Re: [MBONED] WGLC for draft-ietf-mboned-driad-amt-discovery

Leonard Giuliano <lenny@juniper.net> Tue, 23 April 2019 19:32 UTC

Return-Path: <lenny@juniper.net>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4911F1202C0 for <mboned@ietfa.amsl.com>; Tue, 23 Apr 2019 12:32:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.338
X-Spam-Level:
X-Spam-Status: No, score=-1.338 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, KHOP_DYNAMIC=1.363, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uklEqVKmkYiX for <mboned@ietfa.amsl.com>; Tue, 23 Apr 2019 12:32:12 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4774B120473 for <mboned@ietf.org>; Tue, 23 Apr 2019 12:32:12 -0700 (PDT)
Received: from pps.filterd (m0108161.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x3NJJDpu003263; Tue, 23 Apr 2019 12:32:08 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=date : from : to : cc : subject : in-reply-to : message-id : references : mime-version : content-type : content-transfer-encoding; s=PPS1017; bh=py/jwEQdQV4TH9hS01kDLmaJDj8wlGIyf+DetmMPrOU=; b=kdffr+IHWSfojHt0gOc2uI0I0yRH9eefBjTY803THl2waPSsMVCWwFE3ZLcjK1gfPE8J I1bN7/ivSmbvM8BfWGdwSDAY6ugfJ2JJwkJ1aXNqghOR6seggEQ4UsQJcit2MLt1vvzL JUFysm58uDP96Zp/Fow21Ljr9bINnO3EE/alc1L6G1L8qEA6zcsZ7y08CVLoaXDqoCAF YkbN/yl79PIkoAyRHu2nYDLcL1I++CGBiPVSQhzgqMVLMrvLBlUDhGKDzb1OE5D6dX8n DclZhxEGa+LrCXIfiLWjinocgTe8+/Wmabt7tYDeAV60Lf3v+R8EUvSxf7xcRqm02oBP 3w==
Received: from nam03-by2-obe.outbound.protection.outlook.com (mail-by2nam03lp2054.outbound.protection.outlook.com [104.47.42.54]) by mx0b-00273201.pphosted.com with ESMTP id 2s23hxgkf5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Tue, 23 Apr 2019 12:32:08 -0700
Received: from DM5PR05CA0001.namprd05.prod.outlook.com (2603:10b6:3:d4::11) by SN6SPR01MB13.namprd05.prod.outlook.com (2603:10b6:805:64::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1835.11; Tue, 23 Apr 2019 19:32:05 +0000
Received: from CO1NAM05FT055.eop-nam05.prod.protection.outlook.com (2a01:111:f400:7e50::207) by DM5PR05CA0001.outlook.office365.com (2603:10b6:3:d4::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1835.9 via Frontend Transport; Tue, 23 Apr 2019 19:32:05 +0000
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning juniper.net discourages use of 66.129.239.12 as permitted sender)
Received: from P-EXFEND-EQX-01.jnpr.net (66.129.239.12) by CO1NAM05FT055.mail.protection.outlook.com (10.152.96.171) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1835.12 via Frontend Transport; Tue, 23 Apr 2019 19:32:05 +0000
Received: from P-EXBEND-EQX-01.jnpr.net (10.104.8.52) by P-EXFEND-EQX-01.jnpr.net (10.104.8.54) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Tue, 23 Apr 2019 12:32:04 -0700
Received: from P-EXBEND-EQX-02.jnpr.net (10.104.8.53) by P-EXBEND-EQX-01.jnpr.net (10.104.8.52) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Tue, 23 Apr 2019 12:32:04 -0700
Received: from p-mailhub01.juniper.net (10.104.20.6) by P-EXBEND-EQX-02.jnpr.net (10.104.8.53) with Microsoft SMTP Server (TLS) id 15.0.1367.3 via Frontend Transport; Tue, 23 Apr 2019 12:32:04 -0700
Received: from contrail-ubm-wing.svec1.juniper.net ([10.163.18.88]) by p-mailhub01.juniper.net (8.14.4/8.11.3) with ESMTP id x3NJW3xE020875; Tue, 23 Apr 2019 12:32:04 -0700 (envelope-from lenny@juniper.net)
