Re: [pim] IGMPv3 backward compatibility issue killing SSM (was: Re: pim wglc for 3228bis, 3376bis and 3810bis)

N.Leymann@telekom.de Tue, 02 January 2024 10:38 UTC

Return-Path: <N.Leymann@telekom.de>
X-Original-To: pim@ietfa.amsl.com
Delivered-To: pim@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 454A8C14F60E; Tue, 2 Jan 2024 02:38:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.103
X-Spam-Level:
X-Spam-Status: No, score=-7.103 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telekom.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b3gnvfgu_Vb3; Tue, 2 Jan 2024 02:38:20 -0800 (PST)
Received: from mailout21.telekom.de (mailout21.telekom.de [194.25.225.215]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B046AC14F60C; Tue, 2 Jan 2024 02:38:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telekom.de; i=@telekom.de; q=dns/txt; s=dtag1; t=1704191900; x=1735727900; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=7unzaDU7cS3WN+BytLlg7Yfz+VxFOlx/WvJi7j5dN/s=; b=ttYr5tEj5fxnfzyrhRGxd289eeE5J7nPFuO/mw9kFmN19viO5vXUVz05 +MfxTxYgMdfvHzcDo6KpX3TnCbi0d6NB+DSSAU+5IXytd5xOOUFJdglW4 r7kY+corEFcu2dZy6mJeBFh5RyihQsDYncLvZt4Z3/IfRz0Bbue/3Z2Hi Obzr/rR0KzUOwo6gttrm6ol/JFGfqAGHMrC7TfSS48dLMgA3X/bc2f1bM 8QqvieAHU7CDp7eaGiXymxZMi3sDN1QqZL3RS1p6Qe9y0u6TKE4nnm+bP xbwxTOgOyAirbCYU2fik4OqQSsRgBLK9v7t4oG3W4apzyXyUm0VowrVJh A==;
Received: from qdefcs.de.t-internal.com ([10.171.254.41]) by MAILOUT21.dmznet.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 02 Jan 2024 11:38:16 +0100
IronPort-SDR: 6593e798_mTGvUUJNNPREjYloZIMn1tRlztz50kJso1I2PUvlNGMh12O fEqMbJ8Cm+AoEjAMCnOw5AIPbLfDtaBh/rjRZVA==
X-IronPort-AV: E=Sophos;i="6.04,324,1695679200"; d="scan'208";a="828146279"
X-MGA-submission: MDFi9e8RU7mqwY2MRq9VC56o7FT3aLO2EtzXkTaDtui2vUXeKSR1M+TAKNv60ZNSSQi2Pd51CUropWTpFdu0v+C4Q49l3SGdbxYPy/TZLmaYfpbE9kTzuJUAK2bbSmsIfNMzeHdCA+i+eNphh57dKkLP9OJZQrSlRC57HDTmfNqaoQ==
Received: from he101393.emea1.cds.t-internal.com ([10.169.119.197]) by QDEFCV.de.t-internal.com with ESMTP/TLS/ECDHE-RSA-AES128-GCM-SHA256; 02 Jan 2024 11:38:17 +0100
Received: from HE126308.emea1.cds.t-internal.com (10.169.119.205) by HE101393.emea1.cds.t-internal.com (10.169.119.197) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.28; Tue, 2 Jan 2024 11:38:15 +0100
Received: from HE101190.emea1.cds.t-internal.com (10.169.119.196) by HE126308.emea1.cds.t-internal.com (10.169.119.205) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.28; Tue, 2 Jan 2024 11:38:15 +0100
Received: from HE102779.emea1.cds.t-internal.com (10.171.40.45) by HE101190.emea1.cds.t-internal.com (10.169.119.196) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.28 via Frontend Transport; Tue, 2 Jan 2024 11:38:15 +0100
