Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

"Joel M. Halpern" <jmh@joelhalpern.com> Fri, 24 January 2014 02:31 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 879D91A01BE; Thu, 23 Jan 2014 18:31:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OUa0nL06So02; Thu, 23 Jan 2014 18:31:49 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) by ietfa.amsl.com (Postfix) with ESMTP id 80E311A0195; Thu, 23 Jan 2014 18:31:49 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id C83A84415B9; Thu, 23 Jan 2014 18:31:48 -0800 (PST)
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from Joels-MacBook-Pro.local (24-104-115-2-ip-static.hfc.comcastbusiness.net [24.104.115.2]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 5DBC31C05A5; Thu, 23 Jan 2014 18:31:48 -0800 (PST)
Message-ID: <52E1D093.8040603@joelhalpern.com>
Date: Thu, 23 Jan 2014 21:31:47 -0500
From: "Joel M. Halpern" <jmh@joelhalpern.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: Joe Touch <touch@isi.edu>, Edward Crabbe <edc@google.com>
References: <20140122172930.3D31A18C13B@mercury.lcs.mit.edu> <64A7AA55-795A-40FA-8008-5FCE3B8E2C44@netapp.com> <52E18661.4060000@isi.edu> <CACKN6JFzaGkiCzJgcd0BEHeWi5x0ReemJOv4ASuXAnz36RA-fg@mail.gmail.com> <52E18BF1.1040004@isi.edu>
In-Reply-To: <52E18BF1.1040004@isi.edu>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: "mpls@ietf.org" <mpls@ietf.org>, Noel Chiappa <jnc@mercury.lcs.mit.edu>, IETF discussion list <ietf@ietf.org>
Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jan 2014 02:31:51 -0000

Joe, while your argument is internally consistent, it is not consistent 
with history.  We have not demanded that tunnel entries behave fully 
like source hosts for any of the other myriad kinds of tunnels we have 
done over the years.

If we take your logic as stated, then the usage of IPSec over UDP would 
be required to apply congestion control unless it knew that all the 
content traffic was TCP.  Is that really your intent?

Yours,
Joel

On 1/23/14 4:38 PM, Joe Touch wrote:
>
>
> On 1/23/2014 1:27 PM, Edward Crabbe wrote:
>> Part of the point of using UDP is to make use of lowest common
>> denominator forwarding hardware in introducing entropy to protocols that
>> lack it ( this is particularly true of the GRE in UDP use case also
>> under discussion elsewhere).
>>
>> The tunnel is not the source of the traffic.  The _source of the
>> traffic_ is the source of the traffic.
>
> To the Internet, the tunnel encapusulator is the source of traffic.
> Tracing the data back further than that is a mirage at best - and
> irrelevant.
>
> The tunnel head-end is responsible for the tunnel walking, talking, and
> quaking like a duck (host). When the tunnel head-end knows something
> about the ultimate origin of the traffic - whether real, imagined, or
> from Asgard - then it has done it's duty (e.g., that it's already
> congestion controlled).
>
> But that head end is responsible, regardless of what it knows or
> doesn't. And when it doesn't know, the only way to be responsible is to
> put in its own reactivity.
>
>> The originating application
>> who's traffic is being tunneled should be responsible for congestion
>> control, or lack there of.
>
> Perhaps it should be, but that's an agreement between whomever
> implements/deploys the tunnel headend and whomever provides the
> originating traffic to them. The problem is that this isn't true for the
> typical use case for this kind of encapsulation.
>
> I.e., if we were talking about MPLS traffic that already was reactive,
> we wouldn't be claiming the need for additional encapsulator mechanism.
> It's precisely because nothing is known about the MPLS traffic that the
> encapsulator needs to act.
>
>  > Are we advocating a return to intermediate
>> congestion control (I like X.25 as much as the next guy, but...).  This
>> is a very stark change of direction.
>>
>> I think mandating congestion control  is not technically sound from
>> either a theoretical (violation of end to end principle, stacking of
>> congestion control algorithms leading to complex and potentially
>> suboptimal results) or economic perspective (as a very large backbone,
>> we've been doing just fine without intermediate congestion management
>> thank you very much, and I have 0 desire to pay for a cost prohibitive,
>> unnecessary feature in silicon.)
>
> Write that up, and we'll see how it turns out in the IETF. However,
> right now, the IETF BCPs do require reactive congestion management of
> transport streams.
>
> If you don't want/like that, then either don't use transport
> encapsulation, or change the BCPs.
>
>> I get Lars comments regarding reach, to some limited extent.
>>   Ultimately, the implication seems to be that the protocols riding the
>> L2 network will have no form of congestion control and are fundamentally
>> different than protocols that would reside on a typical wan.  I have
>> some serious doubts about this, although I'm sure this is the case in
>> some specialized environments.  At any rate, it seems to me that a stern
>> warning regarding edge filtering on interdomain boundaries will be
>> sufficient.
>
> My concern may be slightly different that his. My concern is that you
> want the benefits of a UDP header, but don't like the responsibilities
> that come along with it.
>
> Joe
>
>