Re: [OPSAWG] TSV ART IETF LC review of draft-ietf-opsawg-capwap-alt-tunnel

Warren Kumari <warren@kumari.net> Mon, 03 October 2016 21:50 UTC

Return-Path: <warren@kumari.net>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 854F8129598 for <opsawg@ietfa.amsl.com>; Mon, 3 Oct 2016 14:50:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=kumari-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NaBlaFFcwOwk for <opsawg@ietfa.amsl.com>; Mon, 3 Oct 2016 14:50:24 -0700 (PDT)
Received: from mail-qk0-x233.google.com (mail-qk0-x233.google.com [IPv6:2607:f8b0:400d:c09::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9871712955F for <opsawg@ietf.org>; Mon, 3 Oct 2016 14:50:24 -0700 (PDT)
Received: by mail-qk0-x233.google.com with SMTP id t7so176383832qkh.2 for <opsawg@ietf.org>; Mon, 03 Oct 2016 14:50:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kumari-net.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=dv8HAyClS+IKFzLOSppK0fDP1jNhFSsWnm7PiX3Euf0=; b=fpJVR/NAE6l2UvB2m8tdjGCDFEPOZtj409QdCnJR3U5R4QGkBkCtVHcY10UApdYZKg /qLlhIV7CqXA5cqB2imqPpky2N+TTv8X0eDVIVhVDIs5kbHxl41lJQKhs5lzIduaJzUw k5Yt+Skz9wNNj7B5dGsALTuwGWP1/mA/pBxVSSBUvceF0DJusyZdm1B5H6dVsuPaD2o5 XW7UReWH0NZqiXuhkhgZgaVUtDzJA7Rt+U9vN5ro5ne3aaXNBpdhh06BRiSBJk4RxMPc zVMDCTJ+OuLtpxYXguqdHbask+EvJi0bXQB8b726N90sfUNetuXNiTS2I9uRqfxlEiEC 0yDg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=dv8HAyClS+IKFzLOSppK0fDP1jNhFSsWnm7PiX3Euf0=; b=fumSNkYCLkWFS0eLRIYLTIqUv+TvV4yrzDl5egq9SeS0zIlJqG+Q0+z/s+EQrta4UG 9nVLbsd9p2hn6SvhTDSsYUxsvHjRnHK89W1u5af8zjpuGori/GCxzRZTjrbUCEt8QVB2 bLA1K7/Y9RnhEQVBiumXS293Nz6TPBQGdBqR7r4K7cPgdoIFyygtLJgJbWTgkwOQHVfG +SgBFG00G0aTfk+E7fTLvZXUL/plTeZwKb7c/I93dboxPj7Jm0x3+q8O9s3d+o7luqo+ aVQLfrhSd7ZScydjEClI6e/zfXXaarPDJI4ko43ucIEvtNzjgMw2nap4QgcTz0lfKV4Z TAsQ==
X-Gm-Message-State: AA6/9Rm+H5N/Ok401lTCvMBDSdZmTqUD4FvVF4XLTYOkOpfvCiH4B7mM9t8NLgG16nE+D/DBeMtwKZwHi/J9JCVX
X-Received: by 10.55.175.134 with SMTP id y128mr271729qke.134.1475531423794; Mon, 03 Oct 2016 14:50:23 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.55.147.196 with HTTP; Mon, 3 Oct 2016 14:49:53 -0700 (PDT)
In-Reply-To: <a9f05461-f117-afa5-fe6d-886efdc2aab0@isi.edu>
References: <78f07b6d-3c78-e002-b2f5-487da9c8be72@isi.edu> <a9f05461-f117-afa5-fe6d-886efdc2aab0@isi.edu>
From: Warren Kumari <warren@kumari.net>
Date: Mon, 03 Oct 2016 17:49:53 -0400
Message-ID: <CAHw9_iJunvqAiXWipLWD5kAnA3JjKR6BFoj1efY4CU3FS0VLAA@mail.gmail.com>
To: Joe Touch <touch@isi.edu>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/FEqkszALjuwcc7dSVYtlVAoasGA>
Cc: "opsawg@ietf.org" <opsawg@ietf.org>, draft-ietf-opsawg-capwap-alt-tunnel.all@ietf.org
Subject: Re: [OPSAWG] TSV ART IETF LC review of draft-ietf-opsawg-capwap-alt-tunnel
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2016 21:50:27 -0000

[ - Discuss, tsv-art (first for clutter, second because I'm not subscribed) ]
Dear authors,

I just wanted to make sure that you had seen these are well...

W

On Mon, Sep 26, 2016 at 5:36 PM, Joe Touch <touch@isi.edu> wrote:
> CC'ing tsv-art...
>
>
> On 9/26/2016 2:34 PM, Joe Touch wrote:
>
> Hi, all,
>
> I've reviewed this document as part of the Transport Area Review Team's
> (TSVART) ongoing effort to review key IETF documents. These comments were
> written primarily for the transport area directors, but are copied to the
> document's authors for their information and to allow them to address any
> issues raised. When done at the time of IETF Last Call, the authors should
> consider this review together with any other last-call comments they
> receive. Please always CC tsv-art@ietf.org if you reply to or forward this
> review.
>
> Please resolve these comments along with any other Last Call comments you
> may receive. Please wait for direction from your document shepherd or AD
> before posting a new version of the draft.
>
> Document: draft-ietf-opsawg-capwap-alt-tunnel
> Title: Alternate Tunnel Encapsulation for Data Frames in CAPWAP
> Reviewer: J. Touch
> Review Date: Sept 26, 2016
> IETF Last Call Date: Sept 16, 2016
>
> Summary: This doc refers to existing tunneling specifications, many of which
> are inconsistent or incorrect. In particular, there are potential
> complicatinos with MTU support and signalling that could affect transport
> protocols.
>
> Major issues:
>
> As already noted in draft-intarea-tunnels, many existing tunnel mechanisms
> are inconsistent or incorrect in their support for IPv6 MTU requirements,
> both as transits for IP packets and as IP endpoints. Although this document
> cites existing standards, the inconsistency and incorrectness of these
> standards should be addressed. It might be sufficient to indicate that any
> tunneling mechanism selected MUST support the minimum IPv6 MTU requirements
> independent of this signalling mechanism (i.e, the signalling mechanism
> doesn't address or correct any errors or inconsistencies in the tunnel
> mechanism selected).
>
> Regarding IP endpoint requirements, it might be useful to consider whether
> this protocol could be extended to indicate the receiver payload reassembly
> limit when indicating support for each tunnel type, to assist the source in
> determining whether the resulting tunnel will be IPv6 compliant (rather than
> becoming a black hole for valid packet sizes).
>
> Additionally, for the transport protocol-based tunnels, it would be useful
> to consider whether the protocol could indicate not only the endpoint IP
> address but the port number as well.
>
> Minor issues:
>
> It might be useful to consider IPsec TLS, and DTLS tunnels as well as those
> already listed.
>
> ---
>
>



-- 
I don't think the execution is relevant when it was obviously a bad
idea in the first place.
This is like putting rabid weasels in your pants, and later expressing
regret at having chosen those particular rabid weasels and that pair
of pants.
   ---maf