Re: [MBONED] [pim] IGMPv3 backward compatibility issue killing SSM

Hitoshi Asaeda <asaeda@ieee.org> Fri, 23 February 2024 09:29 UTC

Return-Path: <asaeda@ieee.org>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE650C14F71F for <mboned@ietfa.amsl.com>; Fri, 23 Feb 2024 01:29:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ieee.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 98f8U8dpPtSI for <mboned@ietfa.amsl.com>; Fri, 23 Feb 2024 01:29:28 -0800 (PST)
Received: from mail-pl1-x62e.google.com (mail-pl1-x62e.google.com [IPv6:2607:f8b0:4864:20::62e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CCD30C14F736 for <mboned@ietf.org>; Fri, 23 Feb 2024 01:29:28 -0800 (PST)
Received: by mail-pl1-x62e.google.com with SMTP id d9443c01a7336-1dc1ff697f9so5560795ad.0 for <mboned@ietf.org>; Fri, 23 Feb 2024 01:29:28 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google; t=1708680568; x=1709285368; darn=ietf.org; h=to:references:message-id:content-transfer-encoding:cc:date :in-reply-to:from:subject:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=69aChOfFtPr35/lJIVTiO/6RHsNIvqT6Ch5WM9CFE3k=; b=bWk8vh2zFYei3l6yW0lDoptT/N7pMdtp55lu6FXFLtinfi49vBvh080Bsmd0rrzLLC 9vapGkx2ErP+tzp8izzvcMO2+evMGjpMtt+3HOF37c1PVzHnJ6gp53I4EqePKzalm5RZ WNnfH5X839IbGon0qeyQSUfsH68Eeyv96V84E=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708680568; x=1709285368; h=to:references:message-id:content-transfer-encoding:cc:date :in-reply-to:from:subject:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=69aChOfFtPr35/lJIVTiO/6RHsNIvqT6Ch5WM9CFE3k=; b=BTsVzGR/pVn1e5dHMnZPQc+/qyqFGJWoKE9k2uC4+INo7ifVJbPgCVZpghegN5DFbg RxRh+HvCxLUFQ9uj95jbmjiYj5mbL8k2si6yb7aCBrBeyYpkujsF128YSV53sTezeaDQ aasLiX6S72JQAki2MCqjDneivfvqe96dFpe8BP0jIheMFllwmPTWhZKiVz46eVx01xfd vH3m1UspUW7Y7Waycnbc0R5JrKa6E9vxzxFLsU/q7UDmlxkCWb6I0WmIzEY4GZexlXHd 5Kk0y87X8BzSI52bHwytpGYw+Vj0wwVCdWZQCJMQRDCx+KkhSGW44UbvQDtS27wg/NEq TIlg==
X-Forwarded-Encrypted: i=1; AJvYcCVpHt9e+rIwWKHcs9lLFYteXQDq3L5s5c7TYzaaQs9X7XXDYshYzUKd90X7deKChxl2w/UPqqiIQCt8lvwRETk=
X-Gm-Message-State: AOJu0YyhiBaO+D+jAQORgKRtFfBBqMdDQFjlJq6jn9YfyGgpyXMlRGua QUS7KN8JGFOKzdExVtm9Efb7QvxKNPuPFOPt057DKoobpzBm0OfQ7nskJFBbIZVdkMwTSJrGQv0 =
X-Google-Smtp-Source: AGHT+IGpcRzUWXJdTjXvnDM346MbNafhopeRlk53iPBmNnbyi/Xx56XRhtfPQKYGpzLbnrp8kYL01w==
X-Received: by 2002:a17:902:9684:b0:1dc:3d5:bdcc with SMTP id n4-20020a170902968400b001dc03d5bdccmr1069358plp.42.1708680567843; Fri, 23 Feb 2024 01:29:27 -0800 (PST)
Received: from smtpclient.apple (098-147-008-008.res.spectrum.com. [98.147.8.8]) by smtp.gmail.com with ESMTPSA id y11-20020a170903010b00b001db8f7720e2sm11235145plc.288.2024.02.23.01.29.26 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 23 Feb 2024 01:29:27 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.1\))
From: Hitoshi Asaeda <asaeda@ieee.org>
In-Reply-To: <CAHANBtL9hJrPXB+XuFp4ESQMx1Qv4nGEdPoiUonTNMACXJh1eA@mail.gmail.com>
Date: Thu, 22 Feb 2024 23:29:25 -1000
Cc: Brian Haberman <brian@innovationslab.net>, "mboned@ietf.org" <mboned@ietf.org>, "pim@ietf.org" <pim@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <8309259A-32B8-4D82-83F0-C8659418E1E9@ieee.org>
References: <CAHANBtKf03ukXH4sgwN0WVdkaVXnbRYdAGBDmQK56YXrS-z6yA@mail.gmail.com> <CAHANBtKdfS0cPceqv8_R+ToeGOBdUksH7gArKqegqSt_Q0Sf0Q@mail.gmail.com> <ZXtzwBljE45Og27f@faui48e.informatik.uni-erlangen.de> <EDE809A0-E672-4A3B-9F46-E08ECD3D4C23@akamai.com> <edc9d539-4b6c-f238-54c6-210c152e2065@juniper.net> <e9ed1779-4f43-4f71-b8c3-d813bcea81d1@innovationslab.net> <532D7FE8-B721-4CF8-A54D-CF139BD8128B@ieee.org> <8DF64ABE-E20A-4C2C-A3D5-63ECEE24EA6C@juniper.net> <d8704ceb-932b-4878-ae3b-6e9cdc523078@innovationslab.net> <CAHANBt+yvv0DT7TYVc4FF5V9y42fHY=GvTYPw-K2ed1XTVLsXg@mail.gmail.com> <76454dcc-61ae-49bf-9c71-1b424994bcce@innovationslab.net> <9DB48B26-1B1C-4B30-B46C-D447194A68AC@ieee.org> <CAHANBtL9hJrPXB+XuFp4ESQMx1Qv4nGEdPoiUonTNMACXJh1eA@mail.gmail.com>
To: Stig Venaas <stig@venaas.com>
X-Mailer: Apple Mail (2.3731.700.6.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/WNMiZNrzL_QbFhcfJcs_XootFmU>
Subject: Re: [MBONED] [pim] IGMPv3 backward compatibility issue killing SSM
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Feb 2024 09:29:33 -0000

