[tsvwg] partial review of draft-ietf-tsvwg-gre-in-udp-encap-03

Bob Briscoe <bob.briscoe@bt.com> Fri, 21 November 2014 17:36 UTC

Return-Path: <bob.briscoe@bt.com>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A19B1AD5F2 for <tsvwg@ietfa.amsl.com>; Fri, 21 Nov 2014 09:36:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.195
X-Spam-Level:
X-Spam-Status: No, score=-3.195 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.594, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YF0g9NLM2sfV for <tsvwg@ietfa.amsl.com>; Fri, 21 Nov 2014 09:36:34 -0800 (PST)
Received: from hubrelay-rd.bt.com (hubrelay-rd.bt.com [62.239.224.98]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E2451AD67A for <tsvwg@ietf.org>; Fri, 21 Nov 2014 09:34:13 -0800 (PST)
Received: from EVMHR02-UKBR.domain1.systemhost.net (193.113.108.41) by EVMHR66-UKRD.bt.com (10.187.101.21) with Microsoft SMTP Server (TLS) id 14.3.195.1; Fri, 21 Nov 2014 17:34:10 +0000
Received: from EPHR02-UKIP.domain1.systemhost.net (147.149.100.81) by EVMHR02-UKBR.domain1.systemhost.net (193.113.108.41) with Microsoft SMTP Server (TLS) id 8.3.348.2; Fri, 21 Nov 2014 17:34:09 +0000
Received: from bagheera.jungle.bt.co.uk (132.146.168.158) by EPHR02-UKIP.domain1.systemhost.net (147.149.100.81) with Microsoft SMTP Server id 14.3.181.6; Fri, 21 Nov 2014 17:34:09 +0000
Received: from BTP075694.jungle.bt.co.uk ([10.109.24.23]) by bagheera.jungle.bt.co.uk (8.13.5/8.12.8) with ESMTP id sALHY7vn010130; Fri, 21 Nov 2014 17:34:07 GMT
Message-ID: <201411211734.sALHY7vn010130@bagheera.jungle.bt.co.uk>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Fri, 21 Nov 2014 17:30:18 +0000
To: Lucy yong <lucy.yong@huawei.com>
From: Bob Briscoe <bob.briscoe@bt.com>
In-Reply-To: <2691CE0099834E4A9C5044EEC662BB9D453FF325@dfweml701-chm>
References: <CE03DB3D7B45C245BCA0D2432779493606DC0C@MX104CL02.corp.emc.com> <2691CE0099834E4A9C5044EEC662BB9D453FF325@dfweml701-chm>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Scanned-By: MIMEDefang 2.56 on 132.146.168.158
Archived-At: http://mailarchive.ietf.org/arch/msg/tsvwg/bWDOxmsnwIr21JaAyiRTgIbLVuw
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
Subject: [tsvwg] partial review of draft-ietf-tsvwg-gre-in-udp-encap-03
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Nov 2014 17:36:37 -0000

Lucy,

I'll wait for David's promised proposal to the list before commenting 
on the checksum issue.

1) Regarding congestion control, I do not share the position of some 
others in tsvwg. Congestion responsiveness is determined by how the 
source spaces out the packets (i.e. their instantaneous rate). Just 
because a tunnel ingress encapsulates a packet with a UDP header does 
not suddenly make it unresponsive to congestion. The spacing between 
packets is still determined by the source. So there is no need to 
even mention congestion control considerations in a tunnelling 
document, except to say in the scoping at the start that the addition 
of tunnel headers is completely orthogonal to congestion avoidance and control.

2)
Please replace:
    Tunnel end points that support
    ECN MUST use the method described in [RFC6040] for ECN marking
    propagation.
With:
    Tunnel end points need to use the method described in [RFC6040] 
for ECN marking
    propagation.
Rationale:
    i) There is no such thing as a tunnel end point that does not 
support ECN - it has to put something in the ECN field, and it would 
not be appropriate to put anything in there other than what RFC6040 says.
   ii) Generally it is not a good idea to fill one draft with 
normative statements that repeat normative statements made in other 
drafts. Otherwise updating an RFC gets very difficult - we have to 
update all the other RFCs that gratuitously repeat what it says.

3) Nit in section 3.1.
    Section 5 of RFC6936 [RFC6936] specifies the additional requirements
    that implementation of UDP zero-checksum over IPv6 MUST compliant
    with. To compliant with it, the following additional requirements
    apply
s/compliant/comply/ (twice)

There are other nits, but they can be dealt with later.


Cheers


Bob




________________________________________________________________
Bob Briscoe,                                                  BT