Received: from DEU01-BE0-obe.outbound.protection.outlook.com (104.47.7.168) by O365mail10.telekom.de (172.30.0.242) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.28; Tue, 2 Jan 2024 11:38:15 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BvDpJzSB0aZbzSRO6EjPJtKh+1Oc+WPocujnuyYmFZn6qN4iOz6zNATNB4Gcw0bFSAtO/GN8Q83qkebDlSLuGhy3WjhPxz5aXZcqJXWaZYzp0gocq9nt0T5Bf2OQhc5ahc5/zldpqiBDOC4T5g92f1dLldZQgLJ+WwzmjkZCpjHwfiI44/RfSK36REh4M7vUwKuCanx4ehOw95SJmCMofHpC/2J85FclSt1ybENsojdFI3TXxjzX+axsSV0CmdpjSdok6kMZQoxZyXQde4mbb02pWxgkA2GZvb+D/kxBaHp+jzb5Eyu62h290mKwjK8BKXQK5tm/5WdU1nVoXGrSdQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=7unzaDU7cS3WN+BytLlg7Yfz+VxFOlx/WvJi7j5dN/s=; b=SLzYJNyZwp4HNW3uzhKQJMbXjOkgJZ778Fqku9P3b+pk2usLnbADxtIhhNexWOkv49gHqKurAvUx20FTmJkwTUqu0Cmz0e7HrGwmYa4nvgcAKKF8c0yXVHdMh8eBMujgGBKVHPs7STm7e2x+3u4qumnhf3DyKEoAq9zCicS0+4G9cmed44dgvluY6bekNl6Owxh9mU8apgDc+sfedJj+Rk7qfkcvQV9MH+5OfYRBPnYzcXznolhJGF+sR+BXOcOuHLfnB/pc5rbDRsMAfQm02mPPMVEpXVYAzgqsGzr0CjOJyM4bsWiVSNC+pDO/edf89ikpfeg7mZCA1l+oFF8Xlg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telekom.de; dmarc=pass action=none header.from=telekom.de; dkim=pass header.d=telekom.de; arc=none
Received: from BEZP281MB2008.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:55::8) by FRYP281MB2464.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:2f::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7135.25; Tue, 2 Jan 2024 10:38:14 +0000
Received: from BEZP281MB2008.DEUP281.PROD.OUTLOOK.COM ([fe80::ea4b:f698:18d8:88fc]) by BEZP281MB2008.DEUP281.PROD.OUTLOOK.COM ([fe80::ea4b:f698:18d8:88fc%6]) with mapi id 15.20.7135.023; Tue, 2 Jan 2024 10:38:14 +0000
From: N.Leymann@telekom.de
To: tte@cs.fau.de, stig@venaas.com, zzhang@juniper.net, brian@innovationslab.net, N.Leymann@telekom.de, pim@ietf.org, mboned@ietf.org, fenner@fenron.com
Thread-Topic: IGMPv3 backward compatibility issue killing SSM (was: Re: [pim] pim wglc for 3228bis, 3376bis and 3810bis)
Thread-Index: AQHaLtSmt1qav/w/EU2Dvg5aWPZlErDGV0qw
Date: Tue, 02 Jan 2024 10:38:13 +0000
Message-ID: <BEZP281MB200897860EDC01B137083E369861A@BEZP281MB2008.DEUP281.PROD.OUTLOOK.COM>
References: <CAHANBtKf03ukXH4sgwN0WVdkaVXnbRYdAGBDmQK56YXrS-z6yA@mail.gmail.com> <CAHANBtKdfS0cPceqv8_R+ToeGOBdUksH7gArKqegqSt_Q0Sf0Q@mail.gmail.com> <ZXtzwBljE45Og27f@faui48e.informatik.uni-erlangen.de>
In-Reply-To: <ZXtzwBljE45Og27f@faui48e.informatik.uni-erlangen.de>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=telekom.de;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BEZP281MB2008:EE_|FRYP281MB2464:EE_
x-ms-office365-filtering-correlation-id: 6c4d3609-04de-4602-3684-08dc0b7eec76
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: AbHdWlV7a9VcOXIBbZOD7R5hbvUgChIaQBYbAQ9ekstHb2JElxIgi6Z95by3Lj4mZJU/2SHWLtV0cn0Wey1lh0Dnb1qOPxoMvt2fjr2bGGVNv6aCgadkZBh9b61U8Ftt8VaREvV8rcjVZbqBd3xyE/IIoawz5eebXV/D5IOGcXtrRYsDKDrOSklTMzkQ/O96mNfYkSreKxkcm2wn9KHRuFiH2oYFVc1UVHZV/dIgZb3UBWCqd3byjgJOEVavLG3nH97B2r7l4o0lfFJDxeV5z77Wqulj8U6b7IiFLpbPt6/7aqBhI+cwWdKvSZ6wKBUUHuPdGPS2hvq2u4PgVDrT+9/3P1EmbEu3Qnk2PSiFgOM0lHyE8SqDH0wet7gTGAURltsRaI+d8lIbeXo6KNHqtJrvPM0VwtrWtoS48ivU9ZXsoeoOtwuF8QrJXs/eTO1/Qylkv1oN44k152k+wzr1sSsRzrML7KVM6PmTw869mdA6sv0w13FOkL0KFB3Qj6VL5/r9Zn/62Lu/QvYOjuabPRfW2y+WT8e7cwwMtnyM8hk+gM+/eNXy3KgsnOPnawjaxRFDAgdw57CogPFR6oIe2btYUf4ihlIjVmeNDwEQZUH4tfWilx3j8yEY9etW3LuN68kSqyN3GOeqG2bvAvl4gw==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BEZP281MB2008.