Re: [ssm] another last call for draft-ietf-ssm-arch - ending 3/24
Brian Haberman <bkhabs@nc.rr.com> Mon, 10 March 2003 13:31 UTC
Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA15803 for <ssm-archive@odin.ietf.org>; Mon, 10 Mar 2003 08:31:20 -0500 (EST)
Received: (from mailnull@localhost) by www1.ietf.org (8.11.6/8.11.6) id h2ADiI411413 for ssm-archive@odin.ietf.org; Mon, 10 Mar 2003 08:44:18 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h2ADiIO11410 for <ssm-web-archive@optimus.ietf.org>; Mon, 10 Mar 2003 08:44:18 -0500
Received: from www1.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA15681 for <ssm-web-archive@ietf.org>; Mon, 10 Mar 2003 08:30:48 -0500 (EST)
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h2ADhYO11358; Mon, 10 Mar 2003 08:43:34 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h2ADgSO11268 for <ssm@optimus.ietf.org>; Mon, 10 Mar 2003 08:42:28 -0500
Received: from ms-smtp-02.southeast.rr.com (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA15207 for <ssm@ietf.org>; Mon, 10 Mar 2003 08:28:58 -0500 (EST)
Received: from mail3.nc.rr.com (fe3 [24.93.67.50]) by ms-smtp-02.southeast.rr.com (8.12.5/8.12.2) with ESMTP id h2ADST1I016859; Mon, 10 Mar 2003 08:29:24 -0500 (EST)
Received: from nc.rr.com ([63.109.132.2]) by mail3.nc.rr.com with Microsoft SMTPSVC(5.5.1877.757.75); Mon, 10 Mar 2003 07:59:44 -0500
Message-ID: <3E6C8CBD.1090508@nc.rr.com>
Date: Mon, 10 Mar 2003 08:01:49 -0500
From: Brian Haberman <bkhabs@nc.rr.com>
Organization: No Organization Here
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.2.1) Gecko/20021130
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Pekka Savola <pekkas@netcore.fi>
CC: Hugh Holbrook <holbrook@cisco.com>, ssm@ietf.org
Subject: Re: [ssm] another last call for draft-ietf-ssm-arch - ending 3/24
References: <Pine.LNX.4.44.0303100839190.23700-100000@netcore.fi>
In-Reply-To: <Pine.LNX.4.44.0303100839190.23700-100000@netcore.fi>
Content-Type: text/plain; charset="us-ascii"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Transfer-Encoding: 7bit
Sender: ssm-admin@ietf.org
Errors-To: ssm-admin@ietf.org
X-BeenThere: ssm@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ssm>, <mailto:ssm-request@ietf.org?subject=unsubscribe>
List-Id: Source-Specific Multicast <ssm.ietf.org>
List-Post: <mailto:ssm@ietf.org>
List-Help: <mailto:ssm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ssm>, <mailto:ssm-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Transfer-Encoding: 7bit
Pekka Savola wrote: > On Sun, 9 Mar 2003, Brian Haberman wrote: > >>> The scope of the unicast-prefix based multicast address MUST NOT >>> exceed the scope of the unicast prefix embedded in the multicast >>> address. >>> >>>note: "embedded in the multicast address". But as you should note here, >>>an address (particularly _SSM_, which is really not derived from the >>>unicast prefix) does not. >> >>The intent was that the scope of the SSM group address would >>not exceed the scope of the SSM source address. The scoped addr >>arch forwarding rules *WILL* prevent a scoped address from leaking >>out of the administrative zone. >> >>The overall issue though is not SSM-specific. > > > Yes and no: in ASM, the DR only checks that G is ok; not it must check > that both S and G are ok. > Actually, the DR has to check both S and G to ensure that it does not send a PIM Join across a scope zone boundary regardless of it being ASM or SSM. There was some text in the original PIM for v6 draft a long time ago. > >>That is, the >>scoped addr arch is responsible for determining the forwarding >>issues around scoped addresses. I don't see a need for putting >>any type of scoped address issues in the SSM doc. > > ... > >>As stated above, I don't see a reason to deal with scoped addresses >>in the SSM arch doc. > > > I understand this argument and I agree with it, mostly: at this point, we > may end up doing some nasty things (in ipv6 w.g.) with scoped address > architecture anyway, so trying to specify everything in detail in the > specs before we know we have to do it seems premature. Agreed. :) > > So, I can support putting considerations like these in the scoped address > architecture document, but IMO, there *must* be a brief mention of the > issues and a pointer in e.g. Security Considerations section. > I don't see a problem with doing that. The security section can mention the issue and say that it is out of scope for this doc and is being addressed elsewhere. > >>>>As stated above RFC 3306 does have restrictions on what the scope >>>>of the group address can be. >>> >>> >>>As above, I'm not sure how this applies to RFC3306 addresses which do not >>>depend on the prefix, ie. SSM. >> >>I consider the source address of an SSM group to be equivalent to >>the unicast prefix