Re: [OPSAWG] TSV ART IETF LC review of draft-ietf-opsawg-capwap-alt-tunnel

Joe Touch <touch@isi.edu> Wed, 02 November 2016 23:10 UTC

Return-Path: <touch@isi.edu>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D82EF126FDC; Wed, 2 Nov 2016 16:10:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.397
X-Spam-Level:
X-Spam-Status: No, score=-8.397 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-1.497] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gguP1ZROcx5K; Wed, 2 Nov 2016 16:10:06 -0700 (PDT)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CAC2912954B; Wed, 2 Nov 2016 16:10:06 -0700 (PDT)
Received: from [128.9.184.167] ([128.9.184.167]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id uA2N9Vc0009476 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Wed, 2 Nov 2016 16:09:32 -0700 (PDT)
To: Duzongpeng <duzongpeng@huawei.com>
References: <78f07b6d-3c78-e002-b2f5-487da9c8be72@isi.edu> <a9f05461-f117-afa5-fe6d-886efdc2aab0@isi.edu> <CAHw9_iJunvqAiXWipLWD5kAnA3JjKR6BFoj1efY4CU3FS0VLAA@mail.gmail.com> <BAFEC9523F57BC48A51C20226A5589575FE5BA6D@nkgeml514-mbx.china.huawei.com>
From: Joe Touch <touch@isi.edu>
Message-ID: <6f49f923-1b2a-f053-dfa6-429772b2ee09@isi.edu>
Date: Wed, 02 Nov 2016 16:09:30 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
In-Reply-To: <BAFEC9523F57BC48A51C20226A5589575FE5BA6D@nkgeml514-mbx.china.huawei.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/vH7AKPMl-8ptkSE1Yz0ejhVBCFo>
Cc: "opsawg@ietf.org" <opsawg@ietf.org>, "draft-ietf-opsawg-capwap-alt-tunnel.all@ietf.org" <draft-ietf-opsawg-capwap-alt-tunnel.all@ietf.org>
Subject: Re: [OPSAWG] TSV ART IETF LC review of draft-ietf-opsawg-capwap-alt-tunnel
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Nov 2016 23:10:09 -0000

Hi,


On 10/18/2016 12:48 AM, Duzongpeng wrote:
> Hello, Joe
>
> 	Although not as an author of the draft, I would like to talk about your suggestions.
>
> 	Please see inline. 
>
> Best Regards
> Zongpeng Du
>
>> Major issues:
>>
>> As already noted in draft-intarea-tunnels, many existing tunnel 
>> mechanisms are inconsistent or incorrect in their support for IPv6 MTU 
>> requirements, both as transits for IP packets and as IP endpoints. 
>> Although this document cites existing standards, the inconsistency and 
>> incorrectness of these standards should be addressed. It might be 
>> sufficient to indicate that any tunneling mechanism selected MUST 
>> support the minimum IPv6 MTU requirements independent of this 
>> signalling mechanism (i.e, the signalling mechanism doesn't address or 
>> correct any errors or inconsistencies in the tunnel mechanism selected).
>>
> [duzongpeng] 
> Would it ok if the authors add a section to declare that every tunneling mechanism 
> MUST support the minimum IPv6 MTU requirements said in "draft-ietf-intarea-tunnels-03"
It can, but draft-intarea is Informational. If you need normative refs,
you should cite the docs draft-intarea cites to determine these
requirements.

> If the draft, the tunnel between the WTP and Access Router needs to be established, and the WTP and AC already have a CAPWAP connection.
> According to the tunneling mechanism supported, MTU information perhaps can be computed by the AR.
> AC can have the information, and inform the WTP in the "Tunnel Info Element" field. 
OK.

> [duzongpeng]
>
>
>> Regarding IP endpoint requirements, it might be useful to consider 
>> whether this protocol could be extended to indicate the receiver 
>> payload reassembly limit when indicating support for each tunnel type, 
>> to assist the source in determining whether the resulting tunnel will 
>> be IPv6 compliant (rather than becoming a black hole for valid packet sizes).
>>
> [duzongpeng] 
> Is it the same information talked above? 
Yes.

> I think it is flexible to indicate something in the "Tunnel Info Element" field.
OK.
> If you can provide detailed modification suggestions, perhaps the author will be glad to accept it.
> BTW, I have also given some suggestions to the draft.
I don't have any specific suggestions of how to extend the protocol to
accomplish this task.

