Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM

Dave Katz <dkatz@juniper.net> Tue, 02 January 2024 16:54 UTC

Return-Path: <dkatz@juniper.net>
X-Original-To: pim@ietfa.amsl.com
Delivered-To: pim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C190BC14F68B; Tue, 2 Jan 2024 08:54:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b="ihy2cRjt"; dkim=pass (1024-bit key) header.d=juniper.net header.b="k1v0AnMc"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xv3LAgufWPiZ; Tue, 2 Jan 2024 08:54:14 -0800 (PST)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9BBD8C15108D; Tue, 2 Jan 2024 08:54:14 -0800 (PST)
Received: from pps.filterd (m0108159.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.17.1.24/8.17.1.24) with ESMTP id 402AaqEl020472; Tue, 2 Jan 2024 08:53:54 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h= from:to:cc:subject:date:message-id:references:in-reply-to :content-type:mime-version; s=PPS1017; bh=cyrcJfXMdLydzI8gi2vU6D xByiprXXXCTxWCZx/wuuk=; b=ihy2cRjtKoosQmnpBkZhvnzcO7DGR8Hvkgr1k0 tCalO0r2rGERwNSEzP9aYu6hpQnsUf1uMrZydQbwoVV8RS9djtV7z6d3aE8Wpny5 J9I/qZq326VjTHyxG1S5ESb5wZJDRroRkqCZymrVKHDGwLEFjwoVpBrJDJXxXvh+ y1102bpOOYwn+1c2FrHud7wol081enTWCrwFZrM/3AvSusUoYAvvprl8zb3U54h4 HQk2y2ZpfQfS4gKaCHYMbBKlLUN833BdLRUFuAsbeEVqP+OXmbT8gn9J+ezf6qwD MBO5SRYwNE5M7rJn1dmXgCFLqlEQyAoFueFhlcytQ+viuHRQ==
Received: from co1pr02cu001.outbound.protection.outlook.com (mail-westus2azlp17011013.outbound.protection.outlook.com [40.93.10.13]) by mx0a-00273201.pphosted.com (PPS) with ESMTPS id 3vcgvrrk5q-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 02 Jan 2024 08:53:54 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OwrK03ubSodZpga0s/ekfwqJdodavy7V1APEYkwbmdePuHueL3xdHE7pdOrg1ehXfveYDjD5rDuOYSFXtK0BFBIVzYG3d4wBzv3kCleDqwTnuGhiA+0LZ4d1VO8s1Q4W5sQf6h3NeyxZvcI6eCH9krBWbaHFtWqLrVNiosurp6RvLWeZL3hTlxH8SHH7DWqCUAaW/KxELdQf57BLZjvbdhfdxDmY+5l3Ut/qnDYdMKOkWo5f0KXAeKFcKQrXnTkOIT1F66izbSKuz7FjOALcGb/T74evxkQkVizISEnk3SE46M1BtdaAjNcW2TdgwRPOc97VCzHvRHNWa0PQDlh/Xg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cyrcJfXMdLydzI8gi2vU6DxByiprXXXCTxWCZx/wuuk=; b=K2IUKUOFpBSnQOFssZFixGZK+gR9l9ql9ehFjiZcR4uYlGmURicN9NhSDgU2/TcseUCLon6a7tgali+My1R0KL2u3O5TrLsPMrV7yePgOl/FiKrZXVdk/P4WBUmmy6r9zd5vXW+Gn76b72IocXN49lGlYB9HI1DNnIto9hUd0hcO2ARDmvEASOwBrYp8PMySYbvIntOPAap/tq/05TDwNq3ipu51PBLOthr2qEyn7v/Cr2FOmQZg9p6j0LulLz1EjV6083gd1gD+vIyw3dT2Zo1JQD9VAwgqealN2+tfoBsZvSUr7sDx0IjRgbL5gQ6jMYBjkOP3hiYer7m9B3naxQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cyrcJfXMdLydzI8gi2vU6DxByiprXXXCTxWCZx/wuuk=; b=k1v0AnMc+mJDQP87Nykm958R/XLTrU8yhN+9pAo6s3K+tbC1vUYf9LR6BNBbCL8Q0owsSDr1q67Z67m8EeZ08hQ4SbnJYQDCVNcM2RU6jl4U9ocLI1bilg82oq1Vr7S1cUPqgXJ7Y+BvkgFKvAf50GHIqz+EXKlLI1yKv069+AM=
Received: from CO6PR05MB7601.namprd05.prod.outlook.com (2603:10b6:5:353::14) by DM4PR05MB10270.namprd05.prod.outlook.com (2603:10b6:8:180::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7135.25; Tue, 2 Jan 2024 16:53:23 +0000
Received: from CO6PR05MB7601.namprd05.prod.outlook.com ([fe80::d98c:4a56:351b:f719]) by CO6PR05MB7601.namprd05.prod.outlook.com ([fe80::d98c:4a56:351b:f719%4]) with mapi id 15.20.7159.013; Tue, 2 Jan 2024 16:53:22 +0000
From: Dave Katz <dkatz@juniper.net>
To: Hitoshi Asaeda <asaeda@ieee.org>
CC: Brian Haberman <brian@innovationslab.net>, Lenny Giuliano <lenny@juniper.net>, "Holland, Jake" <jholland=40akamai.com@dmarc.ietf.org>, Toerless Eckert <tte@cs.fau.de>, "mboned@ietf.org" <mboned@ietf.org>, "fenner@fenron.com" <fenner@fenron.com>, "pim@ietf.org" <pim@ietf.org>
