[Roll] p2p RPL connections and ACP/RFC8994

Michael Richardson <mcr+ietf@sandelman.ca> Thu, 03 February 2022 18:18 UTC

Return-Path: <mcr@sandelman.ca>
X-Original-To: roll@ietfa.amsl.com
Delivered-To: roll@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 885433A1399; Thu, 3 Feb 2022 10:18:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nmcgLqE4zPyL; Thu, 3 Feb 2022 10:18:55 -0800 (PST)
Received: from relay.sandelman.ca (relay.cooperix.net [IPv6:2a01:7e00:e000:2bb::1]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5CB03A1390; Thu, 3 Feb 2022 10:18:53 -0800 (PST)
Received: from dooku.sandelman.ca (cpef81d0f835a73-cmf81d0f835a70.sdns.net.rogers.com [174.115.215.42]) by relay.sandelman.ca (Postfix) with ESMTPS id 0E2DC1F44B; Thu, 3 Feb 2022 18:18:51 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id ECC411A0406; Thu, 3 Feb 2022 13:18:48 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: anima@ietf.org
cc: roll@ietf.org
X-Attribution: mcr
X-Mailer: MH-E 8.6+git; nmh 1.7.1; GNU Emacs 26.3
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Date: Thu, 03 Feb 2022 13:18:48 -0500
Message-ID: <225387.1643912328@dooku>
Archived-At: <https://mailarchive.ietf.org/arch/msg/roll/OFQJOdjEA-Mv0tw-R21DwOjKbxo>
Subject: [Roll] p2p RPL connections and ACP/RFC8994
X-BeenThere: roll@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Routing Over Low power and Lossy networks <roll.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/roll>, <mailto:roll-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/roll/>
List-Post: <mailto:roll@ietf.org>
List-Help: <mailto:roll-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/roll>, <mailto:roll-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Feb 2022 18:19:00 -0000

Today I am reloading some switches with a new TCAM partitioning.
It turned out that some new (to us) equipment had zero space allocated for
IPv6 multicast groups, which was really causing us a lot of mysterious stuff
where ND just wouldn't work.
("show sdm prefer" if someone is finding this email later on...)

For one switch, we had an out-of-band access to get to the console/craft so I
could do this remotely.  For a second switch, it turned out that I had no way
to get to the console server that didn't go through that switch.
(There was a goal of having a separate mgmt network, but it was hard to
convince STP that loops weren't involved.  My STP-fu is low)

So of course, I look forward to using ACP/RFC8994 for this.
While RPL ought to be able to route around a failing/restarting switch, and
in theory, if the switch knows it is going down, it can do appropriate DAO
messages to remove itself from the DODAG.

But, I'd want to make sure that I wasn't going through the switch before
starting the maintenance.  Some kind of "protect" marking.

It occured to me that p2p-rpl could perhaps do this if it could express the
right metric being "does not traverse device X".
Or now we think we can replace this with aodv-rpl.

I'm wondering if anyone has any thoughts on about to express this metric?
Is a metric the right thing to do?  I doubt that this has utility in sensor
LLNs, but I think that RFC8994 ACPs would definitely like to have this.


--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-