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(396003)(346002)(376002)(366004)(39860400002)(136003)(230922051799003)(64100799003)(186009)(451199024)(1800799012)(478600001)(316002)(966005)(8936002)(8676002)(52536014)(66476007)(110136005)(66556008)(64756008)(66946007)(76116006)(66446008)(83380400001)(66899024)(71200400001)(53546011)(7696005)(6506007)(9686003)(66574015)(26005)(5660300002)(2906002)(41300700001)(33656002)(38070700009)(122000001)(38100700002)(82960400001)(86362001)(55016003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: lp6Ah4UIBY1Mfb6BXeIu39Ft8XwgGvFZkYdFTY7Y1BRHjN7wqk1Q7vCkR72kBcPyS0gXs2jEd/5Isd4HoyukqU7iDxhXyD5kGeYwhQoE2cERX+x/LxZIzMRtBoV9cIWepzgs/KEF2xMUJkrc7bQEbzQmxzZkVX9tOsmVTfOQ8He1hXltusTVuF0/uhjBHHNAsnnsYth2K9B+fUUqhUQ0rQJECQwiPHt2dCqvLy+7LY58ACJb5sWooKKPmsouOCO7wLWtH/aai2dmicX13ElehIWXKPKC1E3kpBzHsxBUFy2D5KzxgQF08ZXksTcVoQvWCN/9uJnramZe8F2lH2LJ4zPxYkqOtS/3x4HhVNNQVCQgKmVcZhmQQHBk5OAk3BFOHlwG3rLeMQn9k+s+plli+jeiBKOVMb7X45sdaLhy5nnO/9mZZoJW62Tes/G1tkCA70GMo0iMQChYhP9inRrMRbTSvK7ni/1D36bF1g8Fkr0zVIlLpSjLIegI5RDLUpvLivfAV43BKrbREdWZryyXyyhRqpTssScrBE7uAu/HndfDwdE7SHMT+/AwY0IrsB7rVHYvKUlDFx8AzbZFnn5TRZeudsGFyxU6E9IkFZn/Ga4kJ8+iRZMGcJHj8/jsGtDTztkGJ0R9iV4JC1C1a2ggcWNiD+0gSLdXXwJpqQb0y+sNrSyXOq/k+T1ILt/NhluEoMLqZPk5gGeeLTcW6/kAhRcVH9oeV2N562y/+xehT+3cg1ujpsYZcUGXlf68UiiY2R4ddQy30mwaKh4XybTu4arSgUC5YHgp1w1586088QtZ7BYGA9J9OeCbrKWSrzAMIH4rkAzoASxMRckCwOx6AMabvOU2fVGWKB727w/J82XdL0grlHbPBaPjoCxqkgucJ1i7oK91GLCg1u+reXLYQf4VW3fztn6JY15CUJzq4YLTdWf2NkjQciwNosXOLTeGN0hne4bbfxnk2eNpiFNW4igyjfA+CG9xEWpFLVBx2q7EiqfpDDwb7PfUjsoOqvYOr+gq7crVZCXZzLkoQlmouF9rQxV93cS2nBXAvGZkoX+RmfvsTdFZg7htDcB+OoPU3NZg+jGWX3Jhrmu1fR5wx8c4EydkHFjYK+nAfJhoNPj1+yRpYdHvG1nqiOPAPc6NSFYtcz1N77BclBbxkN4YJd5MabaAqrzOXvF0CL21MdLgapG+WEH9TigyzPLxVWiYypcGxZ4YpRHcmJ4IAaKtyV0UNwpDlIBgbCIh74LCsjfxmEti8MjQXJR3CFuw0cuvA7WWaRVtT33HA2eseDELYEx/rtMvRqnFrN+t7qxYw7fJb02hbVGTzrrIjz69zCQrAjhifkXrWnWF0ZAIK0bc/+jCZXJ4kugpdherKP2oTe/Lb3+d5hQSzVB5kDdJcaVqmXI9R+ifDA3nLUFrqgWzXAkRYi+Pun12CZwd+5Myo4df5teH792JE6Dsn/7uJJJ/tQ63gZ5aSqANq1KKm3yo55aN0or1kOgb+WP4UqTbK4JZmQc2sBg+nonXDS94YBuFngFSVdlEsgclMmgyXClYO/f5iFFh/mbOn5ntHjIegctjFqR89QNdvK71M+fbqHkP
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BEZP281MB2008.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 6c4d3609-04de-4602-3684-08dc0b7eec76
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Jan 2024 10:38:14.0270 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bde4dffc-4b60-4cf6-8b04-a5eeb25f5c4f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: PYB5TV4TbUKAH4gea0hjIVyGDaD+Z2K3pIEjuLxLDmnW2rhHuMDdJ1YUsMmg7Zi5gU3mmyXQslhfJkAmUaG69A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: FRYP281MB2464
X-OriginatorOrg: telekom.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/pim/XZsAVja_8TSzfd14cvIQJOBsdA4>
Subject: Re: [pim] IGMPv3 backward compatibility issue killing SSM (was: Re: pim wglc for 3228bis, 3376bis and 3810bis)
X-BeenThere: pim@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Protocol Independent Multicast <pim.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pim>, <mailto:pim-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pim/>
List-Post: <mailto:pim@ietf.org>
List-Help: <mailto:pim-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pim>, <mailto:pim-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jan 2024 10:38:25 -0000

