Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard

jnc@mercury.lcs.mit.edu (Noel Chiappa) Wed, 22 January 2014 18:33 UTC

Return-Path: <jnc@mercury.lcs.mit.edu>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 208111A0174; Wed, 22 Jan 2014 10:33:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.735
X-Spam-Level:
X-Spam-Status: No, score=-4.735 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.535] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id en5IS1-ZKUOD; Wed, 22 Jan 2014 10:33:17 -0800 (PST)
Received: from mercury.lcs.mit.edu (mercury.lcs.mit.edu [18.26.0.122]) by ietfa.amsl.com (Postfix) with ESMTP id 139781A018B; Wed, 22 Jan 2014 10:32:37 -0800 (PST)
Received: by mercury.lcs.mit.edu (Postfix, from userid 11178) id 0FE0918C144; Wed, 22 Jan 2014 13:32:37 -0500 (EST)
To: ietf@ietf.org, mpls@ietf.org
Message-Id: <20140122183237.0FE0918C144@mercury.lcs.mit.edu>
Date: Wed, 22 Jan 2014 13:32:37 -0500
From: jnc@mercury.lcs.mit.edu
X-Mailman-Approved-At: Thu, 23 Jan 2014 10:57:52 -0800
Cc: jnc@mercury.lcs.mit.edu
Subject: Re: [mpls] Last Call: <draft-ietf-mpls-in-udp-04.txt> (Encapsulating MPLS in UDP) to Proposed Standard
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jan 2014 18:33:20 -0000

    > From: "Eggert, Lars" <lars@netapp.com>

    > that danger is somewhat mitigated, because such traffic typically dies
    > at the next NAT or firewall (unless that has been specifically
    > provisioned, which is then also OK).

But such packets/protocols are usually not "provisioned" (i.e. specific
resources set aside to carry them). Generally, they are merely "allowed" - and
one then still has the potential of congestion at that device.

    > Depends on the reach of that encapsulation. .. If it traversed such
    > middleboxes by default, as UDP does, it has the same issues.

Exactly. The problem is not specific to UDP. So why is the discussion
(seemingly) trying to solve it in a UDP-specific way?

I repeat: even if people were _not_ using UDP encapsulations, the exact same
problem (of potential congestion caused by non-congestion-compliant
applications) would still exist. Switching to a different encapsulation method
is not going to get rid of _any_ potential congestion - not one packet's
worth.

So can we just drop all mention of UDP, since it's irrelevant to the _real_
problem?

    >> But saying that _intermediate forwarding nodes_ have to detect
    >> down-stream congestion, and respond, represents a fundamental change
    >> to the Internet's architecture for congestion control.

    > And here's the fallacy: UDP encapsulators are forwarding nodes *only*
    > from the viewpoint of the final endpoints. From the viewpoint of the
    > rest of the Internet, they are traffic *sources*, not *forwarders*.

I present two boxes. In one, a packet comes in, and after some manipulation of
headers, the packet goes out. In the other, a packet comes in, and after some
header changes, the packet goes out. You're trying to tell me that,
architecturally, one _is_ an intermediate forwarding node (which doesn't have
to detect downsteam congestion, and respond), and the other is not (and so
does have to)?

And I repeat: mandating that nodes which are forwarding nodes have to detect,
and respond to, downsteam congestion caused by non-congestion-compliant
traffic flowing _through_ them is a fundamental change to the Internet's
existing framework for congestion control.

Not that I'm opposed to such a change (it might make sense, I'd have to go
away and think about it), but if we're going to make such an architectural
change, i) we should do so explicitly, and ii) such a requirement should fall
on _all_ packet forwarding nodes - including regular routers, since they could
equally possibly be given non-congestion-compliant traffic to forward.

	Noel