Re: [MBONED] False positive idnit in draft-ietf-mboned-driad-amt-discovery?

Leonard Giuliano <lenny@juniper.net> Tue, 03 September 2019 19:58 UTC

Return-Path: <lenny@juniper.net>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7410120043 for <mboned@ietfa.amsl.com>; Tue, 3 Sep 2019 12:58:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e98cjJA0a8nx for <mboned@ietfa.amsl.com>; Tue, 3 Sep 2019 12:58:27 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4692120047 for <mboned@ietf.org>; Tue, 3 Sep 2019 12:58:27 -0700 (PDT)
Received: from pps.filterd (m0108163.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id x83JsUMs007609; Tue, 3 Sep 2019 12:58:24 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=date : from : to : cc : subject : in-reply-to : message-id : references : mime-version : content-type : content-transfer-encoding; s=PPS1017; bh=I/tCfKvwIiZe4zqCwmq9PvuhAqFc8AFyPHgWT+JnFGs=; b=vzAfl92t1b29F8n9GN125LmehHH3vAlSWZ3E1HBiKvbpzS+msVndZv2p+GFLQABaIkfq LvNXqKPx7aWDJiY4RpQxgw7V/qJA+6H0w7SOGEOgA1G2lzI7yR2KRNi3Zx+tEgq1oRx3 l9y1WCdHXgN2BRaR61b0sJAqHjW8SZ53mb791s/PFEIv3quTlDynoTbRx9+7SfEbf+ec 2ftDpLmXHZWcUqrJJqH5FuHB/sWqBSY+N7IUJzgptXsQ3TfK27UlWxtS2MC0mBc5wjW1 zIZLiV7imhGCgCdvdve8TLdW8593XLm4giES0rW635c17TYqpxXLkKEpQGT10Cfbulky sw==
Received: from nam04-sn1-obe.outbound.protection.outlook.com (mail-sn1nam04lp2051.outbound.protection.outlook.com [104.47.44.51]) by mx0b-00273201.pphosted.com with ESMTP id 2uqm4rwe3e-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 03 Sep 2019 12:58:23 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LWvn9WRYx4woAYdkgc3ygJzKwdx2JxqImRpWE+IwFH+6kR5KydTghm0zx63IcaxfUzR6eDivC1QuT8jKRFuWkaOZxXmcpUno7zOGHPKb05/ssZbOQTW3jMH16p2Yf9SQEPS6t+OjZcO5p7qtGEGBus5QieOB3w1yYujM/FrvDYY3sTvNz5aSwBD3pY2HZA8wqv0v+f50fSrO5G5AGkqlSaqt96QCqZKbQguam5rUxQpAoNKadL96eVaXehZBs4BD0JrNJsEeYWYBXWLP+Ec2joK5Y3NSvpbfW4ElGMgB88CLPvUIn8iXS+C9h1whxQXM9Y+x+5hM18TYAxxu6sHFFA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=I/tCfKvwIiZe4zqCwmq9PvuhAqFc8AFyPHgWT+JnFGs=; b=jYcAheS6gcDuy8EzT4eUMt8qiy0Vz0vU+mVVaYAclFgNIK3wgEiGxiL+ntAeSBIz4KRsjj+Ljn2xp04myWzNFt2ZZorw0pym9Sx70zsWU2U7LxkLnkLe45BV2QauPoTW1QlXKsx5XdRBlGsTRlow+IkCHjvuwQXdUG8cN7kFdsqErLaoBnAObL7pp0RD6nQE224llr21wtUhArVj2sHtDD9ury5vhwp3NUzGNKucIDU+pJ1ASnxk8IIAeoID/x4bsef0rrndeqEq0y7WbpQhvih5NQno4+4pFbvb4JmWf96RKmwzCW6mjTxHMYl3+9YvEeLff2lwypWzyuNVm0Vi+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=softfail (sender ip is 66.129.239.12) smtp.rcpttodomain=ietf.org smtp.mailfrom=juniper.net; dmarc=fail (p=reject sp=reject pct=100) action=oreject header.from=juniper.net; dkim=none (message not signed); arc=none
Received: from MN2PR05CA0015.namprd05.prod.outlook.com (2603:10b6:208:c0::28) by BYAPR05MB4375.namprd05.prod.outlook.com (2603:10b6:a02:f5::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2241.5; Tue, 3 Sep 2019 19:58:21 +0000
Received: from CO1NAM05FT025.eop-nam05.prod.protection.outlook.com (2a01:111:f400:7e50::203) by MN2PR05CA0015.outlook.office365.com (2603:10b6:208:c0::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.2199.8 via Frontend Transport; Tue, 3 Sep 2019 19:58:21 +0000
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning juniper.net discourages use of 66.129.239.12 as permitted sender)
Received: from P-EXFEND-EQX-01.jnpr.net (66.129.239.12) by CO1NAM05FT025.mail.protection.outlook.com (10.152.96.133) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.2241.7 via Frontend Transport; Tue, 3 Sep 2019 19:58:21 +0000
Received: from P-EXBEND-EQX-02.jnpr.net (10.104.8.53) by P-EXFEND-EQX-01.jnpr.net (10.104.8.54) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Tue, 3 Sep 2019 12:58:20 -0700
Received: from P-EXBEND-EQX-02.jnpr.net (10.104.8.53) by P-EXBEND-EQX-02.jnpr.net (10.104.8.53) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Tue, 3 Sep 2019 12:58:20 -0700
Received: from p-mailhub01.juniper.net (10.104.20.6) by P-EXBEND-EQX-02.jnpr.net (10.104.8.53) with Microsoft SMTP Server (TLS) id 15.0.1367.3 via Frontend Transport; Tue, 3 Sep 2019 12:58:19 -0700
