Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM

Hitoshi Asaeda <asaeda@ieee.org> Wed, 17 April 2024 04:35 UTC

Return-Path: <asaeda@ieee.org>
X-Original-To: pim@ietfa.amsl.com
Delivered-To: pim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04FBDC14F689 for <pim@ietfa.amsl.com>; Tue, 16 Apr 2024 21:35:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.145
X-Spam-Level:
X-Spam-Status: No, score=-9.145 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-2.049, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ieee.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BLiEl2c-G6Eo for <pim@ietfa.amsl.com>; Tue, 16 Apr 2024 21:35:42 -0700 (PDT)
Received: from mail-pl1-x62a.google.com (mail-pl1-x62a.google.com [IPv6:2607:f8b0:4864:20::62a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF1D6C14F5FE for <pim@ietf.org>; Tue, 16 Apr 2024 21:35:42 -0700 (PDT)
Received: by mail-pl1-x62a.google.com with SMTP id d9443c01a7336-1e4f341330fso43223705ad.0 for <pim@ietf.org>; Tue, 16 Apr 2024 21:35:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ieee.org; s=google; t=1713328542; x=1713933342; darn=ietf.org; h=to:references:message-id:content-transfer-encoding:cc:date :in-reply-to:from:subject:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=fNmqj1t6VEgZolCV2eBVbj+qVcn7O/uRDWDj9t1tc+0=; b=Hi9naPKKntgQgUooBpbUhObfZ933y+pW0r3ajxbnS0z/NYAIBhBxH6KBk3sUR/OsKN nqdr6vlyRCkAwa/ouZkL2ReFkDQxODF/mYf9y/BJgz1DBEkEQ3O/n7LLJtIQdoP+NPgo MyE2y4rY4wbAQXi4YGyJWUcDDEIN2RYMKoICw=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1713328542; x=1713933342; h=to:references:message-id:content-transfer-encoding:cc:date :in-reply-to:from:subject:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=fNmqj1t6VEgZolCV2eBVbj+qVcn7O/uRDWDj9t1tc+0=; b=lf4f5s9acFUEO9Djov8zNStXlsvV2wyJAyFUN/kP3xFd5thwJr/vlc9v9+bUUogFC3 t+L6aVHM99lG7ZbE1l/Bewb8eD66qnTZGYDORsMSfKhTQ0pS3mWXW9rVBXG7qprykPq2 auNpEue7mkcwCe+h5JOHnA0VqLuD6yvzWyTuPz/Tmst64f38cN9Apu9kRHiHARorSViZ 7lU029z1lHvguX5aUVUOwAb+zpKWOgCf5DNQFDw7HrBPqKfSO1mdMsVjABxGnCcZSdbq YzLjO7cBYjCor32/V6uHYEIWJ4nMs1hiN8xAysEbF7xza4wZlBGRapTh+Q5fqlGGxuDm iZLA==
X-Forwarded-Encrypted: i=1; AJvYcCUkA7pMNeSJEpzlaDnfzAIjPpOVJzWMvnm+QbpGJZqRzh5xcHhfOh1loCWm7/Gd+WJIKrG0RM2yfQ9Vz68=
X-Gm-Message-State: AOJu0YzLhBa1D13PK4WGmba3HCSkwxuRKGsCYnHIyGUUpS0GYlSwjDc2 sO70+Vq0WrDazzW69P7rBoMx42in8WAsvy/MLSU61ehsuK2wj4mtuNAKdZPX5w==
X-Google-Smtp-Source: AGHT+IFIRsS/V6wRXtwBzEpk5W1ZC5vr48geFJ/BTeucmiv4NDe39u3yNGDhFLcH343bldxDt8eHZQ==
X-Received: by 2002:a17:902:e885:b0:1e3:e1d5:8563 with SMTP id w5-20020a170902e88500b001e3e1d58563mr16823320plg.19.1713328541820; Tue, 16 Apr 2024 21:35:41 -0700 (PDT)
Received: from smtpclient.apple ([133.243.235.233]) by smtp.gmail.com with ESMTPSA id h6-20020a170902f7c600b001e4928c8026sm6946336plw.13.2024.04.16.21.35.39 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 16 Apr 2024 21:35:41 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.1\))
From: Hitoshi Asaeda <asaeda@ieee.org>
In-Reply-To: <CAHANBtKiwb8dOcx9EEGz4J5xNU2+RwvGPcwVye3MGEw3_bt_6g@mail.gmail.com>
Date: Wed, 17 Apr 2024 13:35:38 +0900
Cc: Brian Haberman <brian@innovationslab.net>, pim@ietf.org, Toerless Eckert <tte@cs.fau.de>, Leonard Giuliano <lenny@juniper.net>, Nicolai Leymann <n.leymann@telekom.de>
Content-Transfer-Encoding: quoted-printable
Message-Id: <B554BA6D-8878-4679-80B0-46B0C0D0A9E6@ieee.org>
References: <CAHANBtKf03ukXH4sgwN0WVdkaVXnbRYdAGBDmQK56YXrS-z6yA@mail.gmail.com> <CAHANBtKdfS0cPceqv8_R+ToeGOBdUksH7gArKqegqSt_Q0Sf0Q@mail.gmail.com> <ZXtzwBljE45Og27f@faui48e.informatik.uni-erlangen.de> <EDE809A0-E672-4A3B-9F46-E08ECD3D4C23@akamai.com> <edc9d539-4b6c-f238-54c6-210c152e2065@juniper.net> <e9ed1779-4f43-4f71-b8c3-d813bcea81d1@innovationslab.net> <CAHANBtJ0S8RfVvfcMHO5XKeDMpzN0O4Jn3MFPJXecNpBVNs6gQ@mail.gmail.com> <8c620ad0-2174-4cc4-9df9-5940e1225fac@innovationslab.net> <cd8cbc0b-a69d-3bcd-c107-9cc1c4435feb@juniper.net> <CAHANBtL_-Sd-iLV4TjvX+WwrkQHAU3m6w5dNiniqvWYuZjWtvA@mail.gmail.com> <85877FB7-A7E1-4EA2-9A15-80E1262ED956@ieee.org> <8f3b0fba-4dac-41b3-851e-21ab94c660db@innovationslab.net> <CAHANBtLPuGUAqKeJF_H86_N6RnzYitugHNBV0tgVb6cTMTq_xw@mail.gmail.com> <fd72716a-0a41-4854-aabf-163ca67d5918@innovationslab.net> <CAHANBtKiwb8dOcx9EEGz4J5xNU2+RwvGPcwVye3MGEw3_bt_6g@mail.gmail.com>
To: Stig Venaas <stig@venaas.com>
X-Mailer: Apple Mail (2.3731.700.6.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/pim/V58X3CBmT7LLqWg3ccZ9ldqGE5o>
Subject: Re: [pim] [MBONED] IGMPv3 backward compatibility issue killing SSM
X-BeenThere: pim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Protocol Independent Multicast <pim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pim>, <mailto:pim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pim/>
List-Post: <mailto:pim@ietf.org>
List-Help: <mailto:pim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Apr 2024 04:35:47 -0000

