Re: [MBONED] MNAT draft

Leonard Giuliano <lenny@juniper.net> Thu, 12 November 2020 23:27 UTC

Return-Path: <lenny@juniper.net>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5DCD3A0FC4 for <mboned@ietfa.amsl.com>; Thu, 12 Nov 2020 15:27:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=AHUOCUnm; dkim=pass (1024-bit key) header.d=juniper.net header.b=Hne4CIJL
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nkdK2MNYzNVh for <mboned@ietfa.amsl.com>; Thu, 12 Nov 2020 15:27:50 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5E913A0F00 for <mboned@ietf.org>; Thu, 12 Nov 2020 15:27:49 -0800 (PST)
Received: from pps.filterd (m0108163.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 0ACNHpLH021689; Thu, 12 Nov 2020 15:27:48 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=date : from : to : cc : subject : in-reply-to : message-id : references : mime-version : content-type : content-transfer-encoding; s=PPS1017; bh=+AwxnI6Uj89fFhA3j9IVFOiXqQpL43YsokUxzsnCShs=; b=AHUOCUnm2FGvAwqUlw3O83JzKk+w8f6iqIldVZRdzTwwRREGQ0/3wD7QJ1rAm/C5dQfZ uKi3b0iJ1YvTGm0I6zEG9iqWVU/rnrVYY9ZFine06/u/ZBgZwssqip8AsScq/HIk9vHL R1Oc2+qbTxyu/6dgpP2idi2g3vgDd6Tn6fhBJ3+RHrB5HVQImSN+prc1RTRWHEfn3ogB 9TWI73SrWs2AdPFPPEkN/1ne3I9v4dtA1t4Mf/4CKza0uOAUM4xBSlv8tZiWnOqFNSsL BuOm377t7fPqsY6diUSLjQEAVvH79FReXY1CSihSbpshGfYOcrnc5pOyXLATjV0zWQ0y iw==
Received: from nam02-bl2-obe.outbound.protection.outlook.com (mail-bl2nam02lp2052.outbound.protection.outlook.com [104.47.38.52]) by mx0b-00273201.pphosted.com with ESMTP id 34s8pk8p2m-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 12 Nov 2020 15:27:48 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=i2WKwsFVlq1/0pbvqF2rXck0XBdu2d7FJhCxgC7E0/P2040ejpseAdjpi6Q7ec1W8/WIZoRW3ioaqm63OopjWcH/Slfi4Ev24tHLkb7JFO6kAzfbgeKPv8JqRakYgeXTzOxLm9eKSCK9jxUcXov8LsjlCTVd5TcSu2ve0o22QJa4N4mWAjmhMutQ93pQ9DrvMM5jrbx7ql4k9WgJ/wE8fHolmCACrje19E+DZoCloQ2Fcu0qGAUixYGZ9WpZFXABAN9IpPj7tDZ2+3wHjnzRSer7u5RVSt5n46bcZqswByY3oSO2SnKq6csrPhap7erfzeQ+xlB8OWfbmhTldRTf9g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+AwxnI6Uj89fFhA3j9IVFOiXqQpL43YsokUxzsnCShs=; b=O+Vo6AJHlVihqa+gk49Mb3vlqOvHDNxfB4d/pScEnyklzzITeQa8EUdO8f9Pak6GceQIp9n9i3fXGf+8SGOhHHBBGZjmUx1IYQya3fkIbGn1OJX3R5SdPzw5M34oc4EDWOFtVhfnmB7aZDDB0jfs+Q2ZvO3fJkIaNpG8CKBo/zuarUlRJjYauievWMog2XSu58FQgnAd2GQ27CMi78a9eGaBaIcF0qIn9h+gaqkRnV+gwKMAFUfwrO50/NuO99wQ/nkjx5qmd0ZS+Rg9vfzgTGM1QKQcSXBc72pn0d+AMJKSVklq1WzM9JlOHKYTDLrnC+nOXm0VEh6PwMnPbzevXQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=softfail (sender ip is 66.129.242.13) smtp.rcpttodomain=akamai.com smtp.mailfrom=juniper.net; dmarc=fail (p=reject sp=reject pct=100) action=oreject header.from=juniper.net; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+AwxnI6Uj89fFhA3j9IVFOiXqQpL43YsokUxzsnCShs=; b=Hne4CIJLGVWURTLHgDVDZrD2+ubdqd6GA3MD5l+12Y4rXh8IkewYtLEfywW+yrLkboWBkkymlsfEiQkBhkY7U83SC5Rf0UZHqSzjmY8rJQi1sRUsGAaLy2mz7D4Y+4bA1e2a3yOi6navIeEp8e7hcxtjYIw7vZMJTCUKvRiBd6M=
Received: from DM6PR02CA0058.namprd02.prod.outlook.com (2603:10b6:5:177::35) by BYAPR05MB6502.namprd05.prod.outlook.com (2603:10b6:a03:f0::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3564.14; Thu, 12 Nov 2020 23:27:45 +0000
Received: from DM3NAM05FT009.eop-nam05.prod.protection.outlook.com (2603:10b6:5:177:cafe::33) by DM6PR02CA0058.outlook.office365.com (2603:10b6:5:177::35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3541.21 via Frontend Transport; Thu, 12 Nov 2020 23:27:45 +0000
X-MS-Exchange-Authentication-Results: spf=softfail (sender IP is 66.129.242.13) smtp.mailfrom=juniper.net; akamai.com; dkim=none (message not signed) header.d=none;akamai.com; dmarc=fail action=oreject header.from=juniper.net;
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning juniper.net discourages use of 66.129.242.13 as permitted sender)
Received: from P-EXFEND-EQX-02.jnpr.net (66.129.242.13) by DM3NAM05FT009.mail.protection.outlook.com (10.152.98.115) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.3589.12 via Frontend Transport; Thu, 12 Nov 2020 23:27:44 +0000
