Re: [pim] [MBONED] IPv4 Multicast address ranges

Leonard Giuliano <lenny@juniper.net> Thu, 04 January 2024 20:46 UTC

Return-Path: <lenny@juniper.net>
X-Original-To: pim@ietfa.amsl.com
Delivered-To: pim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D51CCC14F694; Thu, 4 Jan 2024 12:46:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="z9JghKEe"; dkim=pass (1024-bit key) header.d=juniper.net header.b="a0knl/+j"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BTFcjmYDLIdY; Thu, 4 Jan 2024 12:46:14 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 73493C14F714; Thu, 4 Jan 2024 12:46:14 -0800 (PST)
Received: from pps.filterd (m0108160.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.17.1.24/8.17.1.24) with ESMTP id 404HZxO1018944; Thu, 4 Jan 2024 12:45:34 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h= date:from:to:cc:subject:in-reply-to:message-id:references :mime-version:content-type; s=PPS1017; bh=GX6ThkgjZY5LLEu2mQIwtU wioqebrvGnrRaFptRYfV8=; b=z9JghKEe9cZYlWGaT//uVv0cPQudqmSywLZK9x LGrwhNJ0eyNp3QJy9rNjhqdE3pwYbBlDGdhYLmSxnSH60Yvl0r0C9G8VXnbIbJ2C W5rQXIsJhRsn04EV9oLtkZSqAgh2rGkchYGdE2vVivvifC/lVg3bj8WNXhhA53B3 FibqLjRsvySeZkU7ie3Q/NZH7nhjGSsuy8W4h/Jwt0lbQv4OV16Ux/X0ThAZako4 n9rbwhrCAL6sxYw70QX8CFhaA6iPuCEKvdH/M98d8JxNA1CSZ4gGChNnx2IhzsyV Y+71rr+xvoUwsdCMxMwg3MDTTQSzjMXtd4U30wQ02QUEdzqg==
Received: from co1pr02cu002.outbound.protection.outlook.com (mail-westus2azlp17010003.outbound.protection.outlook.com [40.93.10.3]) by mx0b-00273201.pphosted.com (PPS) with ESMTPS id 3ve17f0pnh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 04 Jan 2024 12:45:33 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=flHQL0IZnauQ6hXkLRWFmr3xZB6d2qWpRd+RqWuMIBs5cVB7tFMo2mpciRnfUQuwgiJM1EdCahpdkwE+5KKRilpzYT8SuwQjgYUUVq8XyC3W07dwWDxlicmlRnC7uwZFUw+aP5WUCP62JUP0WmhDbRUN++67sdZus3P9KhmXmg9NTk3etodmnzwAZWqIuZm9aV13cGU0tWV/JHoS+lMQv3GolaaggQGO/IuLDa5IUlU12lsHcTNf9cUj1McjfJCZDVwNNwxWlOOFxkOhkhPao/eeh4Jvr667OOVuA2zxXQnc3JdzEAa0Y9wm4JG98r5xURnLVF9shxzuNE3P16CJOA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GX6ThkgjZY5LLEu2mQIwtUwioqebrvGnrRaFptRYfV8=; b=T+WovhgSYBglwajoMiFCJdyD+Ox6d/wdckbSRLEBk7QUDKHHskHBuy30k7JQsSUawTZGKZ/YQ+Dx6JZgDxxff3Btgr3lcQUDJ6nzwObDOaXrdKGCm9N0O9MHBoWfIxDqjO66Xb4BULH2Xn+DCN+n/O8alU8iA7zh9XUB6iGlpfYExdR5rS5ZkBBuKRZt3RI9PlXriBtYANdai5d4rPRfAi935ieseaMU/B5XelRDPKxOVHOPoUGUNhouVYSWnlysGRzCaK6x4r+3wH3wajBjh1gdKX48Ci2rjb5WjaQP8X8SU5yCbvPc8QAWB3LdfeSzgbu0zD/Nb5qLoBVKCsuRWg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=softfail (sender ip is 66.129.242.14) smtp.rcpttodomain=akamai.com smtp.mailfrom=juniper.net; dmarc=fail (p=reject sp=reject pct=100) action=oreject header.from=juniper.net; dkim=none (message not signed); arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GX6ThkgjZY5LLEu2mQIwtUwioqebrvGnrRaFptRYfV8=; b=a0knl/+jNInOggy+fgk8JLrXDPlb4wCWaoA12vVQ6Ti6mcaJMqL5eKbRTuG9Wggh0L5uVigLYB3di/OkoyXqcOWaRYGuObYPCHQS6xx93FdRVEcIM8jXnhN4R+6QGlzDxpIrVvaxnsIma3l4OapQsQaOgsDuAAUbBOb1St+sRT0=
Received: from BY3PR05CA0013.namprd05.prod.outlook.com (2603:10b6:a03:254::18) by PH7PR05MB9180.namprd05.prod.outlook.com (2603:10b6:510:1f4::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7159.13; Thu, 4 Jan 2024 20:45:31 +0000
Received: from MW2NAM12FT093.eop-nam12.prod.protection.outlook.com (2603:10b6:a03:254:cafe::75) by BY3PR05CA0013.outlook.office365.com (2603:10b6:a03:254::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7159.15 via Frontend Transport; Thu, 4 Jan 2024 20:45:30 +0000
X-MS-Exchange-Authentication-Results: spf=softfail (sender IP is 66.129.242.14) smtp.mailfrom=juniper.net; dkim=none (message not signed) header.d=none;dmarc=fail action=oreject header.from=juniper.net;
Received-SPF: SoftFail (protection.outlook.com: domain of transitioning juniper.net discourages use of 66.129.242.14 as permitted sender)
Received: from p-exchfe-eqx-01.jnpr.net (66.129.242.14) by MW2NAM12FT093.mail.protection.outlook.com (10.13.181.54) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7113.8 via Frontend Transport; Thu, 4 Jan 2024 20:45:30 +0000
Received: from p-exchbe-eqx-01.jnpr.net (10.104.9.14) by p-exchfe-eqx-01.jnpr.net (10.104.9.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.39; Thu, 4 Jan 2024 14:45:29 -0600