Received: by contrail-ubm-wing.svec1.juniper.net (Postfix, from userid 1709) id A5B6C12362E; Tue, 23 Apr 2019 12:32:03 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by contrail-ubm-wing.svec1.juniper.net (Postfix) with ESMTP id 9532A122908; Tue, 23 Apr 2019 12:32:03 -0700 (PDT)
Date: Tue, 23 Apr 2019 12:32:03 -0700
From: Leonard Giuliano <lenny@juniper.net>
X-X-Sender: lenny@contrail-ubm-wing.svec1.juniper.net
To: "Holland, Jake" <jholland@akamai.com>
CC: MBONED WG <mboned@ietf.org>
In-Reply-To: <49C3EA1D-FE7E-4229-BF6D-6060939D4A70@akamai.com>
Message-ID: <alpine.DEB.2.02.1904221136490.27433@contrail-ubm-wing.svec1.juniper.net>
References: <alpine.DEB.2.02.1904121206190.12864@contrail-ubm-wing.svec1.juniper.net> <alpine.DEB.2.02.1904150902150.11698@contrail-ubm-wing.svec1.juniper.net> <49C3EA1D-FE7E-4229-BF6D-6060939D4A70@akamai.com>
User-Agent: Alpine 2.02 (DEB 1266 2009-07-14)
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
X-EXCLAIMER-MD-CONFIG: e3cb0ff2-54e7-4646-8a04-0dae4ac7b136
X-EOPAttributedMessage: 0
X-MS-Office365-Filtering-HT: Tenant
X-Forefront-Antispam-Report: CIP:66.129.239.12; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(396003)(136003)(346002)(376002)(39860400002)(2980300002)(52314003)(51444003)(189003)(199004)(6306002)(126002)(4326008)(11346002)(68736007)(70586007)(53936002)(77096007)(229853002)(476003)(26005)(446003)(7126003)(6246003)(69596002)(305945005)(2906002)(90966002)(6266002)(30864003)(6916009)(336012)(5660300002)(2870700001)(70206006)(86362001)(8936002)(8676002)(5820100001)(14444005)(47776003)(58126008)(81166006)(76506005)(486006)(426003)(966005)(186003)(81156014)(97736004)(316002)(356004)(76176011)(57986006)(23676004)(50466002)(478600001); DIR:OUT; SFP:1102; SCL:1; SRVR:SN6SPR01MB13; H:P-EXFEND-EQX-01.jnpr.net; FPR:; SPF:SoftFail; LANG:en; PTR:InfoDomainNonexistent; MX:1; A:1;
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: c49c6386-a5b6-434f-df2f-08d6c8225e28
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(4710095)(4711036)(2017052603328); SRVR:SN6SPR01MB13;
X-MS-TrafficTypeDiagnostic: SN6SPR01MB13:
X-MS-Exchange-PUrlCount: 6
X-Microsoft-Antispam-PRVS: <SN6SPR01MB13C0C819FC8E4CF0FF715CA4230@SN6SPR01MB13.namprd05.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:8273;
X-Forefront-PRVS: 0016DEFF96
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: yIXt9Yd8mSm242Hw4H38O+QK7QmEhsgesJy0utbUep1VARqTzQ7gROw/HGks9OFXK9OpRHh0RWPMsz5F5cZHIoO/UrLbbVziQDh0Rd3dENTNN8mauyAvyecxxyRjh++cSEX6oYVr2zpqA6CWHh9tatu2qHQGpFhClIPmdeIMjJtkGJPy7KmETUsoG1zqiiqrKzcl6+EhTlq/sZ/TOtxYrV5lzFa6JGsBUFoLX4FrsGe1ba6ffAFGLs6dvt+EaziziKWg43fxNnN67S1SN4y6FyLCis8rRK4FrsJz6juRqKnVKo06LVgGjLMQfR7WnQxBkiciBmUAZUyG0uIel9nGuBBYZMcx8twBVqRXIZhJybM01oYOcphgQZdb4eagBKbjtzb0kFibds9hGZZmzSOEzeQd1w6BDCDCBIzwsEPrNO0=
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Apr 2019 19:32:05.2463 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: c49c6386-a5b6-434f-df2f-08d6c8225e28
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=bea78b3c-4cdb-4130-854a-1d193232e5f4; Ip=[66.129.239.12]; Helo=[P-EXFEND-EQX-01.jnpr.net]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6SPR01MB13
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-04-23_06:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1904230136
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/Wf7ViGFweQW9ok0CNMmCPEwpd1o>
Subject: Re: [MBONED] WGLC for draft-ietf-mboned-driad-amt-discovery
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Apr 2019 19:32:15 -0000