Received: from P-EXBEND-EQX-01.jnpr.net (10.104.8.52) by P-EXFEND-EQX-02.jnpr.net (10.104.8.55) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 12 Nov 2020 15:27:44 -0800
Received: from p-mailhub01.juniper.net (10.104.20.6) by P-EXBEND-EQX-01.jnpr.net (10.104.8.52) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 12 Nov 2020 15:27:44 -0800
Received: from eng-mail03.juniper.net (eng-mail03.juniper.net [10.108.12.11]) by p-mailhub01.juniper.net (8.14.4/8.11.3) with ESMTP id 0ACNRhIB005856; Thu, 12 Nov 2020 15:27:43 -0800 (envelope-from lenny@juniper.net)
Received: from eng-mail03.juniper.net (localhost [127.0.0.1]) by eng-mail03.juniper.net (8.15.2/8.14.9) with ESMTPS id 0ACNSLV4012204 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Thu, 12 Nov 2020 15:28:21 -0800 (PST) (envelope-from lenny@juniper.net)
Received: from localhost (lenny@localhost) by eng-mail03.juniper.net (8.16.1/8.16.1/Submit) with ESMTP id 0ACNSGL2012201; Thu, 12 Nov 2020 15:28:16 -0800 (PST) (envelope-from lenny@juniper.net)
X-Authentication-Warning: eng-mail03.juniper.net: lenny owned process doing -bs
Date: Thu, 12 Nov 2020 15:28:16 -0800
From: Leonard Giuliano <lenny@juniper.net>
To: "Holland, Jake" <jholland@akamai.com>
CC: "mboned@ietf.org" <mboned@ietf.org>
In-Reply-To: <4957CF9E-B91B-4593-B8F1-4A1B718E6E6F@akamai.com>
Message-ID: <b62ff0f2-9bf-9aa-dec5-7741f4465083@juniper.net>
References: <893D0BA2-37C6-4A43-A05D-8B63249F2B9F@akamai.com> <4a8c8590-3e35-afaa-c42a-e4f74feb997e@juniper.net> <4957CF9E-B91B-4593-B8F1-4A1B718E6E6F@akamai.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
X-EXCLAIMER-MD-CONFIG: e3cb0ff2-54e7-4646-8a04-0dae4ac7b136
X-EOPAttributedMessage: 0
X-MS-Office365-Filtering-HT: Tenant
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 69c678aa-4f29-457f-3aad-08d887628f1e
X-MS-TrafficTypeDiagnostic: BYAPR05MB6502:
X-Microsoft-Antispam-PRVS: <BYAPR05MB65022A0F08BDA964B81F9113A4E70@BYAPR05MB6502.namprd05.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: S2eUwYhZHXgU6v8CiPOhOx+VmC4GuxrRBcMZmx1S1mLX09N2vicVHF/wCH1sVHu+tKclgfM8RJnEigsP2+renniswGVNdecBcws8krrNyzgWHIDvvZ9wg3ybb3o0rMrQM5E8CizPyMgz68NX12kpSG9i9h1a1AFEm3hqBW70hI+zOAqhcBJvGAeZp7BBeOYu1ur6gQS60vR8plNSpCyP7oCG1GtMHdIOBdS2vq9r1ibkUm6bKbwa3rGSlOkU7Ufz5GoDHVEjy5RP8XncoTb0olPl5lXnBQVz/hlznvlydNl8rcHRGIeTCOV8PP3PocHB5nOLYRP6lbgv9L2oEMv9HYOkbYeuMtqkLtE3Px9CKZ5MG9JpYdl5cf0gvTAwEZ1bq75RPrfEQ+TDaxFrQN26M7TzjbzY2pTnxKz8+TSkKGPMBqsLjlxtdewv8Hmud6eFJZTukEAPbZCnrdp20hksckHbf3UV9SUyQpaCHH/BEOU=
X-Forefront-Antispam-Report: CIP:66.129.242.13; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:P-EXFEND-EQX-02.jnpr.net; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(4636009)(346002)(136003)(376002)(396003)(39860400002)(46966005)(82740400003)(5660300002)(70206006)(83380400001)(8676002)(36756003)(70586007)(316002)(186003)(82310400003)(86362001)(4326008)(6916009)(336012)(26005)(8936002)(966005)(81166007)(356005)(2906002)(66574015)(47076004)(426003)(2616005)(30864003)(478600001); DIR:OUT; SFP:1102;
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Nov 2020 23:27:44.9153 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 69c678aa-4f29-457f-3aad-08d887628f1e
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=bea78b3c-4cdb-4130-854a-1d193232e5f4; Ip=[66.129.242.13]; Helo=[P-EXFEND-EQX-02.jnpr.net]
X-MS-Exchange-CrossTenant-AuthSource: DM3NAM05FT009.eop-nam05.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR05MB6502
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.312, 18.0.737 definitions=2020-11-12_15:2020-11-12, 2020-11-12 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 phishscore=0 spamscore=0 malwarescore=0 adultscore=0 clxscore=1015 suspectscore=0 mlxscore=0 bulkscore=0 lowpriorityscore=0 mlxlogscore=999 priorityscore=1501 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2011120130
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/tD9u2snc4rb2SxNfr1OfFHwhPzo>
Subject: Re: [MBONED] MNAT draft
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2020 23:27:53 -0000

