Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

Curtis Villamizar <curtis@ipv6.occnc.com> Sat, 25 January 2014 20:47 UTC

Return-Path: <curtis@ipv6.occnc.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30DAB1A0067 for <mpls@ietfa.amsl.com>; Sat, 25 Jan 2014 12:47:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.437
X-Spam-Level:
X-Spam-Status: No, score=-2.437 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.535, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RuTS6kZJgN7e for <mpls@ietfa.amsl.com>; Sat, 25 Jan 2014 12:47:55 -0800 (PST)
Received: from maildrop2.v6ds.occnc.com (maildrop2.v6ds.occnc.com [IPv6:2001:470:88e6:3::232]) by ietfa.amsl.com (Postfix) with ESMTP id C10F61A0045 for <mpls@ietf.org>; Sat, 25 Jan 2014 12:47:54 -0800 (PST)
Received: from harbor3.ipv6.occnc.com (harbor3.v6ds.occnc.com [IPv6:2001:470:88e6:3::239]) (authenticated bits=128) by maildrop2.v6ds.occnc.com (8.14.7/8.14.7) with ESMTP id s0PKlmgS048899; Sat, 25 Jan 2014 15:47:49 -0500 (EST) (envelope-from curtis@ipv6.occnc.com)
Message-Id: <201401252047.s0PKlmgS048899@maildrop2.v6ds.occnc.com>
To: Greg Daley <gdaley@au.logicalis.com>
From: Curtis Villamizar <curtis@ipv6.occnc.com>
In-reply-to: Your message of "Fri, 24 Jan 2014 03:38:44 +0000." <72381AF1F18BAE4F890A0813768D992817FD35E1@sdcexchms.au.logicalis.com>
Date: Sat, 25 Jan 2014 15:47:48 -0500
Cc: "mpls@ietf.org" <mpls@ietf.org>, IETF discussion list <ietf@ietf.org>, Joe Touch <touch@isi.edu>, Noel Chiappa <jnc@mercury.lcs.mit.edu>
Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: curtis@ipv6.occnc.com
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 Jan 2014 20:47:56 -0000

In message <72381AF1F18BAE4F890A0813768D992817FD35E1@sdcexchms.au.logicalis.com>
Greg Daley writes:
 
> Hi Joel, 
>  
> > -----Original Message-----
> > From: ietf [mailto:ietf-bounces@ietf.org] On Behalf Of Joel M. Halpern
> > Sent: Friday, 24 January 2014 1:32 PM
> > To: Joe Touch; Edward Crabbe
> > Cc: mpls@ietf.org; Noel Chiappa; IETF discussion list
> > Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating
> > MPLS in UDP) to Proposed Standard
> > 
> > Joe, while your argument is internally consistent, it is not consistent with
> > history.  We have not demanded that tunnel entries behave fully like source
> > hosts for any of the other myriad kinds of tunnels we have done over the years.
>  
>  
> Actually, many of the tunnel protocols on the standards track have
> been either for upper-layer IP or Transport protocols or require
> congestion mitigation:
>  
>    RFC 4448 for EoMPLS, and 5994 for Ethernet pseudowires over MPLS
>    each ask that tunnelled protocols support congestion mechanisms,
>    RFC5085 and 5586: VCCV and BFD with VCCV define congestion
>    considerations for pseudowire tunnels.  RFC 4719 updated by RFC
>    5641: Ethernet pseudowires over L2TP (a UDP encapsulated protocol)
>    permit packet loss indications to take down the active circuit.
>    RFC 4454: ATM over L2TPv3 indicates that inelastic flows are
>    stopped when congestion occurs.
>  
> They (ATM over L2TPv3 and Ethernet PW over L2TPv3) also require usage
> over a traffic engineered network.
>  
> RFC 4817 MPLS over L2TPv3 requires non-IP upper layer protocols not to
> exceed the offered load of a typical TCP application on the same path.
>  
> For those protocols which have IP, UDP, TCP, SCCP or DCCP this is just
> passing the buck to the upper layer protocol (which is OK, so long as
> the application protocol in UDP has congestion measures). For
> environments where this cannot be relied upon, additional protocol
> specification and applicability statements have previously been
> applied.
>  
> > If we take your logic as stated, then the usage of IPSec over UDP would be
> > required to apply congestion control unless it knew that all the
> > content traffic was TCP.  Is that really your intent?
>  
> Actually, one of the compelling use cases for running MPLS over UDP
> (or L2TPv3) would be to encapsulate the traffic in ESP in order to
> combat passive snooping.
>  
> For ESP I believe the implicit assumption (via the Traffic Selectors
> in IKE) was that the upper layer protocol is IP or in transport mode
> another protocol such as TCP, UDP etc.
>  
> Sincerely, 
>  
> Greg Daley
> gdaley@au.logicalis.com


Reality check time.

To get the PW over MPLS drafts past the TSV AD there is a SHOULD
regarding congestion control.

AFAIK: No service providers ask for it.  No one implements it.  If
they did implement it no one would deploy it.

PW over MPLS is generally carrying relatively low volumes of high
priority traffic.  The TC bits (MPLS flavor of Diffserv DSCP) are used
to enforce the higher priority.  If congestion occurs other traffic on
that infrastructure (typically plain old Internet) sees loss.  That is
intended.  This is the reality of how PW over MPLS is deployed.

Anyone who knows of implementation or deployment of congestion control
for PW over MPLS can correct me.

I don't know about the "over GRE" or "over L2TP" tunneling.

Curtis