Jake- sorry for the delayed reply, took some time to fully digest.
Comments inline, and let me know if you already covered this in the 
lastest version:

On Mon, 15 Apr 2019, Holland, Jake wrote:

| Thanks Lenny, much appreciated.  <jh>Responses inline.</jh>
| 
| On 2019-04-15, 09:10, "Leonard Giuliano" <lenny=40juniper.net@dmarc.ietf.org> wrote:
| 
|     
|     <chair hat off>
|     
|     Overall, I think this doc is very thorough, clearly written and and
|     addresses a much needed area of specification for AMT.  Some comments:
|     
|     Sect 2.3.2: should the definition of connection completion take into 
|     consideration traffic health as well?  That is, the relay is up and happy, 
|     but has no multicast connectivity to the source, hence you could have a 
|     blackhole.  At the very least, should it be completion of the 3-way 
|     handshake?
| 
| <jh>
| I'm not completely sure what you mean by "3-way handshake" here, but I'm assuming
| you mean the one mentioned in RFC 7450, particularly sections 5.1.3 and 5.1.4:
| https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc7450-23section-2D5.1.3&d=DwIGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=iw2TU3OZ0CDpCbqeV23zdah2FoG9Do-zEmGgWTaavDg&m=5B2Q9Qi_7Vs-C0IJQ8m6_1mazviWrkJeBlTCBKB5rvs&s=GnlMUunygK9RB-Dv7QFmxyc6Mk8ZVbhA6DdDeV4slPA&e=
| https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_rfc7450-23section-2D5.1.4&d=DwIGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=iw2TU3OZ0CDpCbqeV23zdah2FoG9Do-zEmGgWTaavDg&m=5B2Q9Qi_7Vs-C0IJQ8m6_1mazviWrkJeBlTCBKB5rvs&s=9Z1ODsciEKqfCyQy8UvMrp9JOlQ8M2MzuTOAut8dee4&e=
| 
| The definition in section 2.3.2 of this draft calls the connection complete
| during the 2nd part of this 3-way handshake, which is receipt of the Membership
| Query message.  (Since we're talking about a gateway-side decision, I don't
| think there's anything the client knows about after the 3rd part of the handshake,
| before starting to receive data traffic.)
| 
| I agree with you that it would be nice to have information about multicast
| connectivity to the source, but I don't think this can be safely discovered when
| probing connectivity of multiple connections in parallel (as described by the
| Happy Eyeballs part), because if we actually forward the subscription to
| one or more (S,G)s to multiple relays, we might start getting traffic from all
| of them, and that traffic might be larger than we should receive, or could
| result in forwarding multiple copies of packets routinely, if an implementation
| doesn't take specific steps to avoid it.
| 
| Therefore, the way this doc handles it is to allow multiple connections to
| start in parallel up until receiving the Membership Query (which is stage 2 of
| the 3-way handshake), and then to pick the most preferred of those connections
| to get the Membership Update including a subscription to data traffic, and then
| after subscribing, to use the Traffic Health heuristics (section 2.5.4) to decide
| whether the gateway needs to restart discovery with a hold-down for the relay that
| had bad health on the traffic.
| 
| Do you think I need a reference to 2.5.4 in section 2.3.2 to make this more
| clear?  Or is there a deeper objection here?