Thread-Topic: [MBONED] [pim] IGMPv3 backward compatibility issue killing SSM
Thread-Index: AQHaPYEVUW+Kgkuj5kOMeYOPSJsoHrDGtm4AgAAG8wA=
Date: Tue, 02 Jan 2024 16:53:22 +0000
Message-ID: <8DF64ABE-E20A-4C2C-A3D5-63ECEE24EA6C@juniper.net>
References: <CAHANBtKf03ukXH4sgwN0WVdkaVXnbRYdAGBDmQK56YXrS-z6yA@mail.gmail.com> <CAHANBtKdfS0cPceqv8_R+ToeGOBdUksH7gArKqegqSt_Q0Sf0Q@mail.gmail.com> <ZXtzwBljE45Og27f@faui48e.informatik.uni-erlangen.de> <EDE809A0-E672-4A3B-9F46-E08ECD3D4C23@akamai.com> <edc9d539-4b6c-f238-54c6-210c152e2065@juniper.net> <e9ed1779-4f43-4f71-b8c3-d813bcea81d1@innovationslab.net> <532D7FE8-B721-4CF8-A54D-CF139BD8128B@ieee.org>
In-Reply-To: <532D7FE8-B721-4CF8-A54D-CF139BD8128B@ieee.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.4)
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO6PR05MB7601:EE_|DM4PR05MB10270:EE_
x-ms-office365-filtering-correlation-id: 3ec65aef-edd5-4859-5126-08dc0bb354bb
x-ld-processed: bea78b3c-4cdb-4130-854a-1d193232e5f4,ExtAddr,ExtFwd
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO6PR05MB7601.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(136003)(346002)(39860400002)(396003)(376002)(366004)(230922051799003)(230173577357003)(230273577357003)(64100799003)(451199024)(1800799012)(186009)(38100700002)(66899024)(76116006)(86362001)(99936003)(33656002)(36756003)(166002)(91956017)(38070700009)(6512007)(83380400001)(66574015)(26005)(53546011)(2616005)(64756008)(966005)(6486002)(6916009)(2906002)(54906003)(478600001)(6506007)(71200400001)(66556008)(66446008)(66476007)(316002)(122000001)(66946007)(5660300002)(8936002)(8676002)(4326008)(41300700001)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/mixed; boundary="_004_8DF64ABEE20A4C2CA3D563ECEE24EA6Cjunipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO6PR05MB7601.namprd05.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3ec65aef-edd5-4859-5126-08dc0bb354bb
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Jan 2024 16:53:22.8062 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: TJIaQWawth2fIap+5YYjnvYsSJQPrdUDsYIKec3F8tMbCw/7ie4H/deMzWT2NN3NB72w8J0KQaR5A0K2jcmmeA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR05MB10270
X-Proofpoint-ORIG-GUID: ExVnbKZ7l6mgV2I_eWU97WDR4wJ9GtZ-
X-Proofpoint-GUID: ExVnbKZ7l6mgV2I_eWU97WDR4wJ9GtZ-
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.997,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-12-09_02,2023-12-07_01,2023-05-22_02
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 mlxscore=0 phishscore=0 mlxlogscore=999 clxscore=1011 malwarescore=0 priorityscore=1501 bulkscore=0 spamscore=0 impostorscore=0 lowpriorityscore=0 adultscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2311290000 definitions=main-2401020126
Archived-At: <https://mailarchive.ietf.org/arch/msg/pim/MyJSbbrMs7y69RYwPYo1E0ZQWRA>
Subject: Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM
X-BeenThere: pim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Protocol Independent Multicast <pim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pim>, <mailto:pim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pim/>
List-Post: <mailto:pim@ietf.org>
List-Help: <mailto:pim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jan 2024 16:54:18 -0000

Here’s something I wrote up about 15 years ago (!) when I rewrote IGMP when we expected that cable TV was going to be delivered by multicast (that didn’t quite work out, thank you Netflix).