Thanks Jake, comments inline:

On Thu, 12 Nov 2020, Holland, Jake wrote:

| 
| 
| Hi Lenny,
| 
| Thanks for taking a look.  Responses inline with <jake></jake>
| 
| On 11/11/20, 8:29 PM, "Leonard Giuliano" <lenny@juniper.net> wrote:
| 
| Jake,
| 
| Thanks for posting this draft.  Some comments:
| 
| -Based on the discussion in MBONED in IETF 108, my understanding of the
| purpose of this translation is to handle the situation where routers
| within a domain (eg, BGP-free core) do not have routes to the source and
| thus RPF will fail.  Is that the case, or am I misunderstanding the
| motivation of this translation?  I found 1.3 to be pretty vague and it's
| not terribly clear to me from the doc what is the exact problem being
| solved here.
| 
| <jake>
| It wasn't just one problem.
| 
| Several different networks raised several different issues, and I
| noticed they all can be solved by giving the network the ability
| to assign their own local addresses for transporting traffic from
| global (S,G)s.
| 
| I think I actually forgot to include the case where RPF fails
| because the route to the source doesn't go backwards through the
| ingest point.  That was one of the scenarios as well and I should
| have included it, thanks for reminding me.  But even with a
| solution for RPF, the other use cases I listed were still stoppers
| to deploying multicast for at least one network each, and can be
| solved by using locally assigned addresses for a global (S,G)'s
| traffic.
| </jake>
| 
| -If my assumption was correct, and this is trying to solve the issue of
| RPF failing bc intermediate routers lack source routes in the MRIB, there
| have been some other solutions proposed to solve this problem.  GTM
| (RFC7716) is one example, and I recall from long ago an "rpf-hint" was
| proposed, but I think that may have been abandoned in later versions of
| the Rosen MVPN draft.  Anyway, might be worth covering why these solutions
| fell short in solving the problem.
| 
| <jake>
| I think some networks might be able to use RFC 7716 instead of this,
| yes.  I was planning to suggest it as an alternative for those where
| it's appropriate.  In cases where the egress is an on-path device in
| the network, it's probably basically equivalent, I think.
| 
| However, one concern raised was that the CPEs would have to act as a
| CE in the MVPN because the restrictions come from their access devices,
| but upgrading the CPEs is too hard.

