Re: [magma] Comments draft-ietf-magma-snoop-11.txt (SSM)

Pekka Savola <pekkas@netcore.fi> Mon, 17 May 2004 22:01 UTC

Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA06407 for <magma-archive@ietf.org>; Mon, 17 May 2004 18:01:56 -0400 (EDT)
Received: from ietf-mx.ietf.org ([132.151.6.1] helo=ietf-mx) by ietf-mx with esmtp (Exim 4.32) id 1BPqBJ-0004Mn-Bq for magma-archive@ietf.org; Mon, 17 May 2004 18:01:57 -0400
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1BPq9h-0003dw-00 for magma-archive@ietf.org; Mon, 17 May 2004 18:00:18 -0400
Received: from optimus.ietf.org ([132.151.1.19]) by ietf-mx with esmtp (Exim 4.12) id 1BPq80-0002zw-00; Mon, 17 May 2004 17:58:32 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1BPpu0-00028D-OZ; Mon, 17 May 2004 17:44:04 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1BPpjU-0002Jo-LV for magma@optimus.ietf.org; Mon, 17 May 2004 17:33:12 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA01810 for <magma@ietf.org>; Mon, 17 May 2004 17:33:09 -0400 (EDT)
Received: from ietf-mx.ietf.org ([132.151.6.1] helo=ietf-mx) by ietf-mx with esmtp (Exim 4.32) id 1BPpjS-0003Jo-BE for magma@ietf.org; Mon, 17 May 2004 17:33:10 -0400
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1BPpgr-0002P5-00 for magma@ietf.org; Mon, 17 May 2004 17:30:30 -0400
Received: from netcore.fi ([193.94.160.1]) by ietf-mx with esmtp (Exim 4.12) id 1BPpeW-0001bx-00 for magma@ietf.org; Mon, 17 May 2004 17:28:05 -0400
Received: from localhost (pekkas@localhost) by netcore.fi (8.11.6/8.11.6) with ESMTP id i4HLR3K09763; Tue, 18 May 2004 00:27:03 +0300
Date: Tue, 18 May 2004 00:27:03 +0300
From: Pekka Savola <pekkas@netcore.fi>
To: Isidor Kouvelas <kouvelas@cisco.com>
cc: magma@ietf.org
Subject: Re: [magma] Comments draft-ietf-magma-snoop-11.txt (SSM)
In-Reply-To: <200405171952.MAA12458@cypher.cisco.com>
Message-ID: <Pine.LNX.4.44.0405180025420.9689-100000@netcore.fi>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Sender: magma-admin@ietf.org
Errors-To: magma-admin@ietf.org
X-BeenThere: magma@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/magma>, <mailto:magma-request@ietf.org?subject=unsubscribe>
List-Id: Multicast and Anycast Group Membership <magma.ietf.org>
List-Post: <mailto:magma@ietf.org>
List-Help: <mailto:magma-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/magma>, <mailto:magma-request@ietf.org?subject=subscribe>
X-Spam-Checker-Version: SpamAssassin 2.60 (1.212-2003-09-23-exp) on ietf-mx.ietf.org
X-Spam-Status: No, hits=0.0 required=5.0 tests=AWL autolearn=no version=2.60

On Mon, 17 May 2004, Isidor Kouvelas wrote:
> Excuse me but were you hybernating during the last call etc for this
> draft? This is currently in the RFC editor queue!

Further, I think there was considerable pushback for configured SSM 
ranges in IETF59 when we had this debate.

If folks think that's important, it should be easily to specify as a 
separate draft to the new mrdisc.  Then we'd see who would bother 
implementing it :)

> Toerless Eckert writes:
> >I would hereby like to express my opinion that subject draft MUST
> >mentioned SSM explicitly (and provide appropriate detail) before
> >progressing any further. Without mentioning ASM and SSM service model support
> >explicitly, we will solely get yet another document that will not
> >support SSM sufficiently anmore and given that SSM is recognized by
> >mboned to be the one service model the IETF should focus further
> >work on, it is unacceptable to over and over get the excuse of
> >"oh well, the SSM support side can be done later in a different document".
> >
> >[ Cc'ed ssm and mboned working groups to alert them about this lack
> >  of right focus of that draft. Please keep replies to the 
> >  Reply-To: magma@ietf.org, to avoid flooding three mailing lists with this. ]
> >
> >Specifically this is what i think is needed:
> >
> >  SSM can be used in varying IPv4 address ranges, a decision as to limit
> >  it to specific address ranges (like only the default 232.0.0.0/8 ) has
> >  not been made (i would also oppose that). IGMP snooping switches on
> >  the other hand should be zero-config simply deployable devices that
> >  do not necessarily need to be configured to know L3 specifics like
> >  an SSM range.
> >
> >  For this reason i would recommend that a default mode of operations
> >  of IGMPv3 switches is mandated which provides for SM-safe-reporting, 
> >  meaning that receiver systems expecting to use SSM will not be impacted by
> >  (erroneous) receiver systems using ASM style membership reports on
> >  any addresses.
> >
> >  Problem:
> >    Reporter 1 on port 1 sending an INCLUDE({S},G) IGMPv3 report, reporter
> >    2 on port 2 sending an EXCLUDE({},G) IGMPv3 report. IGMP snooping
> >    switch builds aggregate state for G to report to upstream router(s).
> >    This aggregate state is (according to IGMPv3 specs) EXCLUDE({},G).
> >    If only this is reported, reporter 1 SSM application will fail because
> >    the router never receives any INCLUDE({S},G) reports.
> >  
> >  Solution:
> >    Define SSM-safe-reporting to be a condition for an IGMP snooping switch
> >    in which it ensures that all include({S},G) membership state will
> >    be reported correctly to router ports irrespective of exclude({..},G)
> >    reports.
> >
> >    There are lots of alternatives on how a switch can do this, the
> >    most simple one is to pass on _all_ membership reports from
> >    hosts without suppressing any of them on ports connected to routers.
> >    That way in above example both the INCLUDE and EXCLUDE mode report
> >    would be seen by the router and if G is SSM, the router can correctly
> >    ignore the EXCLUDE mode report. 
> >
> >    There are alternatives on how to do SSM-safe-reporting which are
> >    more complex but provide more membership report suppression/aggregation
> >    towards router ports, but i think details of those should be left
> >    up for individual implementations.
> >    
> >    I would simply mandate that the default operations of an IGMP snooping
> >    switch must provide for SSM-safe-reporting without explicit manual
> >    configuration of the SSM range and without expecting SSM to be only
> >    operated on a well known SSM-range (IPv4).
> >
> >  Obviously, this is only a problem for IPv4, as in IPv6 the SSM-range
> >  is well defined, MLD-snooping routers can thus rely on that
> >  range definition.
> >
> >  And yes, i understand that this is only an informational document, but
> >  that's all we have. Hugh also does not mentiones snooping in
> >  draft-holbrook-idmr-igmpv3-ssm-06.txt.
> >
> >Thanks
> >	Toerless
> >
> >_______________________________________________
> >magma mailing list
> >magma@ietf.org
> >https://www1.ietf.org/mailman/listinfo/magma
> >
> 
> _______________________________________________
> magma mailing list
> magma@ietf.org
> https://www1.ietf.org/mailman/listinfo/magma
> 

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings


_______________________________________________
magma mailing list
magma@ietf.org
https://www1.ietf.org/mailman/listinfo/magma