Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

Xuxiaohu <xuxiaohu@huawei.com> Fri, 24 January 2014 02:42 UTC

Return-Path: <xuxiaohu@huawei.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA0831A02EB for <mpls@ietfa.amsl.com>; Thu, 23 Jan 2014 18:42:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.947
X-Spam-Level:
X-Spam-Status: No, score=-1.947 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, CN_BODY_35=0.339, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.535, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zt5WB9xcngA4 for <mpls@ietfa.amsl.com>; Thu, 23 Jan 2014 18:42:16 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 038A41A0340 for <mpls@ietf.org>; Thu, 23 Jan 2014 18:42:13 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BAJ17807; Fri, 24 Jan 2014 02:42:12 +0000 (GMT)
Received: from LHREML402-HUB.china.huawei.com (10.201.5.241) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.3.158.1; Fri, 24 Jan 2014 02:42:05 +0000
Received: from NKGEML403-HUB.china.huawei.com (10.98.56.34) by lhreml402-hub.china.huawei.com (10.201.5.241) with Microsoft SMTP Server (TLS) id 14.3.158.1; Fri, 24 Jan 2014 02:42:10 +0000
Received: from NKGEML512-MBS.china.huawei.com ([169.254.8.45]) by nkgeml403-hub.china.huawei.com ([10.98.56.34]) with mapi id 14.03.0158.001; Fri, 24 Jan 2014 10:42:06 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: "l.wood@surrey.ac.uk" <l.wood@surrey.ac.uk>, "Alexander.Vainshtein@ecitele.com" <Alexander.Vainshtein@ecitele.com>, "lars@netapp.com" <lars@netapp.com>
Thread-Topic: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
Thread-Index: AQHPF0bUVpx4VpP9lE+4fynfG27EApqQgu4g//+AJQCAAAvVgIABlLXwgAAZTiOAAIGV4IAASynFgAB+v4CAAAUDQYAAAhRggAAIfvuAAAIPgIAAASaAgAALJECAAASQYA==
Date: Fri, 24 Jan 2014 02:42:06 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE082478FD@NKGEML512-MBS.china.huawei.com>
References: <201401212014.s0LKEDXM065730@maildrop2.v6ds.occnc.com> <1811208D-230A-4EA7-B5AA-07E2C0460120@netapp.com> <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE08246CA3@NKGEML512-MBS.china.huawei.com> <DBB76C54-0560-4F4E-ADD4-3C9BB8452820@netapp.com> <e352b74bcf674dc38148a02425e95f98@AM3PR03MB532.eurprd03.prod.outlook.com>, <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE082472BE@NKGEML512-MBS.china.huawei.com> <290E20B455C66743BE178C5C84F1240847E63346E2@EXMB01CMS.surrey.ac.uk>, <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE08247440@NKGEML512-MBS.china.huawei.com> <290E20B455C66743BE178C5C84F1240847E63346E3@EXMB01CMS.surrey.ac.uk>, <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE082477E6@NKGEML512-MBS.china.huawei.com> <290E20B455C66743BE178C5C84F1240847E63346E7@EXMB01CMS.surrey.ac.uk>, <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE0824784D@NKGEML512-MBS.china.huawei.com> <290E20B455C66743BE178C5C84F1240847E63346E8@EXMB01CMS.surrey.ac.uk> , <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE082478AB@NKGEML512-MBS.china.huawei.com> <290E20B455C66743BE178C5C84F1240847E63346E9@EXMB01CMS.surrey.ac.uk>
In-Reply-To: <290E20B455C66743BE178C5C84F1240847E63346E9@EXMB01CMS.surrey.ac.uk>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.111.98.134]
Content-Type: text/plain; charset="gb2312"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "joelja@bogus.com" <joelja@bogus.com>, "mpls@ietf.org" <mpls@ietf.org>
Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jan 2014 02:42:20 -0000


> -----邮件原件-----
> 发件人: l.wood@surrey.ac.uk [mailto:l.wood@surrey.ac.uk]
> 发送时间: 2014年1月24日 10:30
> 收件人: Xuxiaohu; Alexander.Vainshtein@ecitele.com; lars@netapp.com
> 抄送: joelja@bogus.com; mpls@ietf.org
> 主题: RE: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS
> in UDP) to Proposed Standard
> 
> I am not against the bulk of RFC6936. But unlike '36,
> RFC6935 is very much written for the benefit of tunnelers.
> 
> RFC6935 and 36 can be read to give conflicting advice (35 - zero!
