Re: [Softwires] WG LC softwire-lb
Carlos Pignataro <cpignata@cisco.com> Mon, 04 May 2009 13:48 UTC
Return-Path: <cpignata@cisco.com>
X-Original-To: softwires@core3.amsl.com
Delivered-To: softwires@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0C4FF3A704D for <softwires@core3.amsl.com>; Mon, 4 May 2009 06:48:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.25
X-Spam-Level:
X-Spam-Status: No, score=-6.25 tagged_above=-999 required=5 tests=[AWL=-0.251, BAYES_00=-2.599, J_CHICKENPOX_13=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BMyUlju4ONV6 for <softwires@core3.amsl.com>; Mon, 4 May 2009 06:48:02 -0700 (PDT)
Received: from av-tac-rtp.cisco.com (hen.cisco.com [64.102.19.198]) by core3.amsl.com (Postfix) with ESMTP id 98B0C28C175 for <softwires@ietf.org>; Mon, 4 May 2009 06:47:05 -0700 (PDT)
X-TACSUNS: Virus Scanned
Received: from rooster.cisco.com (localhost.cisco.com [127.0.0.1]) by av-tac-rtp.cisco.com (8.13.8+Sun/8.13.8) with ESMTP id n44DmUhD009545; Mon, 4 May 2009 09:48:30 -0400 (EDT)
Received: from [10.116.85.231] (rtp-cpignata-8716.cisco.com [10.116.85.231]) by rooster.cisco.com (8.13.8+Sun/8.13.8) with ESMTP id n44DmTeX014129; Mon, 4 May 2009 09:48:29 -0400 (EDT)
Message-ID: <49FEF22D.4070503@cisco.com>
Date: Mon, 04 May 2009 09:48:29 -0400
From: Carlos Pignataro <cpignata@cisco.com>
Organization: cisco Systems, Inc.
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.21) Gecko/20090302 Thunderbird/2.0.0.21 Mnenhy/0.7.6.0
MIME-Version: 1.0
To: robert@raszuk.net
References: <5EE53708-2D8B-4DFB-8365-27041AACB0BE@cisco.com> <49F178ED.2080905@raszuk.net> <49F870F8.9070301@cisco.com> <49F89F15.2000801@raszuk.net>
In-Reply-To: <49F89F15.2000801@raszuk.net>
X-Enigmail-Version: 0.95.7
X-Face: *3w8NvnQ|kS~V{&{U}$?G9U9EJQ8p9)O[1[1F'1i>XIc$5FR!hdAIf5}'Xu-3`^Z']h0J* ccB'fl/XJYR[+, Z+jj`4%06nd'y9[ln&ScJT5S+O18e^
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: softwires@ietf.org
Subject: Re: [Softwires] WG LC softwire-lb
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/softwires>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 May 2009 13:48:04 -0000
Hi Robert, Thanks for the follow-up, please see inline. On 4/29/2009 2:40 PM, Robert Raszuk wrote: > <trimming a bit the spam list :)> > > Hi Carlos, > > Perhaps I was not very clear in the question. I understand that you are > adding the ability for ingress where for L2TPv3 over IP - Session ID & > for GRE - GRE key are distributed per egress as per RFC5512. > > This is great ! > > But what I was mainly asking about was the case where egress does not > signal GRE key. Per 5512 is seems very well allowed as key is optional: > > "Note that the key is optional. Unless a key value is being > advertised, the GRE encapsulation sub-TLV MUST NOT be present." Thanks for the clarification; doesn't this para from RFC5512 mean that the receiver (i.e., advertising router) is not expecting a key? That's my understanding: The key is optional to be used, but if not signaled is not used, and can mis-mux if used. From the first sentence in the previous para (quoted below), I think it can be inferred that the advertising router, by not signaling a key, is telling the encapsulating end to not use one (rather than to use any): * GRE Key: 4-octet field [RFC2890] that is generated by the advertising router. ... Note that the key is optional. Unless a key value is being advertised, the GRE encapsulation sub-TLV MUST NOT be present. > > Then if one would read carefully your draft is says there: > > "Needless to say, if an egress router does not support load balancing > block sub-TLV, the Softwire continues to operate with a single load > balancing field that all ingress routers encapsulate with." > > But since the whole purpose is to provide some additional field in the > IP encapsulation header other then play with src address for core > routers doing ECMP shouldn't we mention some text allowing for local > ingress PE injection of random keys when such a keys are not required by > application using 5512 for it's mesh tunnel setup ? That's the whole purpose, as long as the egress can understand it. Such policy seems too liberal on sending, considering that the same result is achieved when the advertising router