Re: [Softwires] Genart last call review of draft-ietf-softwire-mesh-multicast-22

Brian E Carpenter <brian.e.carpenter@gmail.com> Sun, 16 September 2018 22:59 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: softwires@ietfa.amsl.com
Delivered-To: softwires@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA08B130DF2; Sun, 16 Sep 2018 15:59:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xfKd3aNYcEVq; Sun, 16 Sep 2018 15:59:39 -0700 (PDT)
Received: from mail-pl1-x641.google.com (mail-pl1-x641.google.com [IPv6:2607:f8b0:4864:20::641]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B512126BED; Sun, 16 Sep 2018 15:59:39 -0700 (PDT)
Received: by mail-pl1-x641.google.com with SMTP id j8-v6so6489209pll.12; Sun, 16 Sep 2018 15:59:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=vJ9V1sfHnQkg/GSBqREfrhdmrbYg+lSJosEU3XrQLf4=; b=PmiGbHgIigBlN0NiaZBImSudSvEo9ZakF3Qp27tESAc1g69kYD/3iFAFeDox4cSW4w QUNZtqvyrtjGcoNmQZ7X8RPej7FEmOd+cSs6X6CVBD8BClVhhLFa71ZOwLQaz7cLNb20 euE4aUZAu3fYjfKy81y3Zwr1DA14fGnLhU7bzet5XhxD4oaPqpty/DJQJTv4KureXVuR WD0UCU7zjs/27BU64aHggbigJkrtMK0ElieZHpe1vQBxjct9bDKcseFxNyeQWVCBmSBe 56C0msJFizFsJ6kO37daAFGEmX/8woGmsZKZKxl73rHfD5Idd6v/S44WXkJCUoHKEvBS dQVQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=vJ9V1sfHnQkg/GSBqREfrhdmrbYg+lSJosEU3XrQLf4=; b=aX0Zaeq3Z7k3GPfwfs1smgkdZttJbNJcUEnrEEsSkmfzUjVU/8gofe1hKKX+leRYTo nNqY7zlawRBwNEzqykardRvdLfNa79MbIYH+SfHzyaKR2UIkV7bKbgPtzivcsm7hYEGd jQRoL9bpTcMzMD8tAFls/875O8rn8xkO6UV64f91Fxa9+pkUPYA2BirLTSo1hRHBLXqs JPB0z1R8i1F+7aggW055aoEpLL2e751PDpKpLoMwllMtWJxx9otTuTwj7ejb3xHNOpgk daofD5briYtxWbTUk1mBaIH6mSytjBI4HUTKLprvsWRfk10kMjNhvlFZXqlci1INd9ru hi6A==
X-Gm-Message-State: APzg51Df6upX5Ch4Egy9ttsJ9hJKDI7Y42G/GOlzkXM1wyGSjYHMdvSG xtEtwRzQU5NvhJH4+1O3DZawrUfV
X-Google-Smtp-Source: ANB0VdY8aWH2rnTG5/idwHYKZWjtRlAtH3z/biXPeSLm535HJPSsL/UDFVLotgikSwHnFKeHZJ40/A==
X-Received: by 2002:a17:902:5381:: with SMTP id c1-v6mr22342697pli.296.1537138778655; Sun, 16 Sep 2018 15:59:38 -0700 (PDT)
Received: from [192.168.178.30] ([118.148.76.40]) by smtp.gmail.com with ESMTPSA id i7-v6sm14660033pgs.17.2018.09.16.15.59.35 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 16 Sep 2018 15:59:37 -0700 (PDT)
To: Joe Touch <touch@strayalpha.com>
Cc: 杨术 <yangshu@oudmon.com>, gen-art <gen-art@ietf.org>, softwires <softwires@ietf.org>, "draft-ietf-softwire-mesh-multicast.all" <draft-ietf-softwire-mesh-multicast.all@ietf.org>
References: <153532652678.11793.13628771343783380767@ietfa.amsl.com> <tencent_4B74746E333CB9DE0327BF0B@qq.com> <4b72b927-0e46-f471-a252-b447d2db0d78@gmail.com> <934AFCAD-C015-4FF7-A229-1867880DD922@strayalpha.com> <c6c4bcf3-1164-9296-98ff-386f850b5b76@gmail.com> <045AAF76-DB2D-4AC7-8A00-03811401A114@strayalpha.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <dce53819-032a-a3bd-6c9f-9262ad550e8a@gmail.com>
Date: Mon, 17 Sep 2018 10:59:31 +1200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1
MIME-Version: 1.0
In-Reply-To: <045AAF76-DB2D-4AC7-8A00-03811401A114@strayalpha.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/softwires/aOQjsKfOoS9fuVn_QVWaIOZ5r2s>
Subject: Re: [Softwires] Genart last call review of draft-ietf-softwire-mesh-multicast-22
X-BeenThere: softwires@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: softwires wg discussion list <softwires.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/softwires>, <mailto:softwires-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/softwires/>
List-Post: <mailto:softwires@ietf.org>
List-Help: <mailto:softwires-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/softwires>, <mailto:softwires-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Sep 2018 22:59:42 -0000