> 36 - um, that leads to these subtle and nuanced prroblems, so maybe not), so
> just referring to them and leaving the implementer without clear direction is not
> sufficient imo.

If so, wouldn't it be better to solve such confliction and confusion caused by 6935 and 6936 by updating them? Since these two drafts are originated from the TSV WG, it should represent the rogue WG consensus instead of making confusion to others.

Best regards,
Xiaohu 

> RFC6935 is considering  tunnelled traffic, not the effect on other traffic, ports
> and destinations, which RFC6936 warns against.But even RFC6935, which
> primarily considers the costs/benefits to tunnels, not to traffic sharing the
> network with tunnels does say:
> 
>   One unfortunate side effect of increased use of a zero checksum is
>    that it also increases the likelihood of acceptance when a datagram
>    with a zero UDP checksum is misdelivered.
> 
> Unfortunate, but not for the tunnel, which just sees a drop.
> 
> ..which is why the text I propose says 'SHOULD' use a checksum, while
> acknowledging that performance and implementation reasons may dictate
> otherwise.

> > Note that other IP encapsulations for MPLS do not have a checksum in
> > the tunnel header.
> 
> Other encapsulations don't have UDP ports that can be corrupted, so even if the
> address is corrupted, decapsulation at another tunnel endpoint is far less likely.
> But hosts supporting UDP services are very very common.
> 
> Lloyd Wood
> http://about.me/lloydwood
> ________________________________________
> From: Xuxiaohu [xuxiaohu@huawei.com]
> Sent: 24 January 2014 01:38
> To: Xuxiaohu; Wood L  Dr (Electronic Eng); Alexander.Vainshtein@ecitele.com;
> lars@netapp.com
> Cc: joelja@bogus.com; mpls@ietf.org
> Subject: re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS
> in UDP) to Proposed Standard
> 
> > -----邮件原件-----
> > 发件人: Xuxiaohu
> > 发送时间: 2014年1月24日 9:36
> > 收件人: 'l.wood@surrey.ac.uk'; Alexander.Vainshtein@ecitele.com;
> > lars@netapp.com
> > 抄送: joelja@bogus.com; mpls@ietf.org
> > 主题: 答复: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> > (Encapsulating MPLS in UDP) to Proposed Standard
> >
> > Hi,
> >
> > Since you are not against RFC6936 and RFC6935, how about making the
> > following change:
> >
> > OLD:
> >
> > In the IPv6 UDP encapsulation case, if appropriate according to the
> > requirements defined in [RFC6935] [RFC6936], this field is also
> > RECOMMENDED to be set to zero. Specifically, if the MPLS payload is
> > Internet Protocol (IPv4 or
> > IPv6) packets, it is RECOMMENDED to be set to zero when the inner
> > packet integrity checks is available. In addition, if the MPLS payload
> > is non-IP packet which is specifically designed for transmission over
> > a lower layer that does not provide a packet integrity guarantee, it
> > is RECOMMENDED to be set to zero as well. Otherwise, using zero
> > checksum is NOT RECOMMENDED. Note that other IP encapsulations for MPLS
> do not have a checksum in the tunnel header.
> >
> > NEW:
> >
> > In the IPv6 UDP encapsulation case, as for whether or not it is
> > suitable to use the zero-checksum node, the requirements defined in
> > [RFC6935] [RFC6936]
> 
> s/node/mode
> 
> > SHOULD be strictly followed. Note that other IP encapsulations for
> > MPLS do not have a checksum in the tunnel header.
> >
> > Xiaohu
> >
> > > -----邮件原件-----
> > > 发件人: l.wood@surrey.ac.uk [mailto:l.wood@surrey.ac.uk]
> > > 发送时间: 2014年1月24日 9:26
> > > 收件人: Xuxiaohu; Alexander.Vainshtein@ecitele.com; lars@netapp.com
> > > 抄送: joelja@bogus.com; mpls@ietf.org
> > > 主题: RE: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> > > (Encapsulating MPLS in UDP) to Proposed Standard
> > >
> > > For the reasons outlined in RFC6936 section 3, which I cited, and
> > > for the danger to other traffic, which we have discussed in this thread.
> > >
> > > I quote RFC3936:
> > >
> > >  Currently, for the general Internet, there is no evidence that
> > > corruption is rare, nor is there evidence that corruption in IPv6 is
> > > rare. Therefore, it seems prudent not to relax checks on  misdelivery.