Hi Stig,

I’m fine with the following additions.
Thanks.

Regards,

Hitoshi


> On Apr 17, 2024, at 1:08, Stig Venaas <stig@venaas.com> wrote:
> 
> Hi Brian
> 
> This looks great to me, but I would like to hear from people that
> raise this issue to see if they are OK.
> Toerless, Lenny, Nick, Hitoshi (and others), does this look good to
> you? Can we proceed with the publication?
> 
> Thanks,
> Stig
> 
> 
> On Tue, Apr 16, 2024 at 5:31 AM Brian Haberman <brian@innovationslab.net> wrote:
>> 
>> Hi Stig,
>>      Thanks for the clarification...
>> 
>> I am curious if the following two additions would address this issue
>> without delaying the advancement of the documents to Internet Standard.
>> 
>> 1. In Section 7.2.1 - Add this to the last paragraph : "It is
>> recommended that implementers provide a configuration option to disable
>> use of Host Compatibility Mode to allow networks to operate only in SSM
>> mode. This configuration option should be disabled by default."
>> 
>> 2. In Section 7.3.1 - Add an additional bullet : "It is recommended that
>> implementers provide a configuration option to disable use of
>> compatibility mode to allow networks to operate only in SSM mode. This
>> configuration option should be disabled by default."
>> 
>> Regards,
>> Brian
>> 
>> On 4/8/24 5:26 PM, Stig Venaas wrote:
>>> Hi Brian
>>> 
>>> I don't think changing defaults would be sufficient. My concern (and I
>>> think that is what others are concerned about as well) is that hosts
>>> and routers fall back to older versions when there is an older version
>>> querier, as specified in 7.2.1 and 7.3.1. Regardless of the default,
>>> it says that they must change mode or fall back.
>>> 
>>> I think we need some text where we RECOMMEND that hosts and routers
>>> have a knob that disables compatibility mode and makes the host/router
>>> always operate in IGMPv3 mode. This should of course be off by default
>>> (fall back as usual). I'm happy if there is a more lightweight
>>> approach that I'm not seeing.
>>> 
>>> Regards,
>>> Stig
>>> 
>>> On Tue, Apr 2, 2024 at 12:10 PM Brian Haberman <brian@innovationslab.net> wrote:
>>>> 
>>>> Hi Hitoshi,
>>>> 
>>>> On 3/20/24 10:01 PM, Hitoshi Asaeda wrote:
>>>>> 
>>>>> I thought what we need to clarify in DS IGMPv3/MLDv2 RFCs is that, as Brian mentioned, we can simply add recommended default settings for the compatibility mode variables. That’s all, I thought.
>>>>> 
>>>>> But you remind me of the following four situations.
>>>>> 
>>>>> 1. querier = SSM capable, forwarder = SSM capable -> no fallback
>>>>> 2. querier = SSM capable, forwarder = non-SSM capable -> fallback
>>>>> 3. querier = non-SSM capable, forwarder = SSM capable -> no fallback (and SSM capable router must become (replace) querier?)
>>>>> 4. querier = non-SSM capable, forwarder = non-SSM capable -> fallback
>>>>> 
>>>>> I wonder how above 2 and 3 are clearly considered in some RFCs?
>>>> 
>>>> Which RFCs are you worried about? I think 3376 and 3376bis cover this in
>>>> section 7.3 with discussion of the compatibility mode and group
>>>> compatibility mode variables. We would augment that discussion with a
>>>> recommendation that those compatibility mode variables default to IGMPv3
>>>> mode.
>>>> 
>>>> Table 9 in section 7.2.1 already indicates that hosts default to IGMPv3
>>>> mode. We need to indicate a similar default in section 7.3.1.
>>>> 
>>>> Regards,
>>>> Brian
>>>> 
>>>> _______________________________________________
>>>> pim mailing list
>>>> pim@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/pim