Received: from p-exchbe-eqx-01.jnpr.net (10.104.9.14) by p-exchbe-eqx-01.jnpr.net (10.104.9.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.39; Thu, 4 Jan 2024 14:45:28 -0600
Received: from p-mailhub01.juniper.net (10.104.20.6) by p-exchbe-eqx-01.jnpr.net (10.104.9.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.39 via Frontend Transport; Thu, 4 Jan 2024 14:45:28 -0600
Received: from eng-mail03.juniper.net (eng-mail03.juniper.net [10.108.22.11]) by p-mailhub01.juniper.net (8.14.4/8.11.3) with ESMTP id 404KjRHI031435; Thu, 4 Jan 2024 12:45:27 -0800 (envelope-from lenny@juniper.net)
Received: from eng-mail03.juniper.net (localhost [127.0.0.1]) by eng-mail03.juniper.net (8.16.1/8.14.9) with ESMTPS id 404KiLaL065811 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Thu, 4 Jan 2024 12:44:21 -0800 (PST) (envelope-from lenny@juniper.net)
Received: from localhost (lenny@localhost) by eng-mail03.juniper.net (8.16.1/8.16.1/Submit) with ESMTP id 404KiFIe065808; Thu, 4 Jan 2024 12:44:15 -0800 (PST) (envelope-from lenny@juniper.net)
X-Authentication-Warning: eng-mail03.juniper.net: lenny owned process doing -bs
Date: Thu, 04 Jan 2024 12:44:15 -0800
From: Leonard Giuliano <lenny@juniper.net>
To: "Stevens, Jim A Collins" <James.A.Stevens=40collins.com@dmarc.ietf.org>
CC: "mboned@ietf.org" <mboned@ietf.org>, pim@ietf.org, Brian Haberman <brian@innovationslab.net>, Dave Katz <dkatz@juniper.net>, fenner@fenron.com, Toerless Eckert <tte@cs.fau.de>, Hitoshi Asaeda <asaeda@ieee.org>, "Holland, Jake" <jholland@akamai.com>
In-Reply-To: <PH1P110MB1148BB99A3E2CC9142CD1D87B060A@PH1P110MB1148.NAMP110.PROD.OUTLOOK.COM>
Message-ID: <643b1306-a05c-6e50-8492-acf60a457c14@juniper.net>
References: <mailman.53.1704225603.24110.mboned@ietf.org> <PH1P110MB1148BB99A3E2CC9142CD1D87B060A@PH1P110MB1148.NAMP110.PROD.OUTLOOK.COM>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: MW2NAM12FT093:EE_|PH7PR05MB9180:EE_
X-MS-Office365-Filtering-Correlation-Id: 3450c0e2-435f-4ca4-93c8-08dc0d6616f0
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:66.129.242.14; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:p-exchfe-eqx-01.jnpr.net; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230031)(4636009)(396003)(39860400002)(136003)(376002)(346002)(230922051799003)(64100799003)(1800799012)(451199024)(82310400011)(186009)(40470700004)(46966006)(36840700001)(36756003)(40480700001)(40460700003)(31686004)(70206006)(70586007)(31696002)(86362001)(336012)(426003)(66574015)(41300700001)(356005)(81166007)(2906002)(83380400001)(26005)(47076005)(4326008)(8676002)(5660300002)(478600001)(966005)(36860700001)(316002)(54906003)(8936002)(2616005)(82740400003)(36900700001); DIR:OUT; SFP:1102;
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Jan 2024 20:45:30.1989 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 3450c0e2-435f-4ca4-93c8-08dc0d6616f0
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=bea78b3c-4cdb-4130-854a-1d193232e5f4; Ip=[66.129.242.14]; Helo=[p-exchfe-eqx-01.jnpr.net]
X-MS-Exchange-CrossTenant-AuthSource: MW2NAM12FT093.eop-nam12.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR05MB9180
X-Proofpoint-ORIG-GUID: _ndjGkkKAlBYaxb2aIsuQiic79vXXVzN
X-Proofpoint-GUID: _ndjGkkKAlBYaxb2aIsuQiic79vXXVzN
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.997,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-12-09_01,2023-12-07_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 impostorscore=0 mlxlogscore=999 lowpriorityscore=0 mlxscore=0 priorityscore=1501 clxscore=1011 adultscore=0 phishscore=0 spamscore=0 bulkscore=0 suspectscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2311290000 definitions=main-2401040162
Archived-At: <https://mailarchive.ietf.org/arch/msg/pim/7_4mvnziSFzSdqWJ86p8gHdGlaE>
Subject: Re: [pim] [MBONED] IPv4 Multicast address ranges
X-BeenThere: pim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Protocol Independent Multicast <pim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pim>, <mailto:pim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pim/>
List-Post: <mailto:pim@ietf.org>
List-Help: <mailto:pim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jan 2024 20:46:18 -0000