> > >
> > >
> > > Lloyd Wood
> > > http://about.me/lloydwood
> > > ________________________________________
> > > From: Xuxiaohu [xuxiaohu@huawei.com]
> > > Sent: 24 January 2014 01:00
> > > To: Wood L  Dr (Electronic Eng); Alexander.Vainshtein@ecitele.com;
> > > lars@netapp.com
> > > Cc: joelja@bogus.com; mpls@ietf.org
> > > Subject: 答复: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> > > (Encapsulating MPLS in UDP) to Proposed Standard
> > >
> > > We are talking about using UDP as a tunnel for MPLS traffic. So why
> > > can't allow the UDP tunnel to use zero checksums for performance,
> > > which is the recommendation from RFC6935.
> > >
> > > Xiaohu
> > >
> > > > -----邮件原件-----
> > > > 发件人: l.wood@surrey.ac.uk [mailto:l.wood@surrey.ac.uk]
> > > > 发送时间: 2014年1月24日 8:48
> > > > 收件人: Xuxiaohu; Alexander.Vainshtein@ecitele.com; lars@netapp.com
> > > > 抄送: joelja@bogus.com; mpls@ietf.org
> > > > 主题: RE: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> > > > (Encapsulating MPLS in UDP) to Proposed Standard
> > > >
> > > > RFC6935 was written from a tunnelling perspective, to allow
> > > > tunnelling to use zero checksums for performance, and analysed
> > > > risks to the tunnel traffic - but not to other users.
> > > >
> > > >    "While the methods do
> > > >    not guarantee correctness, they can reduce the risks of relaxing the
> > > >    UDP checksum requirement for a tunnel application using IPv6."
> > > >
> > > > Risks to other applications are not assessed, and not stated.
> > > >
> > > >
> > > > Lloyd Wood
> > > > http://about.me/lloydwood
> > > > ________________________________________
> > > > From: Xuxiaohu [xuxiaohu@huawei.com]
> > > > Sent: 24 January 2014 00:34
> > > > To: Wood L  Dr (Electronic Eng); Alexander.Vainshtein@ecitele.com;
> > > > lars@netapp.com
> > > > Cc: joelja@bogus.com; mpls@ietf.org
> > > > Subject: 答复: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> > > > (Encapsulating MPLS in UDP) to Proposed Standard
> > > >
> > > > It seems that you are against RFC6935 and RFC6936, right?
> > > >
> > > > Xiaohu
> > > >
> > > > > -----邮件原件-----
> > > > > 发件人: l.wood@surrey.ac.uk [mailto:l.wood@surrey.ac.uk]
> > > > > 发送时间: 2014年1月24日 1:18
> > > > > 收件人: Xuxiaohu; Alexander.Vainshtein@ecitele.com;
> lars@netapp.com
> > > > > 抄送: joelja@bogus.com; mpls@ietf.org
> > > > > 主题: RE: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> > > > > (Encapsulating MPLS in UDP) to Proposed Standard
> > > > >
> > > > > the text is not satisfactory. never recommend setting to zero,
> > > > > as that poses a risk to your and to other traffic. Suggested text:
> > > > > ***
> > > > > The UDP checksum SHOULD be used to protect the payload and
> > > > > ensure correct demultiplexing and delivery to the tunnel, and
> > > > > not to other UDP destinations, by protecting the UDP pseudoheader.
> > > > > Use of a zero UDP checksum is NOT RECOMMENDED, even when desired
> > > > > for performance or necessitated by implementation reasons, for
> > > > > the reasons outlined in [RFC6936] section 3.
> > > > >
> > > > > UDP-Lite [RFC3828] can provide a demultiplexing check and MPLS
> > > > > stack integrity check while avoiding the overhead of computing
> > > > > an integrity check over a tunnelled frame that has its own integrity
> check.