Received: from contrail-ubm-wing.svec1.juniper.net ([10.163.18.88]) by p-mailhub01.juniper.net (8.14.4/8.11.3) with ESMTP id x83JwJdK016954; Tue, 3 Sep 2019 12:58:19 -0700 (envelope-from lenny@juniper.net)
Received: by contrail-ubm-wing.svec1.juniper.net (Postfix, from userid 1709) id 1E6971236DE; Tue, 3 Sep 2019 12:58:19 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by contrail-ubm-wing.svec1.juniper.net (Postfix) with ESMTP id 00DCD12066A; Tue, 3 Sep 2019 12:58:18 -0700 (PDT)
Date: Tue, 03 Sep 2019 12:58:18 -0700
From: Leonard Giuliano <lenny@juniper.net>
X-X-Sender: lenny@contrail-ubm-wing.svec1.juniper.net
To: "Holland, Jake" <jholland@akamai.com>
CC: "mboned@ietf.org" <mboned@ietf.org>
In-Reply-To: <C8571037-2581-484F-8E1B-D672BD251010@akamai.com>
Message-ID: <alpine.DEB.2.02.1909031256150.4074@contrail-ubm-wing.svec1.juniper.net>
References: <C8571037-2581-484F-8E1B-D672BD251010@akamai.com>
User-Agent: Alpine 2.02 (DEB 1266 2009-07-14)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
X-EXCLAIMER-MD-CONFIG: e3cb0ff2-54e7-4646-8a04-0dae4ac7b136
X-EOPAttributedMessage: 0
X-MS-Office365-Filtering-HT: Tenant
X-Forefront-Antispam-Report: CIP:66.129.239.12; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(4636009)(376002)(346002)(396003)(136003)(39860400002)(2980300002)(189003)(199004)(446003)(316002)(76506006)(57986006)(26005)(86362001)(2870700001)(336012)(426003)(70586007)(70206006)(50466002)(2906002)(966005)(76176011)(186003)(356004)(229853002)(5660300002)(6916009)(8936002)(8676002)(81156014)(81166006)(4326008)(11346002)(14444005)(53936002)(6246003)(6266002)(58126008)(6306002)(478600001)(47776003)(23676004)(2486003)(126002)(7126003)(486006)(305945005)(476003); DIR:OUT; SFP:1102; SCL:1; SRVR:BYAPR05MB4375; H:P-EXFEND-EQX-01.jnpr.net; FPR:; SPF:SoftFail; LANG:en; PTR:InfoDomainNonexistent; MX:1; A:1;
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2d5e9465-67ca-4534-829c-08d730a91254
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600166)(711020)(4605104)(4710121)(4711137)(1401327)(4618075)(2017052603328); SRVR:BYAPR05MB4375;
X-MS-TrafficTypeDiagnostic: BYAPR05MB4375:
X-MS-Exchange-PUrlCount: 3
X-Microsoft-Antispam-PRVS: <BYAPR05MB437565FF4DE1AD82E0E7FEA7A4B90@BYAPR05MB4375.namprd05.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:2331;
X-Forefront-PRVS: 01494FA7F7
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: QATe4pYx6XIwzgsOjlp0+jHzDc4it6ozrvtFe+wY2At0PPU0EWQMx/yRRZA5kfSKRzvkkd/jSzjSVDybOBUlS22dHvIqXuY6t0OImZRrnwiOP/KfZ/fMH/45v4eCCtcEnxN3BABZynt8Au69F8XalYx2e+5TxOELWx1t3lGOZdI6gQmjKUwd9BCsuuMqUzfYVliV8IX4NFyMSfEV+lSL2lCRtw6zg0VBWO9fo/VXKbSGRHVmcJLa0xJk54oXdypz19M+eUJ2x2RseXzvOd/TVQfu+uQ3wNlwhNdzeod9dA7mOYTkltmkhX29WGfQ0RgOtwvOgOAbL1hIchZVB0fEqIhf7/s78Iwm15zGD7BPJkzFQIFED7YBDQEo04Puv4CfnvfC+l6O/dtoBRRQ2GHp5DBcepXaX+8JNeZRMFtxNkA=
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Sep 2019 19:58:21.0248 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2d5e9465-67ca-4534-829c-08d730a91254
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=bea78b3c-4cdb-4130-854a-1d193232e5f4; Ip=[66.129.239.12]; Helo=[P-EXFEND-EQX-01.jnpr.net]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR05MB4375
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.70,1.0.8 definitions=2019-09-03_04:2019-09-03,2019-09-03 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 bulkscore=0 spamscore=0 mlxlogscore=999 phishscore=0 clxscore=1015 impostorscore=0 priorityscore=1501 suspectscore=0 mlxscore=0 adultscore=0 malwarescore=0 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1906280000 definitions=main-1909030198
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/TOt1LI7gqpBl9yVZ_b7WkiZ26qA>
Subject: Re: [MBONED] False positive idnit in draft-ietf-mboned-driad-amt-discovery?
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Sep 2019 19:58:31 -0000

