Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM

Stig Venaas <stig@venaas.com> Wed, 20 March 2024 23:21 UTC

Return-Path: <stig@venaas.com>
X-Original-To: pim@ietfa.amsl.com
Delivered-To: pim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B336C14F708 for <pim@ietfa.amsl.com>; Wed, 20 Mar 2024 16:21:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level:
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=venaas-com.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LAq_qsTQq66X for <pim@ietfa.amsl.com>; Wed, 20 Mar 2024 16:21:21 -0700 (PDT)
Received: from mail-lf1-x134.google.com (mail-lf1-x134.google.com [IPv6:2a00:1450:4864:20::134]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 74924C14F700 for <pim@ietf.org>; Wed, 20 Mar 2024 16:21:21 -0700 (PDT)
Received: by mail-lf1-x134.google.com with SMTP id 2adb3069b0e04-513dc99b709so517667e87.1 for <pim@ietf.org>; Wed, 20 Mar 2024 16:21:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=venaas-com.20230601.gappssmtp.com; s=20230601; t=1710976878; x=1711581678; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=gpi7/nLX5sZl0gx/dTvVFu77cRuFZvdSoSMiQl8MNwU=; b=YV9V1eX20unKroJX4JxVv+DKlDVoyjV1HAMIa1qxE+1lzMUr1CXhP+86dLsh6+4D62 tqXtqQd/vIn3uswGKgFhLHo8HkwBoVOKl0bXbSxFpS6b+KpeuRCCY8EROg6ieiY31zve sl+M7hrduYvKJCPe4/QlF9MQ4kq5AVmHl0+rG8kc7HZUhwNcv7cXad19/92/wEB7yAL7 u95s4RCO11iLFPiJes+aNpHErPrYxXhmrIc12UhQnDPmgJvX8c/4C9tiDcFAPpvm5h+Y /jgOcob0JINN9rv4DBO7EZUbP74grh7e5eYNbabeUEEEet9QgCjwFaFBc7QY7kOt8gpw 5QAw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1710976878; x=1711581678; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=gpi7/nLX5sZl0gx/dTvVFu77cRuFZvdSoSMiQl8MNwU=; b=jv6w3YNY/qcletpY4x6Z+sTU5KBJw++1TZX97qUEC5COWwFIIM6e057pdLJUdKR+Js vVFOrHML56P7noR8yOLrWy4eHW049E3iKZNJZ03bouGlBxjRbkY9n+RpqP20wCNEsgXy zw2fDuP2i1rlMeDwQQFA6zj+DR6vlzKVRK+N5sYajjZD1zoxFndF/17l79Jxmf04bUK8 rktQ/2FtZm7mtQCQsx87X7n1uFdIiL+LBSSYIm36Ufwe3evj1MVuqXlo8vfFlbL/yG6W dAypF/KWH9g90Nj338AQB8a8nOCzXYpNWqNz4YKp92qWrTRy+qbaUkECFGQStj2NHo1z Oihg==
X-Forwarded-Encrypted: i=1; AJvYcCVq12E1uQiQHNuln8oQFMvonWTv6ibI7RemexZxV/3ZVwyIYXj3KzULC02w6HkwXljJPq35EOlRZqj8qzc=
X-Gm-Message-State: AOJu0YwVF6yw0pXfYWVNmTfumG1+GutMdECGCKPKRrR9DrqVCcwa86vd 3nquqUoFLOq87o77SbMq6u7jvEsDwNHR1VDt5oFjYpe20UmcJsXCnqauC6kxch1zI0oT4XBXN0W q/nnOq+IjSCwdbNLyi5322Ur1Rkp27Ko875WRLA==
X-Google-Smtp-Source: AGHT+IFI5iGOTgCZcgbJDWSvQKXxvh7FGEfe3TcEgAUtkgfXY0xeloQiojdm6QHEYSxaE1n/8Fu6s8/+vE41IBmpips=
X-Received: by 2002:ac2:4daa:0:b0:513:e27c:78f4 with SMTP id h10-20020ac24daa000000b00513e27c78f4mr4498543lfe.53.1710976878101; Wed, 20 Mar 2024 16:21:18 -0700 (PDT)
MIME-Version: 1.0
References: <CAHANBtKf03ukXH4sgwN0WVdkaVXnbRYdAGBDmQK56YXrS-z6yA@mail.gmail.com> <CAHANBtKdfS0cPceqv8_R+ToeGOBdUksH7gArKqegqSt_Q0Sf0Q@mail.gmail.com> <ZXtzwBljE45Og27f@faui48e.informatik.uni-erlangen.de> <EDE809A0-E672-4A3B-9F46-E08ECD3D4C23@akamai.com> <edc9d539-4b6c-f238-54c6-210c152e2065@juniper.net> <e9ed1779-4f43-4f71-b8c3-d813bcea81d1@innovationslab.net> <CAHANBtJ0S8RfVvfcMHO5XKeDMpzN0O4Jn3MFPJXecNpBVNs6gQ@mail.gmail.com> <8c620ad0-2174-4cc4-9df9-5940e1225fac@innovationslab.net> <cd8cbc0b-a69d-3bcd-c107-9cc1c4435feb@juniper.net>
In-Reply-To: <cd8cbc0b-a69d-3bcd-c107-9cc1c4435feb@juniper.net>
From: Stig Venaas <stig@venaas.com>
Date: Wed, 20 Mar 2024 16:21:06 -0700
Message-ID: <CAHANBtL_-Sd-iLV4TjvX+WwrkQHAU3m6w5dNiniqvWYuZjWtvA@mail.gmail.com>
To: Leonard Giuliano <lenny@juniper.net>
Cc: Brian Haberman <brian@innovationslab.net>, "Holland, Jake" <jholland=40akamai.com@dmarc.ietf.org>, Toerless Eckert <tte@cs.fau.de>, "zzhang@juniper.net" <zzhang@juniper.net>, "n.leymann@telekom.de" <n.leymann@telekom.de>, "pim@ietf.org" <pim@ietf.org>, "mboned@ietf.org" <mboned@ietf.org>, "fenner@fenron.com" <fenner@fenron.com>, Dave Katz <dkatz@juniper.net>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/pim/MPuaUi0mAQgFdQd_Pv3JTbUPicU>
X-Mailman-Approved-At: Wed, 20 Mar 2024 16:22:02 -0700
Subject: Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM
X-BeenThere: pim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Protocol Independent Multicast <pim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pim>, <mailto:pim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pim/>
List-Post: <mailto:pim@ietf.org>
List-Help: <mailto:pim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 20 Mar 2024 23:21:22 -0000