> > > > > ***
> > > > >
> > > > > Lloyd Wood
> > > > > http://about.me/lloydwood
> > > > > ________________________________________
> > > > > From: Xuxiaohu [xuxiaohu@huawei.com]
> > > > > Sent: 23 January 2014 12:35
> > > > > To: Wood L  Dr (Electronic Eng);
> > > > > Alexander.Vainshtein@ecitele.com; lars@netapp.com
> > > > > Cc: joelja@bogus.com; mpls@ietf.org
> > > > > Subject: re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> > > > > (Encapsulating MPLS in UDP) to Proposed Standard
> > > > >
> > > > > > -----邮件原件-----
> > > > > > 发件人: l.wood@surrey.ac.uk [mailto:l.wood@surrey.ac.uk]
> > > > > > 发送时间: 2014年1月23日 12:44
> > > > > > 收件人: Xuxiaohu; Alexander.Vainshtein@ecitele.com;
> > lars@netapp.com
> > > > > > 抄送: joelja@bogus.com; mpls@ietf.org
> > > > > > 主题: RE: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> > > > > > (Encapsulating MPLS in UDP) to Proposed Standard
> > > > > >
> > > > > > Sasha
> > > > > >
> > > > > > > - UDP checksums (or lack thereof) is a non-issue because
> > > > > > > native MPLS does not have anything like that. And yes, there
> > > > > > > are cases where packets are corrupted within the routers)
> > > > > >
> > > > > > So you admit that packets can be corrupted within the routers
> > > > > > - a check that can only be caught by an end-to-end check, a
> > > > > > corruption that can lead to the problems detailed in RFC 6936
> > > > > > section 3 - and then you say it's a non-issue because this
> > > > > > doesn't affect native MPLS. But we're
> > > > > not doing native MPLS here.
> > > > > > We're doing MPLS over UDP.
> > > > > >
> > > > > > draft-ietf-mpls-in-udp-04.txt is about tunnelling MPLS in UDP.
> > > > > > It's an
> > issue.
> > > > > > Please read the other 150 messages that you refer to.
> > > > >
> > > > > Hi Lloyd,
> > > > >
> > > > > The draft doesn't require the IPv6 UDP checksum to be set to
> > > > > zero
> > > regardless.
> > > > > See the following text quoted from that draft:
> > > > >
> > > > > UDP Checksum
> > > > >
> > > > > The usage of this field is in accordance with the current UDP
> > > > > specification [RFC768]. To simplify the operation on the
> > > > > decapsulator, this field is RECOMMENDED to be set to zero in
> > > > > IPv4 UDP encapsulation case. In the IPv6 UDP encapsulation case,
> > > > > if appropriate according to the requirements defined in
> > > > > [RFC6935] [RFC6936], this field is also
> > > > RECOMMENDED to be set to zero.
> > > > > Specifically, if the MPLS payload is Internet Protocol (IPv4 or
> > > > > IPv6) packets, it is RECOMMENDED to be set to zero when the
> > > > > inner packet integrity checks is available. In addition, if the
> > > > > MPLS payload is non-IP packet which is specifically designed for
> > > > > transmission over a lower layer that does not provide a packet
> > > > > integrity guarantee, it is RECOMMENDED to be set to zero as well.
> > > > > Otherwise, using zero checksum is NOT RECOMMENDED. Note that
> > > > > other IP encapsulations for MPLS do not
> > > > have a checksum in the tunnel header.
> > > > >
> > > > > If you still believe the above text is not satisfactory, please
> > > > > provide your
> > text.
> > > > >
> > > > > Best regards,
> > > > > Xiaohu
> > > > >
> > > > > > Lloyd Wood
> > > > > > http://about.me/lloydwood
> > > > > > ________________________________________
> > > > > > From: mpls [mpls-bounces@ietf.org] On Behalf Of Xuxiaohu
> > > > > > [xuxiaohu@huawei.com]
> > > > > > Sent: 23 January 2014 03:16
> > > > > > To: Alexander Vainshtein; Eggert, Lars
> > > > > > Cc: Joel Jaeggli; mpls@ietf.org
> > > > > > Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> > > > > > (Encapsulating MPLS in UDP) to Proposed Standard
> > > > > >
> > > > > > Hi
> > > > > >
> > > > > > > -----邮件原件-----
> > > > > > > 发件人: Alexander Vainshtein
> > > > > > > [mailto:Alexander.Vainshtein@ecitele.com]
> > > > > > > 发送时间: 2014年1月22日 19:05
> > > > > > > 收件人: Eggert, Lars
> > > > > > > 抄送: Joel Jaeggli; mpls@ietf.org; Xuxiaohu
> > > > > > > 主题: RE: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> > > > > > > (Encapsulating MPLS in UDP) to Proposed Standard
> > > > > > >
> > > > > > > Lars and all,
> > > > > > > Last time I've counted the IETF LC thread on this draft has
> > > > > > > more than
> > > > > > > 150 messages in it, and it seems that on some issues
> > > > > > > (congestion control and UDP
> > > > > > > checksums) we are going round the mulberry bush.