> [duzongpeng]
>
>> Additionally, for the transport protocol-based tunnels, it would be 
>> useful to consider whether the protocol could indicate not only the 
>> endpoint IP address but the port number as well.
>>
> [duzongpeng] 
> If any tunnel type needs this port information, it should be ok to carry it in the "Tunnel Info Element" field.
OK.
> [duzongpeng]
>
>> Minor issues:
>>
>> It might be useful to consider IPsec TLS, and DTLS tunnels as well as 
>> those already listed.
> [duzongpeng] 
> According to my understanding, it is ok to add some tunnel types. 
> However, the authors have decided to only talk some essential ones in this draft, and perhaps talk about others in latter drafts if necessary.
It might be helpful to indicate that this is how other tunnel types are
being handled, so they don't appear to be omitted for other reasons.

> [duzongpeng]
>
>
> -----Original Message-----
> From: OPSAWG [mailto:opsawg-bounces@ietf.org] On Behalf Of Warren Kumari
> Sent: Tuesday, October 04, 2016 5:50 AM
> To: Joe Touch
> Cc: opsawg@ietf.org; draft-ietf-opsawg-capwap-alt-tunnel.all@ietf.org
> Subject: Re: [OPSAWG] TSV ART IETF LC review of draft-ietf-opsawg-capwap-alt-tunnel
>
> [ - Discuss, tsv-art (first for clutter, second because I'm not subscribed) ] Dear authors,
>
> I just wanted to make sure that you had seen these are well...
>
> W
>
> On Mon, Sep 26, 2016 at 5:36 PM, Joe Touch <touch@isi.edu> wrote:
>> CC'ing tsv-art...
>>
>>
>> On 9/26/2016 2:34 PM, Joe Touch wrote:
>>
>> Hi, all,
>>
>> I've reviewed this document as part of the Transport Area Review 
>> Team's
>> (TSVART) ongoing effort to review key IETF documents. These comments 
>> were written primarily for the transport area directors, but are 
>> copied to the document's authors for their information and to allow 
>> them to address any issues raised. When done at the time of IETF Last 
>> Call, the authors should consider this review together with any other 
>> last-call comments they receive. Please always CC tsv-art@ietf.org if 
>> you reply to or forward this review.
>>
>> Please resolve these comments along with any other Last Call comments 
>> you may receive. Please wait for direction from your document shepherd 
>> or AD before posting a new version of the draft.
>>
>> Document: draft-ietf-opsawg-capwap-alt-tunnel
>> Title: Alternate Tunnel Encapsulation for Data Frames in CAPWAP
>> Reviewer: J. Touch
>> Review Date: Sept 26, 2016
>> IETF Last Call Date: Sept 16, 2016
>>
>> Summary: This doc refers to existing tunneling specifications, many of 
>> which are inconsistent or incorrect. In particular, there are 
>> potential complicatinos with MTU support and signalling that could 
>> affect transport protocols.
>>
>> Major issues:
>>
>> As already noted in draft-intarea-tunnels, many existing tunnel 
>> mechanisms are inconsistent or incorrect in their support for IPv6 MTU 
>> requirements, both as transits for IP packets and as IP endpoints. 
>> Although this document cites existing standards, the inconsistency and 
>> incorrectness of these standards should be addressed. It might be 
>> sufficient to indicate that any tunneling mechanism selected MUST 
>> support the minimum IPv6 MTU requirements independent of this 
>> signalling mechanism (i.e, the signalling mechanism doesn't address or 
>> correct any errors or inconsistencies in the tunnel mechanism selected).
>>
>> Regarding IP endpoint requirements, it might be useful to consider 
>> whether this protocol could be extended to indicate the receiver 
>> payload reassembly limit when indicating support for each tunnel type, 
>> to assist the source in determining whether the resulting tunnel will 
>> be IPv6 compliant (rather than becoming a black hole for valid packet sizes).
>>
>> Additionally, for the transport protocol-based tunnels, it would be 
>> useful to consider whether the protocol could indicate not only the 
>> endpoint IP address but the port number as well.
>>
>> Minor issues:
>>
>> It might be useful to consider IPsec TLS, and DTLS tunnels as well as 
>> those already listed.
>>
>> ---
>>
>>
>
>
> --
> I don't think the execution is relevant when it was obviously a bad idea in the first place.
> This is like putting rabid weasels in your pants, and later expressing regret at having chosen those particular rabid weasels and that pair of pants.
>    ---maf
>
> _______________________________________________
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg