Re: [magma] Comments draft-ietf-magma-snoop-11.txt (SSM)

Isidor Kouvelas <kouvelas@cisco.com> Mon, 17 May 2004 22:01 UTC

Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA06328 for <magma-archive@ietf.org>; Mon, 17 May 2004 18:01:28 -0400 (EDT)
Received: from ietf-mx.ietf.org ([132.151.6.1] helo=ietf-mx) by ietf-mx with esmtp (Exim 4.32) id 1BPqAr-0004Bl-1a for magma-archive@ietf.org; Mon, 17 May 2004 18:01:29 -0400
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1BPq9D-0003Uc-00 for magma-archive@ietf.org; Mon, 17 May 2004 17:59:49 -0400
Received: from optimus.ietf.org ([132.151.1.19]) by ietf-mx with esmtp (Exim 4.12) id 1BPq6w-0002Yh-00; Mon, 17 May 2004 17:57:26 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1BPptk-00023S-HP; Mon, 17 May 2004 17:43:48 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1BPpf1-0000G3-MS for magma@optimus.ietf.org; Mon, 17 May 2004 17:28:35 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA01241 for <magma@ietf.org>; Mon, 17 May 2004 17:28:32 -0400 (EDT)
Received: from ietf-mx.ietf.org ([132.151.6.1] helo=ietf-mx) by ietf-mx with esmtp (Exim 4.32) id 1BPpez-0001ue-DX for magma@ietf.org; Mon, 17 May 2004 17:28:33 -0400
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1BPpbU-0000vo-00 for magma@ietf.org; Mon, 17 May 2004 17:24:58 -0400
Received: from sj-iport-3-in.cisco.com ([171.71.176.72] helo=sj-iport-3.cisco.com) by ietf-mx with esmtp (Exim 4.12) id 1BPpWH-0007Ho-00 for magma@ietf.org; Mon, 17 May 2004 17:19:33 -0400
Received: from sj-core-2.cisco.com (171.71.177.254) by sj-iport-3.cisco.com with ESMTP; 17 May 2004 13:26:10 +0000
Received: from cypher.cisco.com (cypher.cisco.com [171.69.11.143]) by sj-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id i4HLJ1Su012401; Mon, 17 May 2004 14:19:02 -0700 (PDT)
Received: from localhost (kouvelas@localhost) by cypher.cisco.com (8.8.8/2.6/Cisco List Logging/8.8.8) with ESMTP id OAA02978; Mon, 17 May 2004 14:19:01 -0700 (PDT)
Message-Id: <200405172119.OAA02978@cypher.cisco.com>
To: Isidor Kouvelas <kouvelas@cisco.com>
cc: magma@ietf.org
Subject: Re: [magma] Comments draft-ietf-magma-snoop-11.txt (SSM)
In-reply-to: Your message of "Mon, 17 May 2004 12:52:31 PDT." <200405171952.MAA12458@cypher.cisco.com>
Date: Mon, 17 May 2004 14:19:01 -0700
From: Isidor Kouvelas <kouvelas@cisco.com>
Sender: magma-admin@ietf.org
Errors-To: magma-admin@ietf.org
X-BeenThere: magma@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/magma>, <mailto:magma-request@ietf.org?subject=unsubscribe>
List-Id: Multicast and Anycast Group Membership <magma.ietf.org>
List-Post: <mailto:magma@ietf.org>
List-Help: <mailto:magma-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/magma>, <mailto:magma-request@ietf.org?subject=subscribe>
X-Spam-Checker-Version: SpamAssassin 2.60 (1.212-2003-09-23-exp) on ietf-mx.ietf.org
X-Spam-Status: No, hits=0.0 required=5.0 tests=none autolearn=no version=2.60

I am very sorry for the last public message. It was meant to be a
private message to Toerless.