<resending with PIM, et al, included, as they got dropped along the way in 
this sub-thread>

I think this is already doable today.  That is, SSM range is defined as 
232/8, and "SSM-only" behavior is supposed to be guaranteed there (ie, no 
(*,g), no shared trees, no pim registers, no MSDP SAs for these groups). 
The rest of 224/4 is not necessarily "ASM-only".  After all, SSM is really 
just a subset of ASM, so I'm not sure what "ASM-only" is- (s,g) joins 
happily work there, and beyond the receiver LAN, SSM is just (s,g) joins. 
So you can certainly do SSM outside of 232/8 today, you just get no 
guarantee that it will be pure SSM service (ie, there might appear (*,g), 
shared trees, pim registers, MSDP SAs for these groups).

That said, if you do want pure SSM service outside of 232/8, it should be 
configurable to specify other SSM-only ranges.

As for the scoping sematics, I think it could all be really simplified. 
238/8 is effectively private address space, the RFC1918 equiv, for mcast. 
This range is not allowed to be routable on the global Internet, so what 
goes on within your castle (or confed of non-Internet-connected castles) 
is your business.  But I think this type of address semantics is certainly 
outside the scope of protocol spec.



On Wed, 3 Jan 2024, Stevens, Jim A Collins wrote:

| 
| 
| Hitoshi discussed the issue of allocating (or chopping) the IP multicast 
| range.  I agree with his recommendation that SSM should be useable in 
| more ranges, especially the GLOP and Unicast-Prefix blocks, than just 
| the SSM Block.  It is not clear to me however, whether there are any 
| blocks that should ONLY be ASM.
| 
| > -----Original Message-----
| > Date: Wed, 3 Jan 2024 01:28:30 +0900
| > From: Hitoshi Asaeda <asaeda@ieee.org>
| > To: Brian Haberman <brian@innovationslab.net>
| 
| > Dependency or relation between protocol designs and operational issues (or
| > policies) should be always minimized.
| > Protocol behavior should not be solidly relies on the address range.
| >
| > IP multicast has a long history for allocating (or chopping) its address ranges.
| > We had adopted complicated "address scopes" such as administrative/site-
| > local/organization-local scope... How we can interact with SSM range and
| > them?
| > I've just remembered GLOP. How SSM and GLOP can be interacted with?
| > One may deduce, no need to interact with them, use SSM range.
| > Then what address ranges are obsolete today? What range should be used
| > now? Is its decision persistent?
| > Such a dirty hack or patch work is not sustainable for designing protocols.
| >
| > What I'm saying here may be a bit too conceptual. So, please ignore the points
| > if people agree to relying on the SSM range. However, even so, I guess the
| > following point must be taken into account.
| > Section 2 in RFC4604 says;
| >    A host or router may be configured to apply SSM semantics to
| >    addresses other than those in the IANA-allocated range.  The GMP
| >    module on a host or router SHOULD have a configuration option to set
| >    the SSM address range(s).  If this configuration option exists, it
| >    MUST default to the IANA-allocated SSM range.  The mechanism for
| >    setting this configuration option MUST at least allow for manual
| >    configuration.  Protocol mechanisms to set this option may be defined