Hi Toerless,

Thanks for bringing this up (see inline).

> -----Ursprüngliche Nachricht-----
> Von: Toerless Eckert <tte@cs.fau.de> 
> Gesendet: Donnerstag, 14. Dezember 2023 22:30
> An: Stig Venaas <stig@venaas.com>; zzhang@juniper.net; brian@innovationslab.net; Leymann, Nicolai 
> <N.Leymann@telekom.de>; pim@ietf.org; mboned@ietf.org; fenner@fenron.com
> Betreff: IGMPv3 backward compatibility issue killing SSM (was: Re: [pim] pim wglc for 3228bis, 3376bis and 3810bis)
> 
> Dear pim/mboned:
> 
> I am in WGLC review for rfc3376bis, but i am stumbling across the one IMHO elephant in the room, and i 
> thought i should start a separate discussion thread here, and also Cc: mboned, because not all ops folks 
> may want to follow pim, but this elephant is i think the main reason why SSM has gotten a bad rap in 
> deployments - and we should take the opportunity to fix it in rfc3376bis.
> 
> The elephant IMHO is that rfc3376bis is so far not including changes to IGMPv3 behaviors about backeward 
> compatibility with v1/v2 routers on the LAN, and exactly this behavior is killing SSM in deployment because 
> any such router when it becomes querier will kill SSM ... because hosts will revert to v1/v2 and not report 
> their SSM (S,G) memberships.
Yes. That was one of the major issues we encountered during our IPTV deployment. Home networks are out
of our control and unfortunately there are many devices not supporting IGMPv3. As soon as you have an
older IGMP version active in the home network this will usually cause trouble with SSM making end-to-end
SSM deployments extremely difficult. For that reason we decided to add SSM mapping at the network edges
and to run the IPTV application with ASM only. From operational perspective not the best solution (e.g. you
need a process to change the SSM mapping in case of changes in the IPTV streams).

> RFC3376 (and currently rfc3376bis too) writes (line numbers from idnits):
> 
> 1837       *  If any older versions of IGMP are present on routers, the querier
> 1838          MUST use the lowest version of IGMP present on the network.  This
> 1839          must be administratively assured; routers that desire to be
> 1840          compatible with IGMPv1 and IGMPv2 MUST have a configuration option
> 1841          to act in IGMPv1 or IGMPv2 compatibility modes.
> 
> The second sentence is either english that i do not understand, or it is in contradiction to the first sentence. 
> If there is a configuration option to enable/disable router compatibility with IGMPv1/IGMPv2, and i disable 
> this configuration option on my router, then i would be in contradiction to the first sentence, wouldn't i ?
> 
> I am also not aware of implementations that do have a configuration option that would allow to disable 
> IGMPv1/IGMPv2 backward compatibility - when running IGMPv3.
I think it's even against the standard which requires a fallback from IGMPv3 towards IGMPv1/IGMPv2. This was
one of the option we discussed  (to force the home gateway to stay with IGMPv3 even in the presence of other 
IGMP versions) but the outcome was that the standard requires a fallback towards IGMPv1/v2 and that
Implementing such a behavior would be against RFC3376.

> 
> In many router operating systems there is a config "ip igmp version [1|2|3]", but when it is configured for 
> version 3 (which by now should be the default in all router OSs), then the backward compatibility will be 
> active, falling back to IGMPv1/v2 when an appropriate lower general query is received. Maybe this is what 
> implementors thought of when reading 1837-1841, but i would be surprised if thats what was meant.
> 
> If there are routers that have config options to disable this backward compatibility with older routers, i would 
> love to learn about it.
I have not seen that possibility (but might be possible with some kind of ACL/filters). 

