mailman/listinfo/magma > _______________________________________________ magma mailing list magma@ietf.org https://www1.ietf.org/mailman/listinfo/magma
- [magma] Comments draft-ietf-magma-snoop-11.txt (S… Toerless Eckert
- Re: [magma] Comments draft-ietf-magma-snoop-11.tx… Isidor Kouvelas
- Re: [magma] Comments draft-ietf-magma-snoop-11.tx… Isidor Kouvelas
- Re: [magma] Comments draft-ietf-magma-snoop-11.tx… Pekka Savola
- Re: [magma] Comments draft-ietf-magma-snoop-11.tx… Toerless Eckert
- RE: [magma] Comments draft-ietf-magma-snoop-11.tx… Manfredi, Albert E