Re: [magma] Comments draft-ietf-magma-snoop-11.txt (SSM)
Pekka Savola <pekkas@netcore.fi> Mon, 17 May 2004 22:01 UTC
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA06407 for <magma-archive@ietf.org>; Mon, 17 May 2004 18:01:56 -0400 (EDT)
Received: from ietf-mx.ietf.org ([132.151.6.1] helo=ietf-mx) by ietf-mx with esmtp (Exim 4.32) id 1BPqBJ-0004Mn-Bq for magma-archive@ietf.org; Mon, 17 May 2004 18:01:57 -0400
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1BPq9h-0003dw-00 for magma-archive@ietf.org; Mon, 17 May 2004 18:00:18 -0400
Received: from optimus.ietf.org ([132.151.1.19]) by ietf-mx with esmtp (Exim 4.12) id 1BPq80-0002zw-00; Mon, 17 May 2004 17:58:32 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1BPpu0-00028D-OZ; Mon, 17 May 2004 17:44:04 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1BPpjU-0002Jo-LV for magma@optimus.ietf.org; Mon, 17 May 2004 17:33:12 -0400
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA01810 for <magma@ietf.org>; Mon, 17 May 2004 17:33:09 -0400 (EDT)
Received: from ietf-mx.ietf.org ([132.151.6.1] helo=ietf-mx) by ietf-mx with esmtp (Exim 4.32) id 1BPpjS-0003Jo-BE for magma@ietf.org; Mon, 17 May 2004 17:33:10 -0400
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1BPpgr-0002P5-00 for magma@ietf.org; Mon, 17 May 2004 17:30:30 -0400
Received: from netcore.fi ([193.94.160.1]) by ietf-mx with esmtp (Exim 4.12) id 1BPpeW-0001bx-00 for magma@ietf.org; Mon, 17 May 2004 17:28:05 -0400
Received: from localhost (pekkas@localhost) by netcore.fi (8.11.6/8.11.6) with ESMTP id i4HLR3K09763; Tue, 18 May 2004 00:27:03 +0300
Date: Tue, 18 May 2004 00:27:03 +0300
From: Pekka Savola <pekkas@netcore.fi>
To: Isidor Kouvelas <kouvelas@cisco.com>
cc: magma@ietf.org
Subject: Re: [magma] Comments draft-ietf-magma-snoop-11.txt (SSM)
In-Reply-To: <200405171952.MAA12458@cypher.cisco.com>
Message-ID: <Pine.LNX.4.44.0405180025420.9689-100000@netcore.fi>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset="US-ASCII"
Sender: magma-admin@ietf.org
Errors-To: magma-admin@ietf.org
X-BeenThere: magma@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/magma>, <mailto:magma-request@ietf.org?subject=unsubscribe>
List-Id: Multicast and Anycast Group Membership <magma.ietf.org>
List-Post: <mailto:magma@ietf.org>
List-Help: <mailto:magma-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/magma>, <mailto:magma-request@ietf.org?subject=subscribe>
X-Spam-Checker-Version: SpamAssassin 2.60 (1.212-2003-09-23-exp) on ietf-mx.ietf.org
X-Spam-Status: No, hits=0.0 required=5.0 tests=AWL autolearn=no version=2.60
On Mon, 17 May 2004, Isidor Kouvelas wrote: > Excuse me but were you hybernating during the last call etc for this > draft? This is currently in the RFC editor queue! Further, I think there was considerable pushback for configured SSM ranges in IETF59 when we had this debate. If folks think that's important, it should be easily to specify as a separate draft to the new mrdisc. Then we'd see who would bother implementing it :) > Toerless Eckert writes: > >I would hereby like to express my opinion that subject draft MUST > >mentioned SSM explicitly (and provide appropriate detail) before > >progressing any further. Without mentioning ASM and SSM service model support > >explicitly, we will solely get yet another document that will not > >support SSM sufficiently anmore and given that SSM is recognized by > >mboned to be the one service model the IETF should focus further > >work on, it is unacceptable to over and over get the excuse of > >"oh well, the SSM support side can be done later in a different document". > > > >[ Cc'ed ssm and mboned working groups to alert them about this lack > > of right focus of that draft. Please keep replies to the > > Reply-To: