Hi Fabio,

just one comment on the following sentence (section 1)

LISP-GPE MAY also be used to extend the LISP Data-Plane header, that            
        
   has allocated all by defining a Next Protocol "shim" header that             
        
   implements new data plane functions not supported in the LISP header.        
                

Something is missing in this sentence. 

May be: LISP-GPE MAY also be used to extend the LISP Data-Plane header, **since 
                        
   all of the reserved bits have been allocated, **  by defining a Next 
Protocol "shim" header that                     
   implements new data plane functions not supported in the LISP header.        
                
 
Ciao

L.

                                                                                
                    

> On 21 Sep 2018, at 07:12, Fabio Maino <[email protected]> wrote:
> 
> I have incorporated the changes as discussed, so hopefully rev 6. can be used 
> by reviewers before the telechat: 
> https://www.ietf.org/id/draft-ietf-lisp-gpe-06.txt 
> <https://www.ietf.org/id/draft-ietf-lisp-gpe-06.txt>
> 
> Here is the diff: goo.gl/tCKD4A
> 
> 
> I believe the following comments are still open. I'll work with the 
> respective authors to address them in the next rev of the document.
> 
> 
> A. [Deborah/Magnus] it is being discussed on a separate private thread if the 
> following should be added to the IANA section:
> "To ensure that protocols that are encapsulated in LISP-GPE will work well 
> from a transport interaction perspective, the registration of a new 
> encapsulated payload MUST contain an analysis of how LISP-GPE SHOULD deal 
> with outer UDP Checksum, DSCP mapping, and Explicit Congestion Notification 
> (ECN) bits whenever they apply to the new encapsulated payload. The analysis 
> for the new encapsulated payload registered in this document is in section 
> 3.1."
> 
> 
> B. [Magnus] draft-ietf-tsvwg-ecn-encap-guidelines has expired yesterday, and 
> cannot be referenced. I'll add it back to section 3.1 as soon as the draft is 
> refreshed. 
> 
> C. [Magnus/Mirja] in 3.1.1 Payload Specific Transport Interactions for 
> Ethernet Encapsulated Payloads
> 
> >>>The UDP Checksum considerations specified in section 5.3 of 
> >>>[draft-ietf-lisp-rfc6830bis] apply to Ethernet Encapsulated Payloads. 
> >>>Implementors are encouraged to consider the UDP checksum usage guidelines 
> >>>in section 3.4 of [RFC8085] when it is desirable to protect UDP, LISP and 
> >>>Ethernet headers against corruption.
> So this is not the necessary documentation of the analysis that IP/UDP(with 
> zero checksum)/LISP(with GPE)/Ethernet is a safe to use. There needs to be an 
> analysis here to verify that this protocol combination do work. You will 
> actually have to discuss how the Ethernet encapsulation fulfills the 
> requirements listed in Section 4 of RFC 6936.  
> https://datatracker.ietf.org/doc/rfc7510/ 
> <https://datatracker.ietf.org/doc/rfc7510/> is an example where such an 
> analysis was included. I would also note the applicability limitations this 
> has. 
> Which actually brings up an additional issue for Ethernet encapsulation. For 
> IP the assumption is that the IP traffic that is encapsulated is congestion 
> controlled. This assumption is even less certain when having Ethernet. Thus, 
> some consideration of that issue is likely needed. 
> >>>When a LISP-GPE router performs Ethernet encapsulation, the inner 802.1Q 
> >>>[IEEE.802.1Q_2014] priority code point (PCP) field MAY be mapped from the 
> >>>encapsulated frame to the Type of Service field in the outer IPv4 header, 
> >>>or in the case of IPv6 the 'Traffic Class' field as per guidelines 
> >>>provided by [RFC8325].
> I don't know enough about IEEE and the various versions of Ethernet and WLAN 
> here to be certain that 802.1Q PCP's can be mapped directly to the 802.11 
> User Priorities discussed in RFC8325. Please investigate if they are the 
> same, and if they are the same priorities, then make a explicit statement 
> that they are applicable.
> 
> D. [Magnus] 3.1.2 Payload Specific Transport Interactions for NSH 
> Encapsulated Payloads 
> 
> >>> The UDP Checksum considerations specified in section 5.3 of 
> >>> [draft-ietf-lisp-rfc6830bis] apply to NSH Encapsulated Payloads. 
> >>> Implementors are encouraged to consider the UDP checksum usage guidelines 
> >>> in section 3.4 of [RFC8085] when it is desirable to protect UDP, LISP, 
> >>> and NSH headers against corruption.
> Same as for Ethernet also the NSH header needs to have a documented analsysis 
> of fulfillment of the requirements.
> 
> 
> Thanks,
> 
> Fabio
> 
> 
> 
> 
> 
> On 9/20/18 1:03 PM, Fabio Maino wrote:
>> Thanks Magnus, 
>> I'll consolidate the changes we have agreed so far in the next rev that I 
>> plan to publish later today. 
>> 
>> I'll then work on the comments on this email and will send you the 
>> corresponding actions. 
>> 
>> Fabio
>> 
>> On 9/20/18 2:39 AM, Magnus Westerlund wrote:
>>> Hi Fabio,
>>> 
>>> Most of the below text is excellent. Some comments inline for needed 
>>> clarifications and additions. 
>>> 
>>> On 9/18/2018 9:52 PM, Fabio Maino wrote:
>>>> Hi Magnus, 
>>>> thanks for your comments. 
>>>> 
>>>> I think I see the points you are making. 
>>>> 
>>>> I'll add the section 3.1 below to specify the general transport 
>>>> requirements for the registration of new LISP-GPE payloads, and I will 
>>>> introduce two subsections to instantiate those requirements for Ethernet 
>>>> and NSH (section 4.2 and 4.3 will be moved here). In the "IANA 
>>>> Considerations" section I'll refer to this new section 3.1 as a 
>>>> requirement for registration of new encapsulated payload. 
>>>> 
>>>> "3.1 Payload Specific Transport Interactions
>>>> 
>>>> To ensure that protocols that are encapsulated in LISP-GPE will work well 
>>>> from a transport interaction perspective, the specification of a new 
>>>> encapsulated payload MUST contain an analysis of how LISP-GPE SHOULD deal 
>>>> with outer UDP Checksum, DSCP mapping, and Explicit Congestion 
>>>> Notification (ECN) bits whenever they apply to the new encapsulated 
>>>> payload.
>>>> 
>>>> For IP payloads, section 5.3 of [draft-ietf-lisp-rfc6830bis] specifies how 
>>>> to handle UDP Checksums encouraging implementors to consider UDP checksum 
>>>> usage guidelines in section 3.4 of [RFC8085] when it is desirable to 
>>>> protect UDP and LISP headers against corruption. Each new encapsulated 
>>>> payloads, when registered with LISP-GPE, MUST be accompanied