[MBONED] mboned/pim: "SSM (in)capable" IGMP snooping switches - and PIM-WG zeroconf work...

Toerless Eckert <tte@cs.fau.de> Thu, 09 November 2023 07:15 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: mboned@ietfa.amsl.com
Delivered-To: mboned@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8ADD0C14CE2E; Wed, 8 Nov 2023 23:15:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.66
X-Spam-Level:
X-Spam-Status: No, score=-1.66 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MIdcHbfhOEhH; Wed, 8 Nov 2023 23:15:15 -0800 (PST)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ACCD7C14CE54; Wed, 8 Nov 2023 23:15:12 -0800 (PST)
Received: from faui48e.informatik.uni-erlangen.de (faui48e.informatik.uni-erlangen.de [131.188.34.51]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTPS id 4SQtWZ5NBjznkyY; Thu, 9 Nov 2023 08:15:06 +0100 (CET)
Received: by faui48e.informatik.uni-erlangen.de (Postfix, from userid 10463) id 4SQtWZ4Vt1zklwc; Thu, 9 Nov 2023 08:15:06 +0100 (CET)
Date: Thu, 09 Nov 2023 08:15:06 +0100
From: Toerless Eckert <tte@cs.fau.de>
To: mboned@ietf.org, pim@ietf.org
Message-ID: <ZUyG-t5rl_X1oxLH@faui48e.informatik.uni-erlangen.de>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/mboned/ulvDZNBBm90d_LdtPePdS14msHQ>
Subject: [MBONED] mboned/pim: "SSM (in)capable" IGMP snooping switches - and PIM-WG zeroconf work...
X-BeenThere: mboned@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Mail List for the Mboned Working Group <mboned.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mboned>, <mailto:mboned-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mboned/>
List-Post: <mailto:mboned@ietf.org>
List-Help: <mailto:mboned-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mboned>, <mailto:mboned-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Nov 2023 07:15:16 -0000

Expanding to mboned, because there may be more operational experience.

draft-ietf-pim-zeroconf-mcast-addr-alloc-ps refers to L2 switches
that do not support SSM - without defining what this means. And
i do not think we have such a definition. 

One possible interpretation is that such L2 switches do not support
IGMPv3/MLDv2 at all, but just IGMPv2/MLDv1, but of course this would
equally impact ASM, so i hope this is not what is being thought of.

The second possible interpretation is that the switch will do
something wrong, such as ignoring IGMPv3/MLDv2 INCLUDE({S},G)
membership reports while not ignoring IGMPv3/MLDv2 EXCLUDE({},G) membership
reports.

I am not aware of such low-end L2 switches limitations, primarily because
several IPTV providers have been running IGMPv3 with SSM for
several years (intohomes withlow-end switches) and that has lead for
such possible gaps in IGMPv3/MLDv2 snooping support to be fixed quite
broadly in the industry. So if you are aware of switches that do have
this problem, i would love to hear about the models. But i would not call
them non-SSM capable, but non-IGMPv3/MLDv2 capable, because
failure to support IGMPv3/MLD2 INCLUDE memberships is not specific
to SSM.

The third possible interpretation is that the switch will
establish per-port MAC(G) filtering for INCLUDE({S},G) membership
reports in the same way as establishing MAC(G) filtering for
EXCLUDE({},G) membership reports. I would hope this is what is
being meant with "non-SSM capable" (but disagree on the term).

This is what i know from all but very high-end
L2 switches. It is also what is recommended in RFC4541
("It is encouraged that snooping switches at least recognize and
  process IGMPv3 Join Reports, even if this processing is limited to
  the behavior for IGMPv2 Joins...")

So, i would recommend to not use non-defined terms such as
"non SSM capable", but clearly specify what the switches are
expected to do that are addressed by the work.

I am having this concern, because the PIM WG drafts written to
address the problems described in this mcast-addr-alloc-ps
do ignore (draft-ietf-pim-ipv6-zeroconf-assignment) or
explicitly reject to consider SSM (draft-ietf-pim-updt-ipv6-dyn-mcast-addr-grp-id-01)
because of this "non SSM capable L2 switch" denomination.

FOr example, i explicitly asked for draft-ietf-pim-updt-ipv6-dyn-mcast-addr-grp-id-01
to support ASM and SSM address ranges and was rejected with that argument.
I think it would be very sad if PIM-WG would go forward explicitly
ignoring SSM in new work without good cause - which i think/hope does
not exist here.

In other words: zeroconf G address allocation free of MAC(G)
collisions in support of low-end L2 switches is as applicable to
SSM address range as it is applicable to ASM address range, and
IMHO really needs to be explicitly supported by these two zeroconf
address allocation documents.

Thanks!
    Toerless