Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

Edward Crabbe <edc@google.com> Tue, 21 January 2014 20:04 UTC

Return-Path: <edc@google.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90A8E1A0341 for <mpls@ietfa.amsl.com>; Tue, 21 Jan 2014 12:04:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.913
X-Spam-Level:
X-Spam-Status: No, score=-1.913 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.535, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MN5B3SrXydEt for <mpls@ietfa.amsl.com>; Tue, 21 Jan 2014 12:04:14 -0800 (PST)
Received: from mail-wi0-x233.google.com (mail-wi0-x233.google.com [IPv6:2a00:1450:400c:c05::233]) by ietfa.amsl.com (Postfix) with ESMTP id 30ACE1A0349 for <mpls@ietf.org>; Tue, 21 Jan 2014 12:04:14 -0800 (PST)
Received: by mail-wi0-f179.google.com with SMTP id hr1so4831051wib.0 for <mpls@ietf.org>; Tue, 21 Jan 2014 12:04:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=28PwozEsKPVJCcg1IPGPdHG7dP++qF+/6Vp5YWK9UNo=; b=i3wqLYSXfPGsuQkDVw7hW6fROzkz9eS65urLQS1G9KUUbk+zk4ISsuFM3AEvULv23p nLCT26He1Fg1f6SThy7eM32HeWRUnjsIGDJBbpoG2Srmy8sMBXRXSYW5RS0ftFOkiwA0 1vPMNX9vBjkeBP94X4A0Lv9mjGaSubScK2hl/AdAX/gOwYGN9xJ8UoG1RtQgWU3YNkt8 aXBciwJsBdIrp5ueUrhXMVrC5xlL8EOuNt9aVAU16xnomdRExXZd/0bHoHsPJ+Qftefw WuGXXC/3Xz4W7HOobajSApg9o1rqXrKoDtJZWOs4RHSyGLz4PEZrP7Cla5qjvegCz/9j EnhQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=28PwozEsKPVJCcg1IPGPdHG7dP++qF+/6Vp5YWK9UNo=; b=El4uX1kWE+PJdDglk96SsJ9QJKTaEBwOCGmJ1qJrFOMAmRYBmNRtR4CHyvtzdLrbf5 Awxeo9OMWvk0NVIIOcMBJruuGqXVzEmTVeoudXhQo6andW1L76UuxIxzNN2vUGyX00SH gYzQKpVI7NskYtgritHC+BX+VWYxGo0h64wmn21RYFRca+O+9l0hUHR/uB/dgWR4Aklr oiH6T48EVzoJq7LBtVqcxCT77NTXG3i+Ls3jZXZPXknaWFJ0L4YAaiTcNwbIxytGhxgw vRg82lMVUOajrooReQGzdcqy8wY6bwFFwxaJpjYZc4ctPs7MYjiuNEz5E1rIp1q1xRgX xDdg==
X-Gm-Message-State: ALoCoQn5zueTWEeLrFzji9bq8ix8c+1zKeGJLcBofZ/aSn+peqWf7ZfWRCciQtVnEXp6FaTuOoCVaDX/34IypS2rplYoJ4fOzdeX/4nQ17ELPnP2PsMkVXggcvKSiO0jwZlzBzSiU29c7+nVGbBzAClJY42WXt5dcLq9JAO2Ay1ZYKAsB1DYKENrowg5YY4Qvqno0cU6oE9k
X-Received: by 10.180.93.169 with SMTP id cv9mr16301047wib.3.1390334653469; Tue, 21 Jan 2014 12:04:13 -0800 (PST)
MIME-Version: 1.0
Received: by 10.194.23.3 with HTTP; Tue, 21 Jan 2014 12:03:32 -0800 (PST)
In-Reply-To: <290E20B455C66743BE178C5C84F1240847E63346DA@EXMB01CMS.surrey.ac.uk>
References: <290E20B455C66743BE178C5C84F1240847E63346D1@EXMB01CMS.surrey.ac.uk> <201401202247.s0KMllSl047284@maildrop2.v6ds.occnc.com> <290E20B455C66743BE178C5C84F1240847E63346D6@EXMB01CMS.surrey.ac.uk> <52DE5F19.1060907@cisco.com> <558A15A9-204A-4447-923C-58DC2A3CED8A@netapp.com> <52DE680C.30704@cisco.com> <290E20B455C66743BE178C5C84F1240847E63346D9@EXMB01CMS.surrey.ac.uk> <CACKN6JFuwKPMmKWuooJqoGR9zL87k-pqv87MVt3fCPnLuEOMhQ@mail.gmail.com> <290E20B455C66743BE178C5C84F1240847E63346DA@EXMB01CMS.surrey.ac.uk>
From: Edward Crabbe <edc@google.com>
Date: Tue, 21 Jan 2014 12:03:32 -0800
Message-ID: <CACKN6JGyJxr4d=LcvzE7HokVW=o-rmzYoJ7nwdfTKonapuiHEQ@mail.gmail.com>
To: l.wood@surrey.ac.uk
Content-Type: multipart/alternative; boundary="f46d043c7fc023b60b04f0808325"
Cc: joel jaeggli <joelja@bogus.com>, "mpls@ietf.org" <mpls@ietf.org>, "Eggert, Lars" <lars@netapp.com>
Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jan 2014 20:04:18 -0000

Please see 6935,6936.

You've conveniently ignored most if not all of the arguments Curtis has
made in the past ~30 messages.  I won't repeat them again here.