On 2018-09-17 10:28, Joe Touch wrote:
> Hi, Brian,
> 
>> On Sep 16, 2018, at 1:44 PM, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
>>
>> Hi Joe,
>> On 2018-09-17 05:15, Joe Touch wrote:
>>> Hi, Brian,
>>>
>>> See comments below…
>>>
>>> Joe
>>>
>>>> On Sep 15, 2018, at 3:32 PM, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
>>>>
>>>> Dear 杨术,
>>>>
>>>> I have added Joe Touch in Cc because one point below overlaps
>>>> with his TSVART review.
>>>> On 2018-09-16 06:41, 杨术 wrote:
>>>>> Dear Brian,
>>>>>
>>>>> Thank you very much for your comments, the following is the response,  
>>>>>
>>>>>> “One of the authors (Shu Yang) stated that the Bitway company (a networking 
>>>>>> device company in China) have implemented a prototype."
>>>>>> Note that the -00 draft was published in 2011. Not exactly fast progress
>>>>>> in the market.
>>>>>
>>>>> We have made more progress in these years, Bitway has already implemented  
>>>>> it and deployed it in about 100 universities in CERNET2.
>>>>
>>>> That's good to know. (I like the concept of an Implementation Status
>>>> section as described in RFC7942, and I wish that all WGs would use this.)
>>>>
>>>> Now back to the fragmentation issue. Thank you for the new text:
>>>>
>>>> 7.3.  Fragmentation
>>>>
>>>>  The encapsulation performed by an upstream AFBR will increase the
>>>>  size of packets.  As a result, the outgoing I-IP link MTU may not
>>>>  accommodate the larger packet size.  It is not always possible for
>>>>  core operators to increase the MTU of every link, thus fragmentation
>>>>  after encapsulation and reassembling of encapsulated packets MUST be
>>>>  supported by AFBRs [RFC5565].  The specific requirements for
>>>>  fragmentation and tunnel configuration COULD be referred to in
>>>>  [I-D.ietf-intarea-tunnels], which is under revision currently.
>>>>
>>>> One of my problems remains, and is not answered by draft-ietf-intarea-tunnels:
>>>>
>>>>>> But more seriously, if I-IP is IPv6, how does the originator of the IPv6
>>>>>> packet (the AFBR) know that it needs to include a fragment header?
>>>>>> Is there some kind of hidden PMTUD process, or is this configured?
>>>>>
>>>>>> (I assume we are not so interested in the case that I-IP is IPv4, but
>>>>>> then the issue is that the AFBR MUST NOT set the DF bit.)
>>>>
>>>> draft-ietf-intarea-tunnels does cover the setting of DF, but it still
>>>> doesn't state how the tunnel end point knows when to include an IPv6
>>>> fragment header, unless I missed something.
>>>
>>> If IPv6 fragmentation is needed, then the frag header is included. Otherwise, it is not. As per the standard. 
>>
>> Yes, but my question is: How does the AFBR (the IPv6 source node) *know*
>> that fragmentation is needed?
> 
> Path MTU discovery for the tunnel - at worst, based on the tunnel interface MTU. This is discussed in Section 4.2.3 of the draft-ietf-intarea-tunnels.
> 
>> This question doesn't arise for IPv4;
>> if you don't set DF, you don't need to worry about PMTU size.
> 
> For IPv4 as an outer header, yes - but see RFC 6864. Clearing DF means the tunnel ingress MUST generate new packets at a rate where it can ensure the IP IDs don’t cycle where fragments overlap (which is also already discussed in the section indicated above.
> 
>>
>>> There’s no “DF” in IPv6 because on-path fragmentation isn’t possible.
>>
>> Exactly, so the absence of a fragment header forbids it.
> 
> No, IPv6 forbids on-path fragmentation of an existing header only. The IPv6 tunnel encapsulation header isn’t on-path per se; it’s completely valid to encapsulate a received IPv6 packet inside an IPv6 tunnel that fragments *at the outer layer* (i.e., reassembling at the tunnel egress). 
> 
>> So should
>> the AFBR include a frag header just in case?
> 
> That won’t help. The frag header would be generated at the tunnel ingress and has to be unique there (which has no relation to a frag header of the inner packet, if one is present).

Yes to the above, but as I understand the draft, the AFBR *is* the tunnel ingress, otherwise I wouldn't have an issue.
 
>> Should this be
>> configurable? Should it use some form of PMTUD? Or do we require
>> the actual PMTU to be big enough?
> 
> See the section above; you either need to discover it dynamically or deploy the system so it’s not an issue.
> 
>> I see this as a gap in the specification.
> 
> I don’t think it’s unique to this particular tunnel approach, though.

No, it isn't, but as far as I can see, any tunnel spec needs to state how this applies. If the tunnel keeps no packet state, how is it going to perform PMTUD? If the answer is that the tunnel end points need to be configured in some way, that needs to be stated too.

Sorry to go on, but when I review a draft, I like to feel that if I had to, I could code it, and in this case I just don't know how I would code the AFBR with respect to PMTUD and/or including a fragment header.

   Brian

> 
> Joe
> 
>> Question to the authors: what does the Bitway implementation do?
>> Does it include a fragment header, or is the MTU simply configured
>> to be big enough?
>>
>>   Brian
>>
>>>
>>>> I'm not sure whether this
>>>> needs discussion in the present draft or in Joe's draft, which is why
>>>> I added the Cc.
>>>>
>>>> Also I feel that the reference to draft-ietf-intarea-tunnels
>>>> should be normative, because I think an implementor needs to get
>>>> this right.
>>>
>>> Draft-ietf-intarea-tunnels is currently slated for BCP, not standards-track. I don’t recall if that matters for standards-track docs or whether it’s considered a down-ref.
>>>
>>> Joe
> 
>