includes a lb-block TLV with appropriate mask (i.e., an 0/0). Perhaps, do you think we should add some text to tighten that case, and saying that for the specific case where GRE is used without Key and without LB-block, the sender is explicitly expected direct to not use LB Keys (since the receiver can otherwise mis-demux/drop)? Potentially, the last sentence of the following para from softwire-lb: The sub-TLV type of the Load Balancing Block sub-TLV is 5. The sub- TLV length is 2 octets. The value represents the length of the block in bits and it MUST NOT exceed the size of the load balancing field. seems to implicitly cover that the lb-block sub-TLV cannot be used without the Encapsulation Sub-TLV (and corresponding Key), do you think that needs tightening? We can explicitly say in Section 2.1 that is not only applicable to tunnels that define the field, but also can only be used when that field is signaled? > > As to my second question I agree. In fact your proposal allows for sort > of overloading the GRE key semantics to serve both for given application > as well as for core load-balancing. > Ack. Thanks again for the comments. -- Carlos. > Many thx, > R. > > >> Hi Robert, >> >> Thank you for your comments, please see inline. >> >> On 4/24/2009 4:31 AM, Robert Raszuk wrote: >>> Hi David, >>> >>> Perhaps I may have missed the discussion on this in the other WGs but I >>> have two comments/questions ... >>> >>> * Why the decision on enhancing the load balancing capability of IP >>> encapsulated packet has to be signaled as opposed to be a local matter >>> of the ingress router performing encapsulation ? >> This is because the load-balancing field is signaled (see RFC5512), so >> using for lb it needs signaling of a block to avoid collisions. Note >> also the context from the title, lb for Mesh Softwires. For the L2TPv3 >> case, and from <http://tools.ietf.org/html/rfc5512#section-4.1>, the >> only encapsulating header field that is always there is the Session ID >> (Cookie is optional), which is signaled; the case for GRE is equivalent, >> but also please see below. If it's only a local matter, the >> encapsulating header's fields could not be used and you would be limited >> to playing with e.g., the source IP address. >> >>> * Reg use of GRE key for the purpose of load balancing I must say that >>> GRE key has already been proposed in number of solutions today. Therefor >>> overloading more on it may be impractical. Did authors analyzed use of >>> Sequence Numbers in GRE header instead for the purpose of increasing >>> effectiveness of load-balancing by the transit nodes ? >> Yes, it was considered, but we need a field that can be used for flow >> identification. From RFC2890, the seq # MUST be used by the receiver to >> establish packet transmission order, so it's incompatible with a >> per-flow use. The GRE Key's semantics from RFC2890 match this use, >> <http://tools.ietf.org/html/rfc2890#section-2.1>: >> >> The Key field contains a four octet number which was inserted by the >> encapsulator. The actual method by which this Key is obtained is >> beyond the scope of the document. The Key field is intended to be >> used for identifying an individual traffic flow within a tunnel. >> >> Thanks, >> >> -- Carlos. >> >> >> >>> Cheers, >>> R. >>> >>> >>>> All - >>>> Following the last IETF meeting all comments have been addressed in: >>>> >>>> http://tools.ietf.org/html/draft-ietf-softwire-lb-02 >>>> >>>> The authors have requested a WG LC and I have added L3VPN and PWE3 that >>>> may be interested and have comments on the technology. Please send back >>>> all comments by May 7, 2009. >>>> >>>> Thanks >>>> >>>> DWard, Alain >>> _______________________________________________ >>> Softwires mailing list >>> Softwires@ietf.org >>> https://www.ietf.org/mailman/listinfo/softwires >>> >> > > _______________________________________________ > Softwires mailing list > Softwires@ietf.org > https://www.ietf.org/mailman/listinfo/softwires >
- [Softwires] WG LC softwire-lb David Ward
- Re: [Softwires] WG LC softwire-lb Robert Raszuk
- Re: [Softwires] WG LC softwire-lb Carlos Pignataro
- Re: [Softwires] WG LC softwire-lb Robert Raszuk
- Re: [Softwires] WG LC softwire-lb Carlos Pignataro