Yeah, I think that would be helpful, as I didn't quite get that 
connection.  Again, I'm concerned with the case where the AMT tunnel comes 
up but the relay lacks multicast connectivity to the source, which I 
suspect will not be an uncommon case.  As you've worded above- probe the 
relays til you get a good session, then join, then pick another relay if 
you get no data, sounds reasonable to me.  I think making that clear in 
2.3.2 would be helpful.

| </jh>
|     
|     Sect 2.3.2: “See Section 2.5.5 for further …”
|             -“See Section 2.5.5 of this doctment for further…” to eliminate 
|     confusion, as when I first read this, I wasn't sure if it was referring to 
|     RFCs 7450 or 8305 (turns out, neither).
| 
| <jh>
| That sounds fine to me, my local copy is updated to add "of this document" after
| the section reference and before "for further...".
| </jh>
|     
|     Sect 2.4.1: How about #6- The application layer includes a suggested relay
|     address (as a hint)
|             -this is what we’ve done in the VLC with AMT GW build.
|     Specifically, VLC has a configurable AMT relay address, which uses a
|     well-known FQDN (amt-relay.m2icast.net) which has multiple A records of
|     known, healthy relays.  Or is this scenario covered by #3?
| 
| <jh>
| This scenario is covered by #3.
| 
| Do you think we need a definition of "administrative configuration" in section
| 1.2.2 or something (and maybe "administratively" added before "configured" in
| #3)?  I had assumed the concept was reasonably well understood, but  if this
| wasn't clear, maybe it's not obvious enough in the text.
| 
| (Any WG opinions here on whether #3 is already clear enough on allowing this
| usage?)

OK, re-reading, I'm convinced #3 is good enough to get this idea across, 
though if others have an opinion, please speak up.

| </jh>
|     
|     Sect 2.4.2: I found this sect a little tough to follow.  There are 3
|     enumerated options, but the text that follows includes other options (like
|     admin config).  Also, I found it curious that you have Global Anycast so
|     high in the list of prefs (before DRIAD).  Global Anycast seems very
|     unlikely to ever be a good deployment option since it’s so vulnerable to
|     DoS (recall Mikael and my comments in the mtg in Prague)
| <jh>
| My presentation in Prague focused largely on why I felt the update to put the
| global anycast IP before DRIAD was necessary.  For easy reference, here's a
| link to the video (from 3m44s into my presentation, where I begin directly
| addressing this point):
| https://urldefense.proofpoint.com/v2/url?u=https-3A__www.youtube.com_watch-3Fv-3DjIDYHFpJYV8-26t-3D55m44s&d=DwIGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=iw2TU3OZ0CDpCbqeV23zdah2FoG9Do-zEmGgWTaavDg&m=5B2Q9Qi_7Vs-C0IJQ8m6_1mazviWrkJeBlTCBKB5rvs&s=UUvXd2wmB1kONtQbcaewEPwiIY3HFmclRqqq4S_ruBo&e=
| 
| If that was unclear, I guess I'd like to get some more specific questions about
| it?
| 
| As painful as it is to see myself speak, I re-watched that whole thing, and I
| heard Toerless give some comments speaking directly to this question (to which
| I responded in another thread [1]), but I think Mikael's comment was not about
| this, and I didn't see any mic comments from you about this.  Were there some
| other comments you meant to recall?
| [1] https://urldefense.proofpoint.com/v2/url?u=https-3A__mailarchive.ietf.org_arch_msg_mboned_pgw9SLTUvjSGZ4jGKDjYmyheFOA&d=DwIGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=iw2TU3OZ0CDpCbqeV23zdah2FoG9Do-zEmGgWTaavDg&m=5B2Q9Qi_7Vs-C0IJQ8m6_1mazviWrkJeBlTCBKB5rvs&s=rUqinpiSDianQ6D3sbqDY4e0VquYNevgB61tr3kPxeY&e=