I’ve forgotten all of it but perhaps there is something to be gleaned from the document…

—Dave



> On Jan 2, 2024, at 8:28 AM, Hitoshi Asaeda <asaeda@ieee.org> wrote:
>
> [External Email. Be cautious of content]
>
>
> Hi Brian and folks,
>
> I have a different opinion about Lenny's comment.
>
> Dependency or relation between protocol designs and operational issues (or policies) should be always minimized.
> Protocol behavior should not be solidly relies on the address range.
>
> IP multicast has a long history for allocating (or chopping) its address ranges. We had adopted complicated "address scopes" such as administrative/site-local/organization-local scope... How we can interact with SSM range and them?
> I've just remembered GLOP. How SSM and GLOP can be interacted with?
> One may deduce, no need to interact with them, use SSM range.
> Then what address ranges are obsolete today? What range should be used now? Is its decision persistent?
> Such a dirty hack or patch work is not sustainable for designing protocols.
>
> What I'm saying here may be a bit too conceptual. So, please ignore the points if people agree to relying on the SSM range. However, even so, I guess the following point must be taken into account.
> Section 2 in RFC4604 says;
>   A host or router may be configured to apply SSM semantics to
>   addresses other than those in the IANA-allocated range.  The GMP
>   module on a host or router SHOULD have a configuration option to set
>   the SSM address range(s).  If this configuration option exists, it
>   MUST default to the IANA-allocated SSM range.  The mechanism for
>   setting this configuration option MUST at least allow for manual
>   configuration.  Protocol mechanisms to set this option may be defined
>   in the future.
> I think this paragraph implies that applications that want to invoke SSM services can use any multicast address range.
> If RFC4604 should be the normative reference, RFC4604 itself must be also revised.
>
> Regards,
>
> Hitoshi
>
>
>> On Jan 2, 2024, at 22:39, Brian Haberman <brian@innovationslab.net> wrote:
>>
>> Lenny's assessment is correct from my perspective. Section 7.3.2 specifies that IGMP version compatibility is kept on a per-group basis. This should preclude compliant routers from disabling SSM service in the SSM address range.
>>
>> Section 7.3.1 discusses the compatibility mode configuration option for IGMPv3 routers, but there is not a recommended default setting for that option.
>>
>> Are there aspects of RFC 4604 that people think need to be updated?
>>
>> Regards,
>> Brian
>>
>> On 12/19/23 4:09 PM, Leonard Giuliano wrote:
>>> As I understand, RFC4604 explicitly prevents SSM service from being killed
>>> by the presence of an IGMPv1/2 host (assuming the router is SSM aware,
>>> which in 2023 is a fairly valid assumption).  That is bc the router should
>>> ignore any v1/v2 reports in the ssm range (232/8).  And as I understand,
>>> RFC3376 Sect 7.3.2 provides backwards compatibility for v1/2 hosts, but
>>> only on a *per-group* basis- not for the whole LAN.
>>> Combining the two, SSM service is protected in SSM range (232/8).  In
>>> non-SSM range, due to backward compat, you could lose SSM behavior- but
>>> since you are in non-SSM range, all bets were off in the first place.
>>> So unless I'm missing something, I don't see see the risk of SSM being
>>> killed by v3 backwards compatibility.  Adding DKatz, who know this stuff
>>> way better than me in case I misinterpreted any of these specs.
>>> -Lenny
>>> On Mon, 18 Dec 2023, Holland, Jake wrote:
>>> |
>>> | On 12/14/23, 1:29 PM, "pim on behalf of Toerless Eckert" <pim-bounces@ietf.org <mailto:pim-bounces@ietf.org> on behalf of tte@cs.fau.de <mailto:tte@cs.fau.de>> wrote:
>>> | > The elephant IMHO is that rfc3376bis is so far not including changes to IGMPv3 behaviors
>>> | > about backeward compatibility with v1/v2 routers on the LAN, and exactly this behavior is
>>> | > killing SSM in deployment because any such router when it becomes querier will kill SSM
>>> | > ... because hosts will revert to v1/v2 and not report their SSM (S,G) memberships.
>>> |
>>> | +1, this is a serious problem.  The current default behavior bakes a DOS for SSM into the
>>> | protocol.