magma@ietf.org, to avoid flooding three mailing lists with this. ] > > > >Specifically this is what i think is needed: > > > > SSM can be used in varying IPv4 address ranges, a decision as to limit > > it to specific address ranges (like only the default 232.0.0.0/8 ) has > > not been made (i would also oppose that). IGMP snooping switches on > > the other hand should be zero-config simply deployable devices that > > do not necessarily need to be configured to know L3 specifics like > > an SSM range. > > > > For this reason i would recommend that a default mode of operations > > of IGMPv3 switches is mandated which provides for SM-safe-reporting, > > meaning that receiver systems expecting to use SSM will not be impacted by > > (erroneous) receiver systems using ASM style membership reports on > > any addresses. > > > > Problem: > > Reporter 1 on port 1 sending an INCLUDE({S},G) IGMPv3 report, reporter > > 2 on port 2 sending an EXCLUDE({},G) IGMPv3 report. IGMP snooping > > switch builds aggregate state for G to report to upstream router(s). > > This aggregate state is (according to IGMPv3 specs) EXCLUDE({},G). > > If only this is reported, reporter 1 SSM application will fail because > > the router never receives any INCLUDE({S},G) reports. > > > > Solution: > > Define SSM-safe-reporting to be a condition for an IGMP snooping switch > > in which it ensures that all include({S},G) membership state will > > be reported correctly to router ports irrespective of exclude({..},G) > > reports. > > > > There are lots of alternatives on how a switch can do this, the > > most simple one is to pass on _all_ membership reports from > > hosts without suppressing any of them on ports connected to routers. > > That way in above example both the INCLUDE and EXCLUDE mode report > > would be seen by the router and if G is SSM, the router can correctly > > ignore the EXCLUDE mode report. > > > > There are alternatives on how to do SSM-safe-reporting which are > > more complex but provide more membership report suppression/aggregation > > towards router ports, but i think details of those should be left > > up for individual implementations. > > > > I would simply mandate that the default operations of an IGMP snooping > > switch must provide for SSM-safe-reporting without explicit manual > > configuration of the SSM range and without expecting SSM to be only > > operated on a well known SSM-range (IPv4). > > > > Obviously, this is only a problem for IPv4, as in IPv6 the SSM-range > > is well defined, MLD-snooping routers can thus rely on that > > range definition. > > > > And yes, i understand that this is only an informational document, but > > that's all we have. Hugh also does not mentiones snooping in > > draft-holbrook-idmr-igmpv3-ssm-06.txt. > > > >Thanks > > Toerless > > > >_______________________________________________ > >magma mailing list > >magma@ietf.org > >https://www1.ietf.org/mailman/listinfo/magma > > > > _______________________________________________ > magma mailing list > magma@ietf.org > https://www1.ietf.org/mailman/listinfo/magma > -- Pekka Savola "You each name yourselves king, yet the Netcore Oy kingdom bleeds." Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings _______________________________________________ magma mailing list magma@ietf.org https://www1.ietf.org/mailman/listinfo/magma
- [magma] Comments draft-ietf-magma-snoop-11.txt (S… Toerless Eckert
- Re: [magma] Comments draft-ietf-magma-snoop-11.tx… Isidor Kouvelas
- Re: [magma] Comments draft-ietf-magma-snoop-11.tx… Isidor Kouvelas
- Re: [magma] Comments draft-ietf-magma-snoop-11.tx… Pekka Savola
- Re: [magma] Comments draft-ietf-magma-snoop-11.tx… Toerless Eckert
- RE: [magma] Comments draft-ietf-magma-snoop-11.tx… Manfredi, Albert E