Re: [Softwires] Review of draft-ietf-softwire-mesh-multicast-20

" Mingwei Xu " <xmw@cernet.edu.cn> Thu, 17 May 2018 01:11 UTC

Return-Path: <xmw@cernet.edu.cn>
X-Original-To: softwires@ietfa.amsl.com
Delivered-To: softwires@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4F9D12DB6C; Wed, 16 May 2018 18:11:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.133
X-Spam-Level: ***
X-Spam-Status: No, score=3.133 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FROM_EXCESS_BASE64=0.979, HTML_MESSAGE=0.001, RCVD_IN_BL_SPAMCOP_NET=1.347, RCVD_IN_MSPIKE_BL=0.01, RCVD_IN_MSPIKE_L5=2.696] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X5sAcWWBZaeQ; Wed, 16 May 2018 18:11:18 -0700 (PDT)
Received: from tsinghua.edu.cn (smtp15.tsinghua.edu.cn [101.6.4.39]) by ietfa.amsl.com (Postfix) with ESMTP id 43623126DD9; Wed, 16 May 2018 18:11:16 -0700 (PDT)
Received: from win7-PC (unknown [166.111.68.231]) by app-4 (Coremail) with SMTP id EgQGZQAnrDmu1vxaNO86AA--.8968S2; Thu, 17 May 2018 09:11:13 +0800 (CST)
Date: Thu, 17 May 2018 09:11:13 +0800
From: Mingwei Xu <xmw@cernet.edu.cn>
Reply-To: xmw@cernet.edu.cn
To: ianfarrer <ianfarrer@gmx.com>, draft-ietf-softwire-mesh-multicast <draft-ietf-softwire-mesh-multicast@ietf.org>
Cc: Softwires-wg list <softwires@ietf.org>
Message-ID: <201805170911044534158@cernet.edu.cn>
X-mailer: Foxmail 6, 15, 201, 26 [cn]
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="=====003_Dragon840221344638_====="
X-CM-TRANSID: EgQGZQAnrDmu1vxaNO86AA--.8968S2
X-Coremail-Antispam: 1UD129KBjvJXoWxtFykAw4UXr4fKF45tFyftFb_yoW7tryrpr 4fKF13JF4kJr1Fvr4UJr4UWry8Wrs5Ja1DtFy7try8Za15AF4rJw1UtryrtrWDGrWkXr1Y yFyUAw1DJrn8AaDanT9S1TB71UUUUU7qnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUUk2b7Iv0xC_Kw4lb4IE77IF4wAFF20E14v26r1j6r4UM7CY07I2 0VC2zVCF04k26cxKx2IYs7xG6rWj6s0DM7CIcVAFz4kK6r1j6r18M28lY4IEw2IIxxk0rw A2F7IY1VAKz4vEj48ve4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_Jr0_JF4l84ACjcxK6xII jxv20xvEc7CjxVAFwI0_Gr0_Cr1l84ACjcxK6I8E87Iv67AKxVW8JVWxJwA2z4x0Y4vEx4 A2jsIEc7CjxVAFwI0_Gr1j6F4UJwAS0I0E0xvYzxvE52x082IY62kv0487Mc02F40E42I2 6xC2a48xMcIj6xIIjxv20xvE14v26r1j6r18McIj6I8E87Iv67AKxVWUJVW8JwAm72CE4I kC6x0Yz7v_Jr0_Gr1lF7xvr2IYc2Ij64vIr41lFcxC0VAYjxAxZF0Ew4CEw7xC0wCF04k2 0xvY0x0EwIxGrwCFx2IqxVCFs4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r106r1rMI 8I3I0E7480Y4vE14v26r106r1rMI8E67AF67kF1VAFwI0_Jrv_JF1lIxkGc2Ij64vIr41l IxAIcVC0I7IYx2IY67AKxVWUJVWUCwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Jr0_Gr1lIx AIcVCF04k26cxKx2IYs7xG6rW3Jr0E3s1lIxAIcVC2z280aVAFwI0_Jr0_Gr1lIxAIcVC2 z280aVCY1x0267AKxVWUJVW8JbIYCTnIWIevJa73UjIFyTuYvjxUqMKuUUUUU
X-CM-SenderInfo: x0pzquphuqv3oohg3hdfq/
Archived-At: <https://mailarchive.ietf.org/arch/msg/softwires/L5kSJ5hbitgBIs4eyK-4M2itSas>
Subject: Re: [Softwires] Review of draft-ietf-softwire-mesh-multicast-20
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/softwires/>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 May 2018 01:11:22 -0000

Hi, Ian,

Thank you very much for your comments. We will do our best to revise the draft.

Mingwei


2018-05-17 



Mingwei Xu 



发件人: ianfarrer 
发送时间: 2018-05-16  19:41:40 
收件人: draft-ietf-softwire-mesh-multicast 
抄送: Softwires-wg list 
主题: [Softwires] Review of draft-ietf-softwire-mesh-multicast-20 
Hi,


I’ve just done a final review of -v20 of the draft. There’s still a few linguistic points and some clean ups that I think are needed. 


There’s also a couple of comments regarding points I would expect to get raised in later review phases, so it would be good if we could resolve these in advance.


Please see below.


Thanks,
Ian






Section 1.1
The paragraph beginning ‘Figure 1 shows…’ through to the end of the section shouldn’t be located under Requirements Language. Please move to Section 1.