If you really are so concerned about potential corruption scatter and
header integrity issues beyond FEC/FCS for v6 protocols, perhaps you should
propose a v6 checksum hop-by-hop extension header.  :)


On Tue, Jan 21, 2014 at 11:36 AM, <l.wood@surrey.ac.uk> wrote:

> Oh, 'experience' is never a good play; after all, all experience is
> ultimately anecdotal. But as an argument, it's being used by all sides. We
> haven't seen missent traffic errors, because we're not looking for them.
>
> The question is, what does the end-to-end argument support?
>
> And surely the burden of proof falls on those making the change (this
> draft); first, do no harm. The end-to-end principle and the precautionary
> principle are strong arguments.
>
> Stone's papers, though technologically dated, support the underlying
> principle and provide analysis - you want a modern setting, I'm quite happy
> with proof of principle. Weird stuff happens; an end-to-end check can catch
> it.
>
> Lloyd Wood
> http://about.me/lloydwood
> ________________________________________
> From: Edward Crabbe [edc@google.com]
> Sent: 21 January 2014 19:19
> To: Wood L  Dr (Electronic Eng)
> Cc: stbryant@cisco.com; Eggert, Lars; joelja@bogus.com; mpls@ietf.org
> Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> (Encapsulating MPLS in UDP) to Proposed Standard
>
> I don't think the 'experience' card is such a good play here Lloyd.  Many
> people on this list, and certainly a few of the ones you've been directly
> arguing with, have no small amount experience running *extremely* large,
> geographically distributed networks.   I've spent a bit of time running
> some very large backbones and major content providers myself, and I have to
> say, I'm finding most of your arguments here to be unconvincing at best.
>
> I do find it a bit ironic that you're asking for (difficult to gather,
> vendor variable and generally poorly documented) data form Stewart, when
> your own argument has yet to be substantiated via any form of quantitative
> impact analysis, either empirically or theoretically in a modern setting.
>  I'd be interested in seeing empirical (back)scatter collection data
> (similar to what Morley or Savage have done) to get some idea of impact
> here.  I strongly suspect that corruption scatter will be trivial, and
> certainly completely overwhelmed in terms volume by typical, day to day
> DDoS backscatter.  Perhaps this may be an idea for your next research paper?
>
> With regard to the congestion-control-of-all-tunnel-protocols argument: I
> find the argument to be specious.  Curtis summed up the end-to-end version
> of this argument pretty succinctly in an earlier email, to wit:
>
> If congestion aware or using a congestion aware transport, the top
> level applications are still congestion aware.  If congestion
> ignorant, they are still congestion ignorant.  If hostile, they are
> still hostile.
>
>
> On Tue, Jan 21, 2014 at 9:56 AM, <l.wood@surrey.ac.uk<mailto:
> l.wood@surrey.ac.uk>> wrote:
> Stewart
>
> the IP header check is not the UDP pseudoheader check - and IPv6 has
> neither.
>
> If a NAT gets a corrupted header, won't it open up new state and attempt
> to translate for that header? Remember, this is UDP, not TCP - it's not on
> an existing connection that must have already been opened by SYN/ACK, where
> the NAT is more likely to reject it as unknown.
>
> 'NATs, which rewrite and can trash headers, demonstrate and validate the
> integrity of the Internet' is not a good argument imo.
>
> I'd like to see some evidence for '"obscure" IP protocol numbers will get
> dropped by default at NATs and firewalls.'. IP/GRE is relatively
> state-free, nothing much to translate at transport there - it's not SCTP.
> I've spent a couple of years running an ISP, and the 'oh, that protocol
> won't go through your NAT' has not come up.
>
> Lloyd Wood
> http://about.me/lloydwood
> ________________________________________
> From: Stewart Bryant [stbryant@cisco.com<mailto:stbryant@cisco.com>]
> Sent: 21 January 2014 12:29
> To: Eggert, Lars
> Cc: Wood L  Dr (Electronic Eng); curtis@ipv6.occnc.com<mailto:
> curtis@ipv6.occnc.com>; Joel Jaeggli; mpls@ietf.org<mailto:mpls@ietf.org>
> Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt>
> (Encapsulating MPLS in UDP) to Proposed Standard
>
> On 21/01/2014 12:07, Eggert, Lars wrote:
> > Hi,
> >
> > On 2014-1-21, at 12:50, Stewart Bryant <stbryant@cisco.com<mailto:
> stbryant@cisco.com>> wrote:
> >> In terms of congestion and misdelivery it is interesting looking
> >> at the number of horses that are already bounding around
> >> in the paddock outside the stable:
> >>
> >> IP types: 47 (GRE) and 137 (MPLS-in-IP) for example.
> > there is a big difference between encapsulation in IP and encapsulation
> in UDP. Everything encapsulated with "obscure" IP protocol numbers will get
> dropped by default at NATs and firewalls, whereas UDO traffic happily
> traverses them. The reach of UDP traffic is much broader.
> >
> > Lars
> So we have established that it's not the load on the NATs and Firewalls
> we are worried about.
>
> Seemingly from the above congestion is off the table as well.
>
> Now surely those same NATs and firewalls will be looking for an SA, DA,
> Type, SP, DP match
> and that is a lot of things that have to be right for a header
> corruption misdelivery to get
> through.
>
> - Stewart
>
>
> _______________________________________________
> mpls mailing list
> mpls@ietf.org<mailto:mpls@ietf.org>
> https://www.ietf.org/mailman/listinfo/mpls
>
>