> 
> So, my argument is:
> 
> The 1837-1841 functionality of RFC3376 was intended to also allow disabling of IGMPv2/IGMPv3 router backward 
> compatibility (and one can argue whether or not it was meant to be enabled by default). However, this is a feature 
> that was not implemented. Instead, widely deployed implementations only implemented automatic fallback - and 
> that turned out to be a non-desirable operational behavior of RFC3376. Instead, when users actually did want to 
> have IGMPv2 behavior on their network, they explicitly configured IGMPv2 router behavior. But did not want to 
> rely on automatic fallback. And given how there is in current widely deployed router implementations no way to 
> disable automatic fallback, this is the core reason for SSM to be highly inreliable, especially in IPTV contexts.
>
I think that’s a good summary of the current situation also describing the problems with e2e SSM deployments.
 
> Hence we should have the freedom to change this now to what would make IGMPv3 behave better, especially for SSM:
> 
> - Remove above text from rfc3376 and other text referring to older router queries (1673-1675).
> 
> - Replace with something like:
> 
>  This revision of IGMPv3 version 3 removes automatic fallback to IGMP version 2 and version 1
>  routers on the same network as specified in [RFC3376]. Instead,
>  such older version router behavior MUST be explicitly configured.
> 
> IGMPv3 routers MUST have a configuration option, disabled by default, to operate
> as an IGMPv2 router. When enabled, all procedures of [RFC2236] apply. Configuring this
> option is necessary in the presence of non-IGMPv3 capable IGMP snooping switches or
> PIM routers. These are rare but may still be depoyed.
>  
It might make sense to differentiate a bit between home networks and ISP networks. For
typical ISP/Provider equipment I agree (IGMPv3 support is widely available) but for home
network equipment I think the situation is different. Snooping is not always available and
in many cases it's (partly) implemented for IGMPv1/v2.
 
> When operating in IGMP version 3, routers MUST ignore version 1 and version 2 queries.
> In version 3, the presence of those older version queries constitutes a misconfiguration
>  or attack, and these messages SHOULD result in logging of an error (rate-limited).
> 
> - And in an appropriate part of the host behavior:
> 
> IGMP version 3 hosts MUST have a configuration option, disabled by default, to ignore
> IGMP version 1 and version 2 queries. This option SHOULD be auto-enabled when the host
> is running SSM receiver applications, and hence depends on IGMP version 3 to operate in the
> network.
> 
> This is about as much as i think we can do if we still want to go full standard with rfc3376bis.
> I can think of no operational deployment where the introduction of devices with existing older 
> RFC compatibility would cause interoperability issues. At worst the new router would need to 
> be explicitly configured for IGMPv2, which in my experience most routers deployed into IGMPv3 
> environments are done anyhow.
> 
> Comments welcome. Would love to see positive replies in which case i will be happy to  explicitly 
> sugest the text changes for this elephant issue to the draft.
> 
I am fine with the proposed way forward. I think every change which makes SSM e2e deployment
easier/possible is a step into the right direction.

Regards

Nic

On Wed, Dec 13, 2023 at 01:08:13PM -0800, Stig Venaas wrote:
> Hi again
> 
> Hoping we can get some more responses here.
> 
> I've reviewed it myself, but would be great to have more people 
> reviewing the updates.
> 
> WGLC ends in 2 days (the 15th).
> 
> Thanks,
> Stig
> 
> On Tue, Nov 28, 2023 at 2:59 PM Stig Venaas <stig@venaas.com> wrote:
> >
> > Dear working group
> >
> > We have been working on progressing these core documents to Internet Standard.
> >
> > The documents are
> >
> > IANA Considerations for Internet Group Management Protocols 
> > https://datatracker.ietf.org/doc/draft-ietf-pim-3228bis/
> >
> > Internet Group Management Protocol, Version 3 
> > https://datatracker.ietf.org/doc/draft-ietf-pim-3376bis/
> >
> > Multicast Listener Discovery Version 2 (MLDv2) for IPv6 
> > https://datatracker.ietf.org/doc/draft-ietf-pim-3810bis/
> >
> > As these are important documents, I am hoping we will get some 
> > people to review these drafts and give us feedback. We did not get 
> > any responses to the previous wglc for these documents.
> >
> > Please respond by December 15th 2023 whether you believe these 
> > documents are ready for publication, and any comments or concerns 
> > you may have. Any input is helpful.
> >
> > Regards,
> > Stig