Well, keep in mind 7716, by definition, addresses the non-MVPN case.  It 
basically steals MVPN machinery to work in the non-VPN, GRT.  So the CPE 
(or AR in 7716-speak) shouldn't need any modification- as long as it can 
send PIM joins toward the PBRs, as usual, they should be fine.  GTM 
signalling only happens between PBRs (over the BGP-free core), and the ARs 
just follow normal PIM procedures.

| 
| One of the benefits of using an HTTPS-based approach is that the end
| receiver app can directly discover and connect to the MNAT service, so
| that the CPE doesn't have to change in order to get the reassignment.
| Although this might not be technically impossible to do with a VPN
| client library, I think it would be a much harder sell for including
| in for instance a browser, since a BGP connection and a VPN can be a
| lot more heavyweight than a more targeted API that's just about
| address mappings.
| 
| I can put something to that effect in the motivation section along with
| an informative reference to 7716 if you think that's helpful.
| </jake>
| 
| -I could find no mention of what is being translated, the source or the
| group?  Again, I would have assumed just the source, but this is never
| mentioned explicitly.  I can't think of a good reason for translating the
| group address, but maybe I'm missing something.  In any event, might be
| worth explaining whether it's the source or group or both being translated
| and why.
| 
| <jake>
| Both the source and the group are (potentially) translated.  And
| sorry, I agree this part of the text is rough, and I hope to flesh
| it out to a better explanation if this moves along.  The YANG model
| does provide for both options though (though I should also mention
| that's undergoing development as I'm hacking on a prototype...)
| 
| One of the key reasons for translating the group is to support
| deployment models where they are just using static routing for fanout
| and replication (I think either in 239 or 233), but are willing to
| allow external traffic on some set of dedicated group addresses.
| 
| Another reason group addresses need reassigning is to avoid collisions.
| 
| One of the ways people are working around legacy IGMPv2 systems is by
| using an ASM join to a 232 group from within the home, but then
| translating it into an SSM join for the same group at the BNG with a
| configured source so it can propagate as SSM within the network.
| 
| However, this fails when there's a collision on the 232 group for an
| external source.  By allowing the network to reassign the group address
| for the global (S,G), the network can avoid collisions with externally
| sourced traffic, even though they're using 232.
| 
| Also for IPv4<->IPv6 translations, of course.

I get the v4-v6 translation, but the rest of this is a bit foggy.  SSM 
mapping is fairly common for legacy devices that can't do IGMPv3.  But in 
order for a collision in SSM to happen, BOTH the source and group must be 
the same.  I'm struggling to see how that kind of overlap would happen, so 
I must not be understanding this scenario correctly.

Also, I am missing the part about the static stuff entirely.  I don't see 
a nexus between static multicast routing and the need for translation, so 
again, I'm misunderstanding this scenario.

| </jake>
| 
| -Sect 1, 2nd para: "for the purpose of working around various
| addressing-related issues"
|         -this is pretty vague; might be good to specify some examples of those issues
| 
| <jake>
| Section 1.3 lists examples, and the next sentence after this one
| provides a reference to it.
| 
| I thought it was clearer this way than trying to make the sentence
| longer to include examples.  I'm open to suggestions on making this
| clearer, but everything I tried here seemed worse until I landed on
| "put examples in a different section and reference that".  Do you
| have any suggestions of text that does this better?

No, I guess the problem is that 2 of the 3 cases mentioned in 1.3 are 
foggy for me, and the one case I did have in mind was not there.

| </jake>
| 
| -Sect 2.1: given that directionality of mcast routing can be relative
| (control plane goes in one direction, traffic in the other), might be
| helpful to specify that the "ingress node" is the translating node closest
| to the source while "egress node" is the node closest to the receiver to
| make it absolutely clear.
| 
| <jake>
| I agree the terms "closest to the source" and "closest to the receiver"
| are a very helpful clarification to include, probably both here and in
| the definitions section, thanks.  I was thinking I'd also try to get a
| diagram in here before long if this is to move forward, but I agree it's
| important to be really clear on this point, and thanks for the suggestion.
| </jake>
| 
| -Sect 1.3, 3rd bullet: "...packet replication channels with static group addresses ..."
|         -static groups or static routing?
| 
| <jake>
| I guess I probably mean static routing.  Now that you mention it though,
| I'm not sure I know the difference, except that "static groups" might not
| be defined.  I know everybody uses the term "static route", but I'm also
| not sure where that's defined--do you think there's a good reference, or
| that it's sufficiently well-understood if I just change it to "static
| routing"?