| >    in the future.
| > I think this paragraph implies that applications that want to invoke SSM
| > services can use any multicast address range.
| > If RFC4604 should be the normative reference, RFC4604 itself must be also
| > revised.
| 
| 
| While on the topic multicast blocks, I am confused on IPv4 scoped multicast addresses and  Relative Addresses used with Scoped Multicast Addresses as defined by RFC 5771, RFC2365, and described in https://urldefense.com/v3/__https://www.iana.org/assignments/multicast-addresses/multicast-addresses.xhtml*multicast-addresses-13__;Iw!!NEt6yMaO-gk!B8bkjhuJ6Z0_9tvRa4juQ--C5u0v9Q3LzOW1ZNJxeWihY-jxlZh4JnnpICwa0AYIhb16mQXsOwtVi_Bw9jruIoXj9K6RfQ$
| 
| RFC 2365 Partitions the administratively scoped IPv4 multicast spaces in sections 6 & 8 and seems to imply that that there could be 2 to 7 possible IPv4 scoped blocks (depending upon how you read sections 6 & 8) while RFC 5771 and IANA multicast address Scoped Multicast Ranges only mention 1 scoped address block for organization-local scope.
| 
| RFC 2365 section 9, RFC 10.1.1, and IANA multicast address Relative Addresses used with Scoped Multicast Addresses mentioned that the upper /24 of each scoped block is reserved for relative assignments  The discussion in RFC 2365 section 9 explicitly states that the "  The high order /24 in every scoped region is reserved for relative assignments."  This implies more than one scoped region.
| 
| So,  how many scoped blocks are there?  And what are they?  I presume that based upon RFC 5771 being newer than RFC 2365 that there is only 1 - especially since IANA only shows
|     235.0.0.0-238.255.255.255   Reserved        [RFC5771]
|     239.0.0.0-239.255.255.255   Organization-Local Scope        [RFC2365]
| 
| If an RFC (I presume an informational or best practice RFC) is being prepared to discuss and described IPv4 multicast, then I think it should address scoped blocks (how many are they are what are they) and relative offsets.
| 
| 
| Going back to Hitoshi's suggestion that SSM should be usable in more than just the SSM block space, RFC 4607 section 4.3 and IANA multicast address Source-Specific Multicast Block state that 232.0.1.0-232.255.255.255 is Reserved for local host allocation.  This seems similar to the 239.0.0.0-239.255.255.255 Organization-Local Scope except allocated only to SSM while  239.0.0.0-239.255.255.255     Organization-Local Scope can be allocated to ASM (and SSM?)
| 
| 
| Aside - by the way, RFC 5771 section 10.1.1 on relative offsets starts with the following sentence: "The relative offsets [RFC2365] are used to ensure that a service can be located independent of the extent of the enclosing scope (see [RFC3180] for details)."  The reference to RFC2365 makes sense.  However, the reference to RFC3180 on GLOP does not.   Does anyone know why the reference to RFC 3180?  Should it reference a different RFC?  Or perhaps it should be removed?   This seems like a potential Errata for RFC 3180. Feedback from group?
| 
| 
| Jim Stevens
| 
| _______________________________________________
| MBONED mailing list
| MBONED@ietf.org
| https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/mboned__;!!NEt6yMaO-gk!B8bkjhuJ6Z0_9tvRa4juQ--C5u0v9Q3LzOW1ZNJxeWihY-jxlZh4JnnpICwa0AYIhb16mQXsOwtVi_Bw9jruIoWGCMiQ7A$
|