Figure 1
Please use this cleaned up version of the diagram:




                +---------+        +---------+
                |         |        |         |  +--------+
                |  E-IP   |        |  E-IP   +—-+Source S|
                | Network |        | Network |  +--------+
                +----+----+        +——+------+
                     |                |
                  +--+-------+  +-----+----+
                  |          |  | Upstream |
                +-|   AFBR   +--+   AFBR   |-+
                | +----------+  +----------+ |
                |                            |  E-IP Multicast
                |      I-IP transit core     |  packets are forwarded
                |                            |  across the I-IP
                | +----------+  +----------+ |  transit core
                +-+Downstream+--+Downstream+-+
                  |   AFBR   |  |   AFBR   |
                  +--+-------+  +-------+--+
                     |                  |
                +----+----+        +----+----+
    +--------+  |         |        |         |  +--------+
    |Receiver+--+  E-IP   |        |  E-IP   +--+Receiver|
    +--------+  | Network |        | Network |  +--------+
                +---------+        +---------+



Figure 2.
Please use this cleaned up version of the diagram:
                +---------+        +---------+
                |  IPv4   |        |  IPv4   |  +--------+
                | Client  |        | Client  |--+Source S|
                | Network |        | Network |  +--------+
                +----+----+        +----+----+
                     |                  |
                  +--+-------+  +-------+--+
                  |          |  | Upstream |
                +-+   AFBR   +--+   AFBR   |-+
                | +----------+  +----------+ |
                |                            |
                |      IPv6 transit core     |
                |                            |
                | +----------+  +----------+ |
                +-+Downstream+--+Downstream+-+
                  |   AFBR   |  |   AFBR   |
                  +--+-------+  +-------+--+
                     |                  |
                +----+----+        +----+----+
    +--------+  |  IPv4   |        |  IPv4   |  +--------+
    |Receiver+--+ Client  |        | Client  +--+Receiver|
    +--------+  | Network |        | Network |  +--------+
                +---------+        +---------+

4.1.  Mechanism Overview
s/and is certainly separated from E-IP multicast state./and is separated from E-IP multicast state./
The word ‘certainly’ doesn’t really make sense here.

4.3. Source Address Mapping
Suggested reword for readability and to fix ‘WildCare’ spelling: 
o E-IP network supports ASM
      The (S,G) source list entry and the (*,G) source list entry differ
      only in that the latter has both the WildCard (WC) and RPT bits
      of the Encoded-Source-Address set, while with the former, the bits
      are cleared (See Section 4.9.5.1 of [RFC7761]).  As a result, the
      source list entries in (*,G) messages can be translated into source list
      entries in (S',G') messages by clearing both the WC and RPT bits
      at downstream AFBRs, and vice-versa for the reverse translation at
      upstream AFBRs.
——

I-D Nits is complaining about the group address word spacing in the figure.
Please use the following for figure 3:
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
     | 0-------------32--40--48--56--64--72--80--88--96-----------127|
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
     |                    mPrefix46                  | group address |
     +---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
---
4.4 Routing Mechanism
The following sentence is a a little unclear:
Since every IP address of upstream AFBR's E-IP interface is different from each other, every uPrefix46 that AFBR announces MUST be different.
Can it be simplified just to say?:
Every uPrefix46 that an AFBR announces MUST be unique.
----
Suggest that a paragraph break is inserted between ‘mesh unicast scenario.’ and ‘But as the “v4” field’ and that the word ‘But’ is removed.
——
s/BGP messages that are carried over I-IP, whose NLRI and NH are of E-IP address family./BGP messages that are carried over the I-IP, and whose NLRI and NH are of the E-IP address family./
—
5.2. I-IP (S’,G’) State Maintenance
s/It is possible that the I-IP transit core runs another non-transit I-IP PIM-SSM instance./It is possible that the I-IP transit core runs another, non-transit, I-IP PIM-SSM instance./
——


s/SHOULD NOT be used by other service provider/SHOULD NOT be used by another service provider/


A question that is bound to come up during the IESG review process - If this 
is a SHOULD NOT, what are the exceptions from a MUST NOT? i.e. under what
circumstances can two service providers use the same Well-Known prefix?


——
s/and the AFBR MUST translate this message back to PIMv4 message and process it./
and the AFBR MUST translate this message back to a PIMv4 message and process it./


Does this need to be a MUST requirement? Can’t the RFC2119 language be dropped here and just have ‘the AFBR translates this message back…’?


—
5.4. Inter-AFBR Signalling


s/Assume that one downstream AFBR has joined a RPT of (*,G) and a SPT of (S,G)/Assume that one downstream AFBR has joined an RPT of (*,G) and an SPT
   of (S,G)/


—


9. Security Considerations


Suggest that this is reformatted and worded as follows:


   The security concerns raised in [RFC4925] and [RFC7761] are
   applicable here.
   
   The additional workload associated with some schemes could be
   exploited by an attacker to perform a DDoS attack.
   
   Compared with [RFC4925], the security concerns SHOULD
   be considered more carefully: an attacker could potentially set up
   many multicast trees in the edge networks, causing too many multicast
   states in the core network.




Can any mitigation be offered against these attacks (would a BGP policy to only accept Well-Known prefix advertisements from trusted peers help?)