Isidor

Isidor Kouvelas writes:
>
>Excuse me but were you hybernating during the last call etc for this
>draft? This is currently in the RFC editor queue!
>
>Isidor
>
>Toerless Eckert writes:
>>I would hereby like to express my opinion that subject draft MUST
>>mentioned SSM explicitly (and provide appropriate detail) before
>>progressing any further. Without mentioning ASM and SSM service model support
>>explicitly, we will solely get yet another document that will not
>>support SSM sufficiently anmore and given that SSM is recognized by
>>mboned to be the one service model the IETF should focus further
>>work on, it is unacceptable to over and over get the excuse of
>>"oh well, the SSM support side can be done later in a different document".
>>
>>[ Cc'ed ssm and mboned working groups to alert them about this lack
>>  of right focus of that draft. Please keep replies to the 
>>  Reply-To: magma@ietf.org, to avoid flooding three mailing lists with this. 
>]
>>
>>Specifically this is what i think is needed:
>>
>>  SSM can be used in varying IPv4 address ranges, a decision as to limit
>>  it to specific address ranges (like only the default 232.0.0.0/8 ) has
>>  not been made (i would also oppose that). IGMP snooping switches on
>>  the other hand should be zero-config simply deployable devices that
>>  do not necessarily need to be configured to know L3 specifics like
>>  an SSM range.
>>
>>  For this reason i would recommend that a default mode of operations
>>  of IGMPv3 switches is mandated which provides for SM-safe-reporting, 
>>  meaning that receiver systems expecting to use SSM will not be impacted by
>>  (erroneous) receiver systems using ASM style membership reports on
>>  any addresses.
>>
>>  Problem:
>>    Reporter 1 on port 1 sending an INCLUDE({S},G) IGMPv3 report, reporter
>>    2 on port 2 sending an EXCLUDE({},G) IGMPv3 report. IGMP snooping
>>    switch builds aggregate state for G to report to upstream router(s).
>>    This aggregate state is (according to IGMPv3 specs) EXCLUDE({},G).
>>    If only this is reported, reporter 1 SSM application will fail because
>>    the router never receives any INCLUDE({S},G) reports.
>>  
>>  Solution:
>>    Define SSM-safe-reporting to be a condition for an IGMP snooping switch
>>    in which it ensures that all include({S},G) membership state will
>>    be reported correctly to router ports irrespective of exclude({..},G)
>>    reports.
>>
>>    There are lots of alternatives on how a switch can do this, the
>>    most simple one is to pass on _all_ membership reports from
>>    hosts without suppressing any of them on ports connected to routers.
>>    That way in above example both the INCLUDE and EXCLUDE mode report
>>    would be seen by the router and if G is SSM, the router can correctly
>>    ignore the EXCLUDE mode report. 
>>
>>    There are alternatives on how to do SSM-safe-reporting which are
>>    more complex but provide more membership report suppression/aggregation
>>    towards router ports, but i think details of those should be left
>>    up for individual implementations.
>>    
>>    I would simply mandate that the default operations of an IGMP snooping
>>    switch must provide for SSM-safe-reporting without explicit manual
>>    configuration of the SSM range and without expecting SSM to be only
>>    operated on a well known SSM-range (IPv4).
>>
>>  Obviously, this is only a problem for IPv4, as in IPv6 the SSM-range
>>  is well defined, MLD-snooping routers can thus rely on that
>>  range definition.
>>
>>  And yes, i understand that this is only an informational document, but
>>  that's all we have. Hugh also does not mentiones snooping in
>>  draft-holbrook-idmr-igmpv3-ssm-06.txt.
>>
>>Thanks
>>	Toerless
>>
>>_______________________________________________
>>magma mailing list
>>magma@ietf.org
>>https://www1.ietf.org/mailman/listinfo/magma
>>
>
>_______________________________________________
>magma mailing list
>magma@ietf.org
>https://www1.ietf.org/mailman/listinfo/magma
>

_______________________________________________
magma mailing list
magma@ietf.org
https://www1.ietf.org/mailman/listinfo/magma