> > > > > > >
> > > > > > > IMHO and FWIW:
> > > > > > > - UDP checksums (or lack thereof) is a non-issue because
> > > > > > > native MPLS does not have anything like that. And yes, there
> > > > > > > are cases where packets are corrupted within the routers),
> > > > > > > but so far it did not prevent MPLS deployment. There is,
> > > > > > > e.g., RFC
> > > > > > > 4720 for FCS retention in PWs, but I doubt it is widely
> > > > > > > implemented and deployed (would be nice to
> > > > > > know).
> > > > > > > - E2E congestion control (regardless of its implications)
> > > > > > > simply cannot be added to this protocol without some major
> > > > > > > changes. A short applicability statement explaining that
> > > > > > > should suffice
> > IMO.
> > > > > >
> > > > > > Hi Sasha,
> > > > > >
> > > > > > I fully agree with your points.
> > > > > >
> > > > > > Best regards,
> > > > > > Xiaohu
> > > > > >
> > > > > > > My 2c,
> > > > > > >        Sasha
> > > > > > > Email: Alexander.Vainshtein@ecitele.com
> > > > > > > Mobile: 054-9266302
> > > > > > >
> > > > > > > > -----Original Message-----
> > > > > > > > From: mpls [mailto:mpls-bounces@ietf.org] On Behalf Of
> > > > > > > > Eggert, Lars
> > > > > > > > Sent: Wednesday, January 22, 2014 12:23 PM
> > > > > > > > To: Xuxiaohu
> > > > > > > > Cc: Joel Jaeggli; mpls@ietf.org
> > > > > > > > Subject: Re: [mpls] Last Call:
> > > > > > > > <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in
> > > > > > > > UDP) to Proposed Standard
> > > > > > > >
> > > > > > > > Hi,
> > > > > > > >
> > > > > > > > On 2014-1-22, at 11:12, Xuxiaohu <xuxiaohu@huawei.com>
> wrote:
> > > > > > > > > I wonder whether the following text is OK to you:
> > > > > > > > >
> > > > > > > > > Since the MPLS-in-UDP encapsulation causes MPLS packets
> > > > > > > > > to be
> > > > > > > > forwarded through "UDP tunnels", the congestion control
> > > > > > > > guidelines for UDP tunnels as defined in Section 3.1.3 of
> > > > > > > > [RFC5405] SHOULD be
> > > > > > followed.
> > > > > > > > Specifically, MPLS can carry a number of different
> > > > > > > > protocols as
> > > payloads.
> > > > > > > > When an UDP tunnel is used for MPLS payload traffic that
> > > > > > > > is known at configuration time to be IP-based and
> > > > > > > > congestion-controlled, the UDP tunnel SHOULD NOT employ
> > > > > > > > its own congestion control mechanism, because congestion
> > > > > > > > losses of tunneled traffic will trigger an congestion
> > > > > > > > response at the original senders of the tunneled
> > > > > traffic.
> > > > > > > > When an UDP tunnel is used for MPLS payload traffic that
> > > > > > > > is known at configuration time not to be IP-based and
> > > > > > > > congestion-controlled, the UDP tunnel SHOULD employ an
> > > > > > > > appropriate congestion control mechanism as described in
> > > > > > > > [RFC3985]. Note that it STRONGLY RECOMMENDED to deploy
> > > > > > > > such encapsulation technology only within a SP network or
> > > > > > > > networks of an adjacent set of co-operating SPs, rather
> > > > > > > > than over the
> > > > > > Internet.
> > > > > > > > Furthermore, packet filters should be added to block
> > > > > > > > traffic with the UDP port number for MPLS over UDP to
> > > > > > > > prevent MPLS over UDP packets to escape from the service
> > > > > > > > provider networks due to misconfiguation or packet
> > > > > > > errors.
> > > > > > > >
> > > > > > > > I think it would be better to describe the OAM control
> > > > > > > > loop in
> > > > > > > > (some) more detail, rather than pointing to RFC3985, which
> > > > > > > > doesn't have a whole lot of detail either. Also because
> > > > > > > > the adding of firewall rules requires an OAM hook.
> > > > > > > >
> > > > > > > > Since STRONGLY RECOMMENDED is not an RFC2119 term and
> > > > > > > RECOMMENDED is
> > > > > > > > too weak, I'd suggest to change this to MUST.
> > > > > > > >
> > > > > > > > Finally, the applicability statement should be prominently
> > > > > > > > made in the abstract, introduction, etc.
> > > > > > > >
> > > > > > > > Lars
> > > > > > _______________________________________________
> > > > > > mpls mailing list
> > > > > > mpls@ietf.org
> > > > > > https://www.ietf.org/mailman/listinfo/mpls