> How common is it that
> there is accidentally an older querier in the network?

I don’t think “how it is common” is the point.
The point is that, say IGMPv2 general query, which may be accidentally or intentionally happened, legally stops IGMPv3 join/leave operations.

Regards,

Hitoshi


> On Feb 22, 2024, at 15:28, Stig Venaas <stig@venaas.com> wrote:
> 
> Hi all
> 
> I think the main question is what changes would be needed, if any,
> before publishing the bis documents. I don't think those documents
> should add any new MUSTs as implementations that were compliant to the
> original RFCs should still be compliant. We can have other documents
> discuss the behavior. But if people believe it is important, we can
> add some language, possibly RECOMMEND, MAY or SHOULD.
> 
> It would be good to get feedback from the WG on whether we should add
> any text regarding this or not.
> 
> My understanding is that the potential problem is with querier
> election and falling back to older querier. How common is it that
> there is accidentally an older querier in the network? In general all
> devices should be v3 capable when using IGMPv3, and most devices
> should support it by now.
> 
> Regards,
> Stig
> 
> On Thu, Feb 22, 2024 at 12:22 PM Hitoshi Asaeda <asaeda@ieee.org> wrote:
>> 
>> Hi Brian,
>> 
>> I apologize if I repeat and loop back to the same discussion.
>> 
>> Toerless previously mentioned;
>> 
>>> RFC3376 (and currently rfc3376bis too) writes (line numbers from idnits):
>>> 
>>> 1837       *  If any older versions of IGMP are present on routers, the querier
>>> 1838          MUST use the lowest version of IGMP present on the network.  This
>>> 1839          must be administratively assured; routers that desire to be
>>> 1840          compatible with IGMPv1 and IGMPv2 MUST have a configuration option
>>> 1841          to act in IGMPv1 or IGMPv2 compatibility modes.
>>> 
>>> The second sentence is either english that i do not understand, or it is in contradiction to
>>> the first sentence. If there is a configuration option to enable/disable router compatibility
>>> with IGMPv1/IGMPv2, and i disable this configuration option on my router, then i would
>>> be in contradiction to the first sentence, wouldn't i ?
>> 
>> I also have the similar feeling, but IMO (as I said previously, too), keeping this backward compatibility mode is Ok. The reasonable solution is that disabling the backward compatibility mode is the default (MUST?). And enabling the backward compatibility mode can be selected by operation (SHOULD? MAY?).
>> Above rule is applied to any address range, but using SSM address range does not affect anything (i.e., always use IGMPv3/MLDv2 in SSM range).
>> 
>> What do you think?
>> 
>> Regards,
>> 
>> Hitoshi
>> 
>> 
>>> On Feb 22, 2024, at 8:43, Brian Haberman <brian@innovationslab.net> wrote:
>>> 
>>> Hi Stig,
>>> 
>>> On 1/5/24 11:27 AM, Stig Venaas wrote:
>>>> Hi Brian
>>>> I'm personally fine with no changes, if we make changes then I think
>>>> they should be at most recommendations. Hopefully we will see more
>>>> widespread IGMPv3 support and this will be less of an issue. It will
>>>> also help if implementations have IGMPv3 enabled by default.
>>>> Section 7.2 is the more problematic part, but the issue is mainly with
>>>> some unmanaged/unexpected device using version 1 or 2 I believe. If
>>>> there are unexpected pim routers present or some pim router has wrong
>>>> configuration, then things may break in many ways even if we were to
>>>> address the v3 fallback. E.g. the unexpected device may become DR and
>>>> not supporting v3 at all, or not having correct RP configuration.
>>> 
>>> I have not seen any suggested text changes for 7.2 to address the unexpected use of v1 or v2. Still open to adding recommendations for default settings of the compatibility mode variables, but haven't heard anyone agreeing with such a change.
>>> 
>>> Regards,
>>> Brian
>>> _______________________________________________
>>> MBONED mailing list
>>> MBONED@ietf.org
>>> https://www.ietf.org/mailman/listinfo/mboned
>>