Jake- If it's supposed to be an SSM group for the example, you definitely 
want to pick an address in 232/8.

>From RFC 6676, I think you are in good shape:

2.  IPv4 Multicast Documentation Addresses

   For Any-Source Multicast (ASM), the IPv4 multicast addresses
   allocated for documentation purposes are 233.252.0.0 - 233.252.0.255
   (233.252.0.0/24).

   For Source-Specific Multicast (SSM), it is less important which
   multicast addresses are used, since a host/application joins a
   channel identified by both source and group.  Any source addresses
   used in SSM examples should be unicast addresses reserved for
   documentation purposes.  There are three unicast address ranges
   provided for documentation use in [RFC5737].  The ranges are
   192.0.2.0/24, 198.51.100.0/24 and 203.0.113.0/24.

   Sometimes one wants to give examples where a specific type of address
   is desired.  For example, for text about multicast scoping, one might
   want the examples to use addresses that are to be used for
   administrative scoping.  See below for guidance on how to construct
   specific types of example addresses.



On Sun, 1 Sep 2019, Holland, Jake wrote:

| Hi Mboned,
| 
| I wanted to ask for your expert opinions on one of the warnings that
| idnits reports in draft-ietf-mboned-driad-amt-discovery.  I think
| it's a false positive, but I wanted to check if wg consensus agrees
| with me here regarding the use of 232.x vs. 233.252.0.x:
| 
| In the draft, I'm using 232.252.0.2, which is not the MCAST-TEST-NET
| space of 233.252.0.0/24, which is causing a warning.
| 
| From:
| https://urldefense.proofpoint.com/v2/url?u=https-3A__www6.ietf.org_tools_idnits-3Furl-3Dhttps-3A__www.ietf.org_archive_id_draft-2Dietf-2Dmboned-2Ddriad-2Damt-2Ddiscovery-2D08.txt-26verbose-3Dtrue&d=DwIGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=iw2TU3OZ0CDpCbqeV23zdah2FoG9Do-zEmGgWTaavDg&m=xsk5PcsYEt_KVg7TP9YF66RP-SQnean6GQq5Ri7mmgo&s=DZ-tcZiA71UT3PNABbEuLfQ1IBPYbEpbEbVMgepu5Sw&e= 
| 
|   /tmp/draft-ietf-mboned-driad-amt-discovery-08.txt(409): Found possible IPv4
|     address '232.252.0.2' in position 24; this doesn't match the suggested
|     documentation address ranges specified in RFC 6890 (or successor): blocks
|     192.0.2.0/24 (TEST-NET-1), 198.51.100.0/24 (TEST-NET-2), and 203.0.113.0/24
|     (TEST-NET-3); or the 233.252.0.0/24 (MCAST-TEST-NET) example multicast
|     address range specified in RFC 5771.
| 
|   == There are 1 instance of lines with multicast IPv4 addresses in the
|      document.  If these are generic example addresses, they should be changed
|      to use the 233.252.0.x range defined in RFC 5771
| 
| 
| However, I think it’s better here to use the designated SSM space, because
| this is specifically a SSM group, and the S that’s associated is one from
| one of the proper example test nets.
| 
| Section 8.1 of RFC 5771 mentions that there's deliberately no IANA
| assignment policy for 232.x (leaving aside the reserved 232.0.0.x/24
| from section 9 of RFC 4607):
| 