>>> |
>>> | > If there are routers that have config options to disable this backward compatibility with
>>> | > older routers, i would love to learn about it.
>>> |
>>> | When using linux routing there is `sysctl net.ipv4.force_igmp_version=3`, but it says because
>>> | of the difference in the security considerations between MLD and IGMP it doesn't actually
>>> | ignore v1 and v2 even when it's set:
>>> | https://urldefense.com/v3/__https://sysctl-explorer.net/net/ipv4/force_igmp_version/__;!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZENUoioNQ$
>>> |
>>> | (MLD permits an "ignore v1 completely" setting, but says it should only be used when
>>> | source filtering is critical:
>>> | https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/rfc3810*section-10.2__;Iw!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZEHCk8UTw$  )
>>> |
>>> | > - Replace with something like:
>>> | >
>>> | > This revision of IGMPv3 version 3 removes automatic fallback to IGMP version 2 and version 1
>>> | > routers on the same network as specified in [RFC3376]. Instead,
>>> | > such older version router behavior MUST be explicitly configured.
>>> |
>>> | While I agree that to the greatest extent we can induce, IGMPv3 queriers from now
>>> | on should maintain the capability to propagate SSM and accept IGMPv3 membership
>>> | reports under all circumstances (even when there is an IGMPv1 or v2 receiver on the
>>> | LAN), I'm not sure it makes sense to ship text that makes all the currently deployed
>>> | routers retroactively non-compliant with a MUST in the new IGMPv3.
>>> |
>>> | But I'd support adding a section that describes the problem and provides a well-
>>> | justified and strong recommendation that the default behavior be changed from
>>> | what's in RFC 3376 and that a config option be provided to ignore IGMPv1 and v2
>>> | packets, like with MLD.
>>> |
>>> | It might be worth saying something like now that we have RFC 8815 and in light of
>>> | the experimental status of RFC 3618 (MSDP) and its deployment BCP in 4611, source
>>> | filtering should always be considered critical for clients that support it?  (Not sure that's
>>> | necessary, just a brainstorming idea to point to some of the docs that cover new
>>> | operational experience since 3376...)
>>> |
>>> | > IGMPv3 routers MUST have a configuration option, disabled by default, to operate
>>> | > as an IGMPv2 router. When enabled, all procedures of [RFC2236] apply. Configuring this
>>> | > option is necessary in the presence of non-IGMPv3 capable IGMP snooping switches or
>>> | > PIM routers. These are rare but may still be depoyed.
>>> | >
>>> | > When operating in IGMP version 3, routers MUST ignore version 1 and version 2 queries.
>>> | > In version 3, the presence of those older version queries constitutes a misconfiguration
>>> | > or attack, and these messages SHOULD result in logging of an error (rate-limited).
>>> | >
>>> | > - And in an appropriate part of the host behavior:
>>> | >
>>> | > IGMP version 3 hosts MUST have a configuration option, disabled by default, to ignore
>>> | > IGMP version 1 and version 2 queries. This option SHOULD be auto-enabled when the host
>>> | > is running SSM receiver applications, and hence depends on IGMP version 3 to operate in the
>>> | > network.
>>> | >
>>> | > This is about as much as i think we can do if we still want to go full standard with rfc3376bis.
>>> | > I can think of no operational deployment where the introduction of devices with existing
>>> | > older RFC compatibility would cause interoperability issues. At worst the new router would
>>> | > need to be explicitly configured for IGMPv2, which in my experience most routers deployed
>>> | > into IGMPv3 environments are done anyhow.
>>> | >
>>> | > Comments welcome. Would love to see positive replies in which case i will be happy to explicitly
>>> | > sugest the text changes for this elephant issue to the draft.
>>> |
>>> | Thanks for raising this, Toerless, the IGMP downgrade problem has been a major source of pain
>>> | for some deployments that rely on SSM.
>>> |
>>> | - Jake
>>> |
>>> |
>>> | _______________________________________________
>>> | MBONED mailing list
>>> | MBONED@ietf.org
>>> | https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/mboned__;!!NEt6yMaO-gk!BhrKkLRDUzon0XP8RebeJvai8X02-AU2RBEGA0iJrQsgSIeCPBd4KVVIUoc5jD59w8aYpNbAYiTFWo_sN87x_ZG9c7AK9g$
>>> |
>> _______________________________________________
>> MBONED mailing list
>> MBONED@ietf.org
>> https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/mboned__;!!NEt6yMaO-gk!CdCLpafWuYi5H5RtrXjSntQWEXq4pVwYPcx3vYhCezHPEQLfj04lbhOJPl4t7LCjKcwHNQokMyBl$
>