In the same video (mboned mtg recording), I talked about this at 1:23:20 
till ~ 1:26:00 and then Mikael confirmed my suspicions that it was a bad 
idea at 1:31:20.  Bottom line is Global Anycast is a backhole waiting to 
happen, so I don't think it'll be a viable deployment option.  Now, local 
relays using anycast addresses from a provider's space, such that each AMT 
provider will have it's own anycast set (analogous to anycast RPs), does 
seem like it'll be a good deployment option.

| </jh>
|     
|     Anyway, could this section just include a simple list of all the options
|     in order of pref?  Something like:
|     
|     1) DNS-SD
|     2) DRIAD
|     3) Admin config of GW or App level
|     4) Global Anycast address
| 
| <jh>
| I like this idea, thanks, I think it will make things clearer here.
| 
| However, I don't think the ordering you've given is right.  In the absence
| of administrative config, I think (pending further discussion of the above
| comment) the order would look like this:
| 
|    1) DNS-SD
|    2) Global Anycast (mainly to support local usage!)
|    3) DRIAD
| 
| I guess one way to look at this is to just put admin config in the very front:
|    0) Administrative config
| 
| However, I think in general, administrative config is also capable of doing
| things like suppressing one or more of these steps, or changing the ordering
| of these steps, or adding other steps that take account of other information
| about the network to influence ordering.
| 
| In that sense, I'm not sure just sticking "administrative config" on the front
| of the list makes as much sense as keeping it outside this list, in order to be
| a super-override for the list as a whole.
| 
| So my proposed update to incorporate your excellent suggestion for making a
| numbered short summary list for easy reference is to make this change:
| 
| OLD:
|    Accordingly, AMT gateways SHOULD by default prefer relays first by
|    DNS-SD if available, then with the anycast addresses defined in
|    Section 7 of [RFC7450] (namely: 192.52.193.1 and 2001:3::1), then by
|    DRIAD as described in this document (in precedence order, as
|    described in Section 4.2.1).
| 
|    This default behavior MAY be overridden by administrative
|    configuration where other behavior is more appropriate for the
|    gateway within its network.
| 
| NEW:
|    Accordingly, AMT gateways SHOULD by default prefer relays in this
|    order:
| 
|       1. DNS-SD
|       2. Anycast addresses from Section 7 of [RFC7450]
|       3. DRIAD
| 
|    This default behavior MAY be overridden by administrative
|    configuration where other behavior is more appropriate for the
|    gateway within its network.
| 
| Additionally, I'll remove the numbers on the long-form explanations
| above this piece in 2.4.2, since I think multiple different numbering
| schemes in the same section would add confusion.
| 
| If you think it's better, I could also put this in front of the big
| explanations, take out "Accordingly, ", and add in something like "the
| reasoning for this preference ordering is described below".  That's not
| done in my local copy, but if I get responses with "yes, that's better"
| here I'm happy to make the change.  Whatever's most clear would be great.
| 
| (Or if that doesn't address your concerns, can you suggest some text that
| would, which takes into account the above considerations?  Thanks.)

OK, what you suggest for the admin config sounds reasonable and does 
provide ample wiggle room for flexibility.  I am still a bit nervous about 
having Global Anycast, a mechanism so fraught with peril, ahead of DRIAD, 
though I do understand your pref for local relays.  What if you mentioned 
something like "#2 Locally deployed relays in the receiver's ISP, which 
may (or may not) utilize the Anycast addresses from Section 7 of 
[RFC7450]"?  Or must it use the global anycast addresses?

And having a simple numbered list with explanations for each, and perhaps 
rationalization for the order, sounds like agood approach.


