Re: [savi] WGLC: draft-ietf-savi-dhcp-22

"Guang Yao" <yaoguang@cernet.edu.cn> Mon, 28 April 2014 14:18 UTC

Return-Path: <yaoguang@cernet.edu.cn>
X-Original-To: savi@ietfa.amsl.com
Delivered-To: savi@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66B281A6EE1 for <savi@ietfa.amsl.com>; Mon, 28 Apr 2014 07:18:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.551
X-Spam-Level:
X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O6cHGlKQxlqD for <savi@ietfa.amsl.com>; Mon, 28 Apr 2014 07:18:04 -0700 (PDT)
Received: from cernet.edu.cn (mail.cernet.edu.cn [202.112.39.2]) by ietfa.amsl.com (Postfix) with ESMTP id D42B51A6EFE for <savi@ietf.org>; Mon, 28 Apr 2014 07:18:03 -0700 (PDT)
Received: from AndrewYaoPC (unknown [59.66.252.55]) by centos (Coremail) with SMTP id AQAAf3BbRwcNY15TbkkFAA--.210S2; Mon, 28 Apr 2014 22:17:49 +0800 (CST)
From: Guang Yao <yaoguang@cernet.edu.cn>
To: "'Pascal Thubert (pthubert)'" <pthubert@cisco.com>, 'Ted Lemon' <mellon@fugue.com>
References: <CF7BFCD2.38EA7%elevyabe@cisco.com> <52D2BDC7-9E55-43BC-8248-23C43DCDEF96@fugue.com> <E045AECD98228444A58C61C200AE1BD842614572@xmb-rcd-x01.cisco.com> <E12CF964-53BC-4D05-8B03-3D5543BDC60A@fugue.com> <000c01cf62d1$21c68920$65539b60$@cernet.edu.cn> <E045AECD98228444A58C61C200AE1BD8426240F1@xmb-rcd-x01.cisco.com>
In-Reply-To: <E045AECD98228444A58C61C200AE1BD8426240F1@xmb-rcd-x01.cisco.com>
Date: Mon, 28 Apr 2014 22:17:50 +0800
Message-ID: <000001cf62ec$a3215bb0$e9641310$@cernet.edu.cn>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AQHz29Xah5gSK3gNlrPJIuMg2SittAGPDjalAZVDszYCKNAaUQK+oXfeAcU+i2maj5SpEA==
Content-Language: zh-cn
X-CM-TRANSID: AQAAf3BbRwcNY15TbkkFAA--.210S2
X-Coremail-Antispam: 1UD129KBjvJXoWxZw4xuryUtr13Zr43Zr1kXwb_yoWrKr1Upa yaqw1UCw1DGwn7J3yxXw4xWr4ruw4kGay3Cr95G3yUZwn8Xry0qr4xK345ZFWUWa93X3ya qFsF9r98Za90vaDanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUy0b7Iv0xC_Kw4lb4IE77IF4wAFF20E14v26r1j6r4UM7CY07I2 0VC2zVCF04k26cxKx2IYs7xG6rWj6s0DM7CIcVAFz4kK6r1j6r18M28lY4IEw2IIxxk0rw A2z4x0Y4vE2Ix0cI8IcVAFwI0_Jr0_JF4l84ACjcxK6xIIjxv20xvEc7CjxVAFwI0_Jr0_ Gr1l84ACjcxK6I8E87Iv67AKxVW8JVWxJwA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_Gr0_Gr 1UM2AIxVAIcxkEcVAq07x20xvEncxIr21l5I8CrVACY4xI64kE6c02F40Ex7xfMcIj6I8E 87Iv67AKxVWUJVW8JwAm72CE4IkC6x0Yz7v_Jr0_Gr1lF7xvr2IYc2Ij64vIr41lF7xvr2 IYc2Ij64vIr40E4x8a64kEw24lc2xSY4AK67AK6ry5MxAIw28IcxkI7VAKI48JMxCIbckI 1I0E14v26r1Y6r17MI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2IqxVCjr7xvwVAFwI0_JrI_Jr Wlx4CE17CEb7AF67AKxVWUAVWUtwCIc40Y0x0EwIxGrwCI42IY6xIIjxv20xvE14v26r1j 6r1xMIIF0xvE2Ix0cI8IcVCY1x0267AKxVWUJVW8JwCI42IY6xAIw20EY4v20xvaj40_WF yUJVCq3wCI42IY6I8E87Iv67AKxVWUJVW8JwCI42IY6I8E87Iv6xkF7I0E14v26r1j6r4U YxBIdaVFxhVjvjDU0xZFpf9x07boOJOUUUUU=
X-CM-SenderInfo: 51drw3xdqjquphuqv3oohg3hdfq/
Archived-At: http://mailarchive.ietf.org/arch/msg/savi/1UlIxK_7XcdLRYFXKK2AXbz9RH4
Cc: draft-ietf-savi-dhcp@tools.ietf.org, 'SAVI Mailing List' <savi@ietf.org>, 'Jean-Michel Combes' <jeanmichel.combes@gmail.com>
Subject: Re: [savi] WGLC: draft-ietf-savi-dhcp-22
X-BeenThere: savi@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Mailing list for the SAVI working group at IETF <savi.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/savi>, <mailto:savi-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/savi/>
List-Post: <mailto:savi@ietf.org>
List-Help: <mailto:savi-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/savi>, <mailto:savi-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Apr 2014 14:18:07 -0000

Hi, Pascal

Thank you very much for these comments!

