This is the last part of my review, as far as the actual document contents go. 
I will send another summary e-mail.

Technical:

14.1.  LISP Address Type Codes

   Instance ID type codes have a range from 0 to 15, of which 0 and 1
   have been allocated [LCAF].  New Type Codes MUST be allocated
   starting at 2.  Type Codes 2 - 10 are to be assigned by IETF Review.
   Type Codes 11 - 15 are available on a First Come First Served policy.

   The following codes have been allocated:

   Type 0:  Null Body Type

   Type 1:  AFI List Type

   See [LCAF] for details for other possible unapproved address
   encodings.  The unapproved LCAF encodings are an area for further
   study and experimentation.

To begin with, I did not understand this definition. I'm trying to understand where the 
LCAF draft actually makes the instance ID allocations, and I can't see it. In addition, 
the "Null Body Type" string only appears twice in this and the LCAF draft, and 
neither occurrence explains what it is. I think something is missing here.

Finally, I do not understand why this section is in -lisp. The string "LISP Address 
Type Code" does not appear in the rest of the document AFAICT. The allocations in 
the LCAF draft seem to be inside a format defined in that draft.  Shouldn't the IANA 
allocations and the creation of the registry be in that draft as well? This seems 
particularly important, given that the list of types in -lisp does not match the list in 
-lcaf.

Suggested edit: delete this section.


    o  The following policies are used here with the meanings defined in
       BCP 26  <http://tools.ietf.org/html/bcp26>: "Specification Required", "IETF 
Consensus", "Experimental
       Use", "First Come First Served".


None of these terms are used in the rest of the document. (But see below.)

14.  IANA Considerations

This sections makes the right allocations from other, already existing 
registries (like UDP port numbers). But it should also define what the policies 
are for allocating new values with the various new number spaces that Lisp 
introduces:

- flags
- type
- reserved
- act
- unused flags
- ...

    [BGP-SEC]  Lepinski, M., "An Overview of BGPSEC",
               draft-lepinski-bgpsec-overview-00.txt  
<http://tools.ietf.org/html/draft-lepinski-bgpsec-overview-00.txt>  (work in 
progress),
               March 2011.

    [KARP]     Lebovitz, G. and M. Bhatia, "Keying and Authentication for
               Routing Protocols (KARP)Design Guidelines",
               draft-ietf-karp-design-guide-02.txt  
<http://tools.ietf.org/html/draft-ietf-karp-design-guide-02.txt>  (work in 
progress),
               March 2011.

    [RPKI]     Lepinski, M., "An Infrastructure to Support Secure
               Internet Routing",draft-ietf-sidr-arch-13.txt  
<http://tools.ietf.org/html/draft-ietf-sidr-arch-13.txt>  (work in
               progress), February 2011.


I have a hard time seeing why these should be normative references. They are 
just mentioned as work that is in progress in securing the routing system. You 
do not need to read these to implement LISP as specified in this document, or 
even to understand what Lisp is or its impacts.

    [RFC1034]  Mockapetris, P., "Domain names - concepts and facilities",
               STD 13,RFC 1034  <http://tools.ietf.org/html/rfc1034>, November 
1987.


If you look at the way this is referenced from the text, it is clear that this 
should be a non-normative reference.

      The host obtains
      a destination EID the same way it obtains an destination address
      today, for example through a Domain Name System (DNS) [RFC1034]
      lookup or Session Invitation Protocol (SIP) [RFC3261] exchange.

   [RFC3261]  Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
              A., Peterson, J., Sparks, R., Handley, M., and E.
              Schooler, "SIP: Session Initiation Protocol", RFC 3261,
              June 2002.

Same as above.

    [RFC2784]  Farinacci, D., Li, T., Hanks, S., Meyer, D., and P.
               Traina, "Generic Routing Encapsulation (GRE)",RFC 2784  
<http://tools.ietf.org/html/rfc2784>,
               March 2000.


If you look at the way this is referenced from the text, I think this should be 
a non-normative reference.

  o  On an ITR, prepending a new IP header consists of adding more
      bytes to a MAC rewrite string and prepending the string as part of
      the outgoing encapsulation procedure.  Routers that support GRE
      tunneling [RFC2784] or 6to4 tunneling [RFC3056] may already
      support this action.

GRE is here use as an example, not as normative behavior.

    [RFC3056]  Carpenter, B. and K. Moore, "Connection of IPv6 Domains
               via IPv4 Clouds",RFC 3056  <http://tools.ietf.org/html/rfc3056>, 
February 2001.


Same as above.


    [RFC4866]  Arkko, J., Vogt, C., and W. Haddad, "Enhanced Route
               Optimization for Mobile IPv6",RFC 4866  
<http://tools.ietf.org/html/rfc4866>, May 2007.

I think this one can be non-normative or even be removed, depending on how the 
mobility section rewrite goes.


    [RFC4984]  Meyer, D., Zhang, L., and K. Fall, "Report from the IAB
               Workshop on Routing and Addressing",RFC 4984  
<http://tools.ietf.org/html/rfc4984>,
               September 2007.


Background. Non-normative.

    [AFI]      IANA, "Address Family Indicators (AFIs)", ADDRESS FAMILY
               NUMBERS
               http://www.iana.org/assignments/address-family-numbers.

    [AFI-REGISTRY]
               IANA, "Address Family Indicators (AFIs)", ADDRESS FAMILY
               NUMBER registryhttp://www.iana.org/assignments/
               address-family-numbers/
               address-family-numbers.xml#address-family-numbers-1.

Is there really no better reference for this, an RFC perhaps?

I wish there were... and that RFC could be put in to the normative-reference 
section. If there is no suitable RFC I'm fine with the current two references 
as-is.

    [INTERWORK]
               Lewis, D., Meyer, D., Farinacci, D., and V. Fuller,
               "Interworking LISP with IPv4 and IPv6",
               draft-ietf-lisp-interworking-02.txt  
<http://tools.ietf.org/html/draft-ietf-lisp-interworking-02.txt>  (work in 
progress).


I think this one should be normative. This is such a key piece of work to 
understanding Lisp, and the text seems to treat it as if it is a normative 
part. For instance:

  Proxy ITR (PITR):   A PITR is also known as a PTR is defined and
      described in [INTERWORK], a PITR acts like an ITR but does so on
      behalf of non-LISP sites which send packets to destinations at
      LISP sites.

    [LISP-MS]  Farinacci, D. and V. Fuller, "LISP Map Server",
               draft-ietf-lisp-ms-09.txt  
<http://tools.ietf.org/html/draft-ietf-lisp-ms-09.txt>  (work in progress).


Isn't this normative as well? Here's an example of how the text refers to it:

  Map-Requests can also be LISP encapsulated using UDP destination port
   4342 with a LISP type value set to "Encapsulated Control Message",
   when sent from an ITR to a Map-Resolver.  Likewise, Map-Requests are
   LISP encapsulated the same way from a Map-Server to an ETR.  Details
   on encapsulated Map-Requests and Map-Resolvers can be found in
   [LISP-MS].


    [VERSIONING]
               Iannone, L., Saucez, D., and O. Bonaventure, "LISP Mapping
               Versioning",draft-ietf-lisp-map-versioning-01.txt  
<http://tools.ietf.org/html/draft-ietf-lisp-map-versioning-01.txt>  (work
               in progress).


I suspect this is normative, too. See Section 6.6.3.

Jari

_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to