I would guess that static routing is pretty well-understood.  It's less 
common for mcast, but does happen.  As written, it sems to be referring to 
addressing, not routing.

| </jake>
| 
| -Sect 1.3, next sentence: "...use of static provisioning of multicast groups..."
|         -same as above, static provisioning, or static routing?  Can you
| be more specific about what is static here?
| 
| -Sec 2.1, last sentence: yes, a diagram would be very helpful.  The slide
| referenced was very helpful.
| 
| -Sect 2.1.1, penultimate para: "Premesis" misspelled.
| 
| -Sect 2.4.3, last para: "addreessing" misspelled
| 
| <jake>
| Thanks, spelling errors fixed in my local copy.
| 
| And thanks very kindly for the review and all the thoughtful
| comments!
| 
| -Jake
| </jake>
| 
| 
| -Lenny
| 
| On Mon, 9 Nov 2020, Holland, Jake wrote:
| 
| |
| |
| | Hi mboned,
| |
| | I also wanted to draw to your attention a new draft I'll be
| | going over in the upcoming meeting.  It's about automating
| | multicast NAT to get global multicast traffic delivered in
| | spite of restrictions that may prevent the use of the global
| | addresses inside particular networks, for a few different
| | reasons:
| | https://urldefense.com/v3/__https://tools.ietf.org/html/draft-jholland-mboned-mnat-00__;!!NEt6yMaO-gk!WWrhysPgI-3oi4ENEZG06n5mKR9GaBavMtFzqhprxgPbUsFr9BxIDx7LOA1GhU4$
| |
| | This work came out of the feedback I got about stoppers for
| | ISPs to deploy delivery for externally sourced multicast
| | traffic to clients inside their networks. So I think it's a
| | suitable topic for mboned to consider as part of solving that
| | end-to-end delivery problem.
| |
| | I touched on this (under the name GNATS) in IETF 108[1], but
| | now I've finally posted a draft with something closer to a
| | detailed explanation of how it might work.  It's still kinda
| | rough, but feedback is very welcome.
| |
| | I took Lenny's suggestion to call it "Multicast NAT", but
| | this name perhaps conflicts with some existing features in
| | existing routers[2] that are only loosely related to what
| | this doc is describing.  Maybe I need to change it to
| | "Multicast NAT Service" or something, or maybe it needs a
| | different name altogether, not sure.
| |
| | I'm not sure how firm this particular approach is.  I'm still
| | working on cobbling together a prototype and might encounter
| | a need for some significant changes or extensions to the
| | model, but I wanted to get a strawman version out there to kick
| | around and see if anybody has a problem with the approach I'm
| | proposing.
| |
| | Assuming I don't find a fatal flaw in this approach before we
| | meet, I'd like the WG to consider adoption (or suggest a
| | better path forward), so please take a look at the draft if
| | you get a chance.
| |
| | Thanks and regards,
| | Jake
| |
| | [1] Page 7-9 of the slides from mboned 108:
| | https://urldefense.com/v3/__https://www.ietf.org/proceedings/108/slides/slides-108-mboned-status-update-on-multicast-to-the-browser-00.pdf*page=7__;Iw!!NEt6yMaO-gk!WWrhysPgI-3oi4ENEZG06n5mKR9GaBavMtFzqhprxgPbUsFr9BxIDx7LNL6bFeI$
| |
| | [2] For example, Juniper and Cisco each have configuration docs
| | for multicast NAT:
| | https://urldefense.com/v3/__https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/xe-16/nat-xe-16-book/iadnat-multicast-dynamic.html__;!!NEt6yMaO-gk!WWrhysPgI-3oi4ENEZG06n5mKR9GaBavMtFzqhprxgPbUsFr9BxIDx7LiRw-85I$
| | https://urldefense.com/v3/__https://www.juniper.net/documentation/en_US/junos/topics/example/nat-multicast-traffic-configuring.html__;!!GjvTz_vk!DFkAbwF3nscWJGh0s2Yt0bG7GakNAlHE_DUY6YLvJP03HbOLOh6xvttE_1rL0QA$
| |
| |
| | _______________________________________________
| | MBONED mailing list
| | MBONED@ietf.org
| | https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/mboned__;!!NEt6yMaO-gk!WWrhysPgI-3oi4ENEZG06n5mKR9GaBavMtFzqhprxgPbUsFr9BxIDx7LI6pWc6A$
| |
| 
|