Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

Joe Touch <touch@isi.edu> Wed, 22 January 2014 01:15 UTC

Return-Path: <touch@isi.edu>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79F611A0284; Tue, 21 Jan 2014 17:15:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.235
X-Spam-Level:
X-Spam-Status: No, score=-4.235 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_ABOUTYOU=0.5, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.535] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QVcYqZn5PMbU; Tue, 21 Jan 2014 17:15:18 -0800 (PST)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) by ietfa.amsl.com (Postfix) with ESMTP id 7D9161A0285; Tue, 21 Jan 2014 17:15:18 -0800 (PST)
Received: from [128.9.160.166] (abc.isi.edu [128.9.160.166]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id s0M1EjNh003052 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Tue, 21 Jan 2014 17:14:45 -0800 (PST)
Message-ID: <52DF1B85.4020302@isi.edu>
Date: Tue, 21 Jan 2014 17:14:45 -0800
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: "Eggert, Lars" <lars@netapp.com>, "curtis@ipv6.occnc.com" <curtis@ipv6.occnc.com>
References: <201401171719.s0HHJqHY062965@maildrop2.v6ds.occnc.com> <B36BA2A8-0C28-4B88-87BD-51A6F964F893@netapp.com>
In-Reply-To: <B36BA2A8-0C28-4B88-87BD-51A6F964F893@netapp.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: "mpls@ietf.org" <mpls@ietf.org>, IETF discussion list <ietf@ietf.org>
Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jan 2014 01:15:23 -0000

+1 on all points.

I suspect if more people in transport had the time to track this 
protracted discussion, you'd get the same from them too.

Joe

On 1/21/2014 5:22 AM, Eggert, Lars wrote:
> Hi,
>
> On 2014-1-17, at 18:19, Curtis Villamizar <curtis@ipv6.occnc.com> wrote:
>> You have made your assertions about your desire to uphold the purity
>> of any new UDP applications and adhere to the BCP you wrote.
>>
>> You appear to be very nearly alone in this argument and certainly no
>> one that works with MPLS is siding with you.
>
> the reason we wrote the RFC when I was TSV AD was that we were seeing a whole bunch of questionable uses of UDP over the eyars and we were having the same arguments over and over. That's why we decided to write down the practices we expect users of UDP to follow. This is yet another such questionable use.
>
> (Also, I don't appreciate you turning this into a personal argument.)
>
>> In the end we can put anything we want in the RFC *but* IETF has never
>> truly had the final word on what vendors and operators do in provider
>> networks.
>
> Aka the "take my toys and go home" argument. Heard it many times.
>
>> In this case, regardless of what changes are made to the draft,
>> implementations will offer at least the option for non-RFC behavior by
>> using zero checksums and not using any congestion control.  And
>> providers will make use of it, perhaps exclusively.
>
> And there's nothing wrong with that - the BCP even says that one SHOULD NOT use congestion control for some deployment cases.
>
> But for others, one SHOULD. For those, a mechanism needs to be available, i.e., it needs to be specified and implemented.
>
>> The document might as well reflect reality, despite reality not
>> conforming to your notions of architectural purity.
>
> I'm sorry, but we have certain architectural principles in the Internet that we have IETF consensus on. At least since RFC2914, that includes the need to have congestion control in place.
>
> There are always special deployment scenarios where these principles do not apply, and we typically explain in applicability statements when out specifications can only be safely used under certain conditions. I don't see any such statement in draft-ietf-mpls-in-udp, which to me means it's targeted at general Internet-wide use.
>
>> The best course of action is to put a SHOULD in regarding checksums
>> and put a SHOULD in regarding congestion avoidance.  Even the BCP does
>> not go any further than to say a tunneling protocol SHOULD use
>> congestion control and there were reasons that the word MUST was not
>> acceptable in the BCP.
>
> The SHOULD for congestion control needs to actually describe a mechanism that can be used when needed. It can't be a blanket "you SHOULD use something but we don't tell you what it is"-statement.
>
>> If we are still arguing over two instances of SHOULD vs MUST we have
>> wasted a lot of bandwidth on those two words.
>
> It's not SHOULD vs. MUST. It's two SHOULDs, but in both cases it needs to be specified what is to be done. In the case of checksums, that's obvious (calculate it and check it); in the case of congestion control, some actual mechanism needs to be described (e.g., a circuit breaker).
>
>> IMHO The only remaining question is whether the document can go forward
>> with the definition of congestion control for MPLS over UDP left out
>> of scope and for another document if a need arises.
>
> In my opinion, it cannot.
>
>> If this is not acceptable to you (I doubt it is) please indicate what
>> you would like to see in the document and since this is IETF last call
>> where consensus matters and no one individual has veto power, we'll
>> have to see if there is consensus behind your proposed changes.
>
> I would like the document to specify at the very least a circuit breaker mechanism, that stops the tunneled traffic if severe packet loss is detected along the path.
>
> And this isn't about an "individual veto". This is about a document that is at the moment in violation of IETF consensus at least as far back as RFC2914.
>
> Lars
>