| https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc5771-23section-2D8.1&d=DwIGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=iw2TU3OZ0CDpCbqeV23zdah2FoG9Do-zEmGgWTaavDg&m=xsk5PcsYEt_KVg7TP9YF66RP-SQnean6GQq5Ri7mmgo&s=dDJAgFTDtnN2TskyxRHWgEhdxo0vbsalClLtM-o6zfc&e= 
|    Because the SSM model essentially makes the entire multicast address
|    space local to the host, no IANA assignment policy is required.
|    Note, however, that while no additional IANA assignment is required,
|    addresses in the Source-Specific Multicast Block are explicitly for
|    use by SSM and MUST NOT be used for other purposes.
| 
| In this case, I think using an example SSM group in a (S,G) that uses
| one of the recommended example networks for the S is already a proper
| example.
| 
| I think the problem with using the TEST-MCAST-NET block is that GLOP
| addresses in 233 are globally scoped and statically assigned, so they
| wouldn’t fit inside the default ssm space for things like configuring
| RPF for PIM, so you might actually get different behavior out of the
| network if you tried to use them without special config to support them.
| 
| So my opinion is it’s better to use 232.x in this case.  I'm not sure
| one way or the other whether it perfectly matches the letter of RFC 6890,
| but I think it's a better match for the spirit, as I understand it.
| 
| I'd be very happy to take advice from the WG or the IESG if anyone thinks
| it's better to use the suggested 233.252.0.x destination instead.  I'm
| soliciting opinions on the point, since it's relatively likely to come up
| in review, since idnits flags it.
| 
| Cheers,
| Jake
| 
| 
| PS:
| there is another warning that I think is more obviously a false positive.
| 
| You may of course comment if you like, but I'm not asking about this one,
| I just wanted to mention it also to head off some of the confusion:
| 
|   /tmp/draft-ietf-mboned-driad-amt-discovery-08.txt(374): Found possible IPv4
|     address '15.100.51.198' in position 46; this doesn't match the suggested
|     documentation address ranges specified in RFC 6890 (or successor): blocks
|     192.0.2.0/24 (TEST-NET-1), 198.51.100.0/24 (TEST-NET-2), and 203.0.113.0/24
|     (TEST-NET-3); or the 233.252.0.0/24 (MCAST-TEST-NET) example multicast
|     address range specified in RFC 5771.
| 
|   == There are 1 instance of lines with non-RFC6890-compliant IPv4 addresses
|      in the document.  If these are example addresses, they should be changed.
| 
| '15.100.51.198' appears in 3 places, but each of those places is actually part
| of the reverse-ip DNS zone for 198.51.100.15: 15.100.51.198.in-addr.arpa.  So
| this is a false positive because it uses one of the RFC 6890 test net addresses,
| but it’s properly reversed to indicate the corresponding DNS zone.
| 
| 
| _______________________________________________
| MBONED mailing list
| MBONED@ietf.org
| https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_mboned&d=DwIGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=iw2TU3OZ0CDpCbqeV23zdah2FoG9Do-zEmGgWTaavDg&m=xsk5PcsYEt_KVg7TP9YF66RP-SQnean6GQq5Ri7mmgo&s=F4jgoi0FYp9JopiVMqpv2zQ3BU5rLMwDPh-I8qzgltI&e= 
|