Hi

To add to this. If a router only supporting IGMPv2 is brought up on
the LAN, it will break SSM regardless of the querier election if this
router happens to become the DR. There is no way we can avoid this.
Also, in general, pretty much anything can go wrong if a rogue router
or a router with wrong config is present. I think the most common way
for pim to break is that some device is accidentally becoming the DR
and not having the correct config.

One more thing. I don't think we can make any changes that would make
implementations to 3376 become non-compliant. Hence if anything, we
can not require implementations to change, at most we can recommend
something.

Regards,
Stig

On Wed, Mar 20, 2024 at 2:36 PM Leonard Giuliano <lenny@juniper.net> wrote:
>
>
> On Wed, 20 Mar 2024, Brian Haberman wrote:
>
> <snipped>
> |      Personally, it seems like most of the scenarios posited have been related
> | to old kit or mis-configuration. We can't standardize away those types of
> | actions. At best, I think we can add recommended default settings for the
> | compatibility mode variables referenced in section 7.
>
> I think this is good perspective here.  Having old hosts that don't
> support IGMPv3 is definitely a scenario to consider, as you never know
> what end users are going to stick on a LAN.  And as we discussed in this
> thread, the spec does a pretty good job of not breaking SSM when old hosts
> appear on a LAN.  But having ~routers~ on a LAN that don't support IGMPv3
> seems quite another thing.  Is this really a common scenario worth
> considering now?  And wouldn't it just be easier to just turn IGMP off for
> such old routers if you are worried about them spoiling the SSM fun for
> everyone else?
>