"[PT] An observation that "sync state" is not the perfect wording since the best we can do is re-validate whether the server knows the address but not push a state.
I agree that in the context of DHCP only, snooping makes a lot more sense with LQ; in a general network, though, data snooping is valuable to - at least- discover that there is either a missing state or an usurpation. "

Guang:
I agree. But there should be some meaningful ways to recover the bindings. Or else, it is meaningless only discovering the trouble. 

"And from there take action which can be one of Query DHCP server, query other switches, create entry with a low trust level..."

Guang:
I can understand you are suggesting possible alternatives, but I'm not sure how "query other switches" works.
"create entry with a low trust level " is not in the scope of this WG.

As you noted, LQ is the most effective and direct way to recover the binding. If LQ is too heavy, maybe a lightweight LQ should be designed. Introducing other mechanisms will make this solution further complicated.

Best regards,
Guang

-----Original Message-----
From: Pascal Thubert (pthubert) [mailto:pthubert@cisco.com] 
Sent: Monday, April 28, 2014 9:18 PM
To: Guang Yao; 'Ted Lemon'
Cc: draft-ietf-savi-dhcp@tools.ietf.org; 'SAVI Mailing List'; 'Jean-Michel Combes'
Subject: RE: [savi] WGLC: draft-ietf-savi-dhcp-22



Cheers,

Pascal

> -----Original Message-----
> From: Guang Yao [mailto:yaoguang@cernet.edu.cn]
> Sent: lundi 28 avril 2014 13:01
> To: 'Ted Lemon'; Pascal Thubert (pthubert)
> Cc: draft-ietf-savi-dhcp@tools.ietf.org; 'SAVI Mailing List'; 
> 'Jean-Michel Combes'
> Subject: RE: [savi] WGLC: draft-ietf-savi-dhcp-22
> 
> Dear folks,
> 
> Thank you very much for all the comments. Because the topic forks into 
> multiple threads, I made a summary for the discussions, including our 
> revision decisions.
> 
> We are grateful to any advanced comments.  Thank you again.
> 
> Best regards,
> Guang Yao
> 
> 1. LQ problem
> 
> The original post from Eric:
> "1) There seem to be a requirement in several places of the document 
> (see
> below) to send LEASEQUERY to the DHCP server.  That is certainly 
> useful to do so, but switches are sometimes pure layer-2 switches, and 
> don't implement a DHCP stack not they have a layer-3 address to source 
> traffic from.
> Even when the switches have a layer-3 leg,  setting then to reach out 
> the DHCP server is not a trivial operation, and not one which is 
> typically done on
> layer-2 access switches.
> Whenever the LEASEQUERY is mandated,  I'd rather have it as a SHOULD, 
> with some alternate behavior (delete the entry for instance).
> "
> 
> The discussions:
> 
> Pascal: least there should be enough options to implement some user 
> policies. maybe we should be documenting the value / risk involved in 
> using LQ or not?
> 
> Eric: I am not sure how to read this ("MUST" followed but "if it 
> can't").  Isn't it contradictory? I thought "SHOULD" was exactly the way to say that.
> 
> Eric: In the data snooping process...If no conflict was detected, it 
> does the LQ I'll tend to argue that if LQ is required, the DETECTION 
> state is not necessary and should be removed. If LQ is optional, and 
> DETECTION failed to detect a conflict, then the entry should not move back right away to NO_BIND?
> 
> Ted: BTW, I agree with Eric that the MUST there should be a SHOULD...
> 
> Pascal: I'm not sure that this particular FSM is the only way to 
> implement the function and get all the necessary interoperation.
> 
> Ted: I think the added flexibility you are talking about might in theory be a
> good thing, but might in practice actually be a bad outcome.   In any case,
> it's certainly true that implementors can do this differently if they 
> like, as long as their implementation behaves in a way that 
> interoperate with implementations that follow the documented FSM.
> 
> [final decision]
>  (a) for the data snooping process, LQ is necessary, or else there is 
> no need to perform the data snooping process (there is no other way to 
> sync state with the DHCP server). Considering the whole data snooping 
> process is a conditional MUST, the LQ is actually a conditional MUST.

[PT] An observation that "sync state" is not the perfect wording since the best we can do is re-validate whether the server knows the address but not push a state.
I agree that in the context of DHCP only, snooping makes a lot more sense with LQ; in a general network, though, data snooping is valuable to - at least- discover that there is either a missing state or an usurpation. And from there take action which can be one of Query DHCP server, query other switches, create entry with a low trust level...

Cheers,

Pascal