| </jh>
|     
|     Sect 3.2.1: 1st para, last sentence, “… by finding a A or AAAA records..”
|             -“ by finding an A or AAAA record” or “by finding A or AAAA
|     records”
| <jh>
| Fixed locally, thanks.
| </jh>
|     
|     
|     Other Relay discovery options- as I mentioned, in the VLC build with AMT,
|     we have a configurable option for the relay address with a well-known fqdn
|     with multiple A records as the default.  It will then receive all the A
|     records as an ordered list and try to use one at a time until it receives
|     data.  This method provides relay discovery and resilience, but not
|     optimality.  In Prague, got a suggestion from Tom P that you could get
|     optimality by pinging each of the relays from the list of A records and
|     choosing the one with the lowest latency (or perhaps joining all relays
|     and then selecting the one with the healthiest stream and pruning the
|     others).  Do you think these options should be mentioned anywhere in this
|     doc?
| <jh>
| I like this idea, and I agree it's a good concept to get into the doc somewhere.
| I think it works well as a heuristic that should be mentioned somewhere.
| 
| I think recommending ping specifically is a bad idea (it's not so clear that the
| ICMP path RTT will be the same as the UDP path RTT), though I guess it's maybe
| reasonable in a lot of places.  RTT of the response between sending the Request
| packet and receiving the Membership Query packet (plus history of that metric
| when it's known) sounds like a better approach in general, so I guess if we're
| putting something in about this, I'd like it to capture that usage, or I'd at
| least prefer to avoid a mention of ping in particular as compared with other
| measurements.
| 
| What do you think of a change in section 2.4.2 to integrate this suggestion?
| Would this cover what you're looking for?
| 
| OLD:
|    Among relay addresses that still have an equivalent preference after
|    the above orderings, a gateway MUST make a non-deterministic choice
|    for relay preference ordering, in order to support load balancing by
|    DNS configurations that provide many relay options.  (Note that
|    gateways not implementing a Happy Eyeballs algorithm are not required
|    to use the Destination Address Selection ordering, but are still
|    required to use non-deterministic ordering among equally preferred
|    relays.)
| 
| NEW:
|    Among relay addresses that still have an equivalent preference after
|    the above orderings, a gateway MUST make a non-deterministic choice
|    for relay preference ordering, in order to support load balancing by
|    DNS configurations that provide many relay options.
| 
|    The gateway MAY introduce a bias in the non-deterministic choice
|    according to network topology or timing information obtained out of
|    band or from a historical record.  The collection of this information
|    is out of scope for this document, but a gateway in possession of
|    such information MAY use it to prefer topologically closer relays.

How about "... according to network topology or response to some sort of 
probing mechanism obtained ..."?

| 
| (This suggestion also cuts out what I think having re-read this bit is
| probably a useless side note that happens to be in the same spot, but if
| somebody doesn't like the edit, please let me know as a separate point.)
| </jh>
| 
| <jh>
| Thanks very much for your comments, and please anyone feel free to jump
| in here with opinions and responses.
| 
| Best regards,
| Jake
| </jh>    
|     
|     On Fri, 12 Apr 2019, Leonard Giuliano wrote:
|     
|     | 
|     | In Prague, there appeared to be solid support to initiate last call, so we
|     | would like to officially begin working group last call for
|     | draft-ietf-mboned-driad-amt-discovery.  Please post whether you support/oppose
|     | the advancement of this draft as well as any comments you may have to the list
|     | by May 3.  Also, please note if you are aware of any IPR involved in this
|     | draft (we must hear from the author about IPR).
|     | 
|     | Most recent version of the draft can be found here:
|     | 
|     | https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dietf-2Dmboned-2Ddriad-2Damt-2Ddiscovery_&d=DwIGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=iw2TU3OZ0CDpCbqeV23zdah2FoG9Do-zEmGgWTaavDg&m=5B2Q9Qi_7Vs-C0IJQ8m6_1mazviWrkJeBlTCBKB5rvs&s=bdXOvMCVQ0eopeNSHcSHJLpx0E8A_abVYFeOYvbtwVw&e=
|     | 
|     
|     _______________________________________________
|     MBONED mailing list
|     MBONED@ietf.org
|     https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_mboned&d=DwIGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=iw2TU3OZ0CDpCbqeV23zdah2FoG9Do-zEmGgWTaavDg&m=5B2Q9Qi_7Vs-C0IJQ8m6_1mazviWrkJeBlTCBKB5rvs&s=cfmFRgGtQ5R5k-SgsRnt8-P5lkvvJ_5apkUetxJjkm0&e=
|     
| 
|