Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

Xuxiaohu <xuxiaohu@huawei.com> Wed, 22 January 2014 00:54 UTC

Return-Path: <xuxiaohu@huawei.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBED31A01BC for <mpls@ietfa.amsl.com>; Tue, 21 Jan 2014 16:54:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.785
X-Spam-Level:
X-Spam-Status: No, score=-1.785 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_ABOUTYOU=0.5, HTML_MESSAGE=0.001, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.535, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YjIrqxmIZxAm for <mpls@ietfa.amsl.com>; Tue, 21 Jan 2014 16:54:23 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) by ietfa.amsl.com (Postfix) with ESMTP id 17C7D1A0125 for <mpls@ietf.org>; Tue, 21 Jan 2014 16:54:21 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml204-edg.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BAF59662; Wed, 22 Jan 2014 00:54:21 +0000 (GMT)
Received: from LHREML406-HUB.china.huawei.com (10.201.5.243) by lhreml204-edg.china.huawei.com (172.18.7.223) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 22 Jan 2014 00:53:19 +0000
Received: from nkgeml405-hub.china.huawei.com (10.98.56.36) by lhreml406-hub.china.huawei.com (10.201.5.243) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 22 Jan 2014 00:54:19 +0000
Received: from NKGEML512-MBS.china.huawei.com ([169.254.8.45]) by nkgeml405-hub.china.huawei.com ([10.98.56.36]) with mapi id 14.03.0158.001; Wed, 22 Jan 2014 08:54:16 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: Alia Atlas <akatlas@gmail.com>, "Eggert, Lars" <lars@netapp.com>
Thread-Topic: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
Thread-Index: AQHPFqwJQAEpMFZHYEa9xrEKIf1dSJqPGN6AgADOQ+A=
Date: Wed, 22 Jan 2014 00:54:15 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE08246B7D@NKGEML512-MBS.china.huawei.com>
References: <201401171719.s0HHJqHY062965@maildrop2.v6ds.occnc.com> <B36BA2A8-0C28-4B88-87BD-51A6F964F893@netapp.com> <CAG4d1rfbvFe06dwAj7GJ5UrpzeWzTJWW1mBiZwF-g5+o2CHppg@mail.gmail.com>
In-Reply-To: <CAG4d1rfbvFe06dwAj7GJ5UrpzeWzTJWW1mBiZwF-g5+o2CHppg@mail.gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.111.98.134]
Content-Type: multipart/alternative; boundary="_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE08246B7DNKGEML512MBSchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Cc: "mpls@ietf.org" <mpls@ietf.org>
Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jan 2014 00:54:25 -0000

Hi Alia,

Your suggestion sounds reasonable to me.

Best regards,
Xiaohu

发件人: mpls [mailto:mpls-bounces@ietf.org] 代表 Alia Atlas
发送时间: 2014年1月22日 4:20
收件人: Eggert, Lars
抄送: mpls@ietf.org; IETF discussion list
主题: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

Apologies for top-posting, but what struck me as very useful that Lars said is:

"There are always special deployment scenarios where these principles do not apply, and we typically explain in applicability statements when out specifications can only be safely used under certain conditions. I don't see any such statement in draft-ietf-mpls-in-udp, which to me means it's targeted at general Internet-wide use."

Why don't we add an applicability statement?  That seems easier than trying to define the appropriate congestion control mechanism which is highly likely to interact badly with the congestion control applied to the encapsulated traffic?

Alia

Alia

On Tue, Jan 21, 2014 at 8:22 AM, Eggert, Lars <lars@netapp.com<mailto:lars@netapp.com>> wrote:
Hi,

On 2014-1-17, at 18:19, Curtis Villamizar <curtis@ipv6.occnc.com<mailto:curtis@ipv6.occnc.com>> wrote:
> You have made your assertions about your desire to uphold the purity
> of any new UDP applications and adhere to the BCP you wrote.
>
> You appear to be very nearly alone in this argument and certainly no
> one that works with MPLS is siding with you.

the reason we wrote the RFC when I was TSV AD was that we were seeing a whole bunch of questionable uses of UDP over the eyars and we were having the same arguments over and over. That's why we decided to write down the practices we expect users of UDP to follow. This is yet another such questionable use.

(Also, I don't appreciate you turning this into a personal argument.)

> In the end we can put anything we want in the RFC *but* IETF has never
> truly had the final word on what vendors and operators do in provider
> networks.

Aka the "take my toys and go home" argument. Heard it many times.

> In this case, regardless of what changes are made to the draft,
> implementations will offer at least the option for non-RFC behavior by
> using zero checksums and not using any congestion control.  And
> providers will make use of it, perhaps exclusively.

And there's nothing wrong with that - the BCP even says that one SHOULD NOT use congestion control for some deployment cases.

But for others, one SHOULD. For those, a mechanism needs to be available, i.e., it needs to be specified and implemented.

> The document might as well reflect reality, despite reality not
> conforming to your notions of architectural purity.

I'm sorry, but we have certain architectural principles in the Internet that we have IETF consensus on. At least since RFC2914, that includes the need to have congestion control in place.

There are always special deployment scenarios where these principles do not apply, and we typically explain in applicability statements when out specifications can only be safely used under certain conditions. I don't see any such statement in draft-ietf-mpls-in-udp, which to me means it's targeted at general Internet-wide use.

> The best course of action is to put a SHOULD in regarding checksums
> and put a SHOULD in regarding congestion avoidance.  Even the BCP does
> not go any further than to say a tunneling protocol SHOULD use
> congestion control and there were reasons that the word MUST was not
> acceptable in the BCP.

The SHOULD for congestion control needs to actually describe a mechanism that can be used when needed. It can't be a blanket "you SHOULD use something but we don't tell you what it is"-statement.

> If we are still arguing over two instances of SHOULD vs MUST we have
> wasted a lot of bandwidth on those two words.

It's not SHOULD vs. MUST. It's two SHOULDs, but in both cases it needs to be specified what is to be done. In the case of checksums, that's obvious (calculate it and check it); in the case of congestion control, some actual mechanism needs to be described (e.g., a circuit breaker).

> IMHO The only remaining question is whether the document can go forward
> with the definition of congestion control for MPLS over UDP left out
> of scope and for another document if a need arises.

In my opinion, it cannot.

> If this is not acceptable to you (I doubt it is) please indicate what
> you would like to see in the document and since this is IETF last call
> where consensus matters and no one individual has veto power, we'll
> have to see if there is consensus behind your proposed changes.

I would like the document to specify at the very least a circuit breaker mechanism, that stops the tunneled traffic if severe packet loss is detected along the path.

And this isn't about an "individual veto". This is about a document that is at the moment in violation of IETF consensus at least as far back as RFC2914.

Lars