used in an RFC 3306 generated address. > > > One could consider so, but as was noted earlier, I didn't see it that way, > and many others probably won't either -- unless clarified. > > More work for scoped addrarch, I suppose. > Long-term it should be fixed in a revision of 3306. Near-term we could add text to this doc in section 4.3 clarifying the allocation issue on scopes. > >>>>Now, RFC 3307 reserves 0x00000001 to 0x3FFFFFFF for use with >>>>permanently allocated IPv6 multicast addresses. This is for >>>>consistency with permanent IPv4 multicast addresses. That >>>>means that T=0 in the flags field. I would expect that SSM >>>>applications would allocate group IDs out of the 0x80000000 to >>>>0xFFFFFFFF range for SSM channels. >>> >>>But RFC3306 addresses, including SSM, *MUST* have T=1, so one could argue >>>that the reservation does not hold. >> >>Not sure what you mean here. 3307 is very explicit in what IANA >>is reserving for group IDs. > > > 3307 says: > > 4.1 Permanent IPv6 Multicast Addresses > > Permanent multicast addresses, like those defined in [RFC 2375], are > allocated by IANA. These addresses will be assigned with group ID's, > in the range of 0x00000001 to 0x3FFFFFFF, on an Expert Review basis. > > Multicast addresses assigned by IANA MUST have the T bit set to 0 and > the P bit set to 0. > > ==> the last sentence does not hold for SSM; the IANA considerations > section itself is quite explicit. > SSM addresses are not restricted to the completely dynamic addresses. An SSM app could request a permanent group ID as defined in section 4.2. > >>>IMO, reserving 0x8... to 0xf for apps would be a bad decision. SSM is >>>_source_ specific. It makes very much sense for apps/users to use as >>>simple addresses as possible, like FF3X::1, FF3X:::2, ..., *not* like >>>FF3X::8000:0001, FF3X::8000:0002, etc. >> >>But there is a bigger issue. One of the goals of 3307 is to help >>prevent collisions at the layer-2 mapping of group addresses. By >>having separate 32-bit ranges for the group IDs, it is possible to >>minimize the number of collisions that occur at the MAC layer. > > > Ok, I can accept that, I think. > > >>>There doesn't seem to be need for this kind of address reservation is >>>necessary for SSM; if, for some particular reason, reservation is >>>necessary, it would seem to be better done at the end of the address >>>space. >>> >> >>But, the end of the address range collides with existing assignments >>already delegated in RFC 2375. That is why 3307 uses the low end of >>the range for permanent group IDs. > > > Ok; so, if a user manually configures an SSM address to be used, he must > use ones from the dynamic range? (even though the dynamicity is > arguable.) > As noted above, the user could request a permanent group ID for the application. Brian _______________________________________________ ssm mailing list ssm@ietf.org https://www1.ietf.org/mailman/listinfo/ssm
- [ssm] another last call for draft-ietf-ssm-arch -… Hugh Holbrook
- Re: [ssm] another last call for draft-ietf-ssm-ar… Pekka Savola
- Re: Re: [ssm] another last call for draft-ietf-ss… Hugh Holbrook
- Re: Re: [ssm] another last call for draft-ietf-ss… Pekka Savola
- Re: [ssm] another last call for draft-ietf-ssm-ar… Brian Haberman
- Re: [ssm] another last call for draft-ietf-ssm-ar… Pekka Savola
- Re: [ssm] another last call for draft-ietf-ssm-ar… Brian Haberman
- Re: [ssm] another last call for draft-ietf-ssm-ar… Pekka Savola
- Re: [ssm] another last call for draft-ietf-ssm-ar… Brian Haberman
- Re: Re: Re: [ssm] another last call for draft-iet… Hugh Holbrook
- [ssm] what to say about scoping for v6 [was ...la… Hugh Holbrook
- [ssm] permanent ipv6 ssm addresses [was ...last c… Hugh Holbrook
- Re: [ssm] permanent ipv6 ssm addresses [was ...la… Brian Haberman
- Re: [ssm] another last call for draft-ietf-ssm-ar… Brian Haberman
- Re: [ssm] what to say about scoping for v6 [was .… Brian Haberman
- Re: Re: [ssm] permanent ipv6 ssm addresses [was .… Hugh Holbrook
- Re: [ssm] what to say about scoping for v6 [was .… Pekka Savola
- Re: Re: [ssm] what to say about scoping for v6 [w… Hugh Holbrook
- Re: [ssm] what to say about scoping for v6 [was .… Brian Haberman
- Re: Re: [ssm] what to say about scoping for v6 [w… Pekka Savola
- Re: [ssm] what to say about scoping for v6 Hitoshi Asaeda
- Re: Re: Re: [ssm] what to say about scoping for v… Hugh Holbrook
- Re: [ssm] what to say about scoping for v6 Pekka Savola
- Re: [ssm] what to say about scoping for v6 [was .… Brian Haberman
- Re: [ssm] what to say about scoping for v6 [was .… Pekka Savola
- Re: Re: [ssm] what to say about scoping for v6 [w… Hugh Holbrook
- Re: Re: [ssm] what to say about scoping for v6 [w… Pekka Savola
- Re: Re: [ssm] another last call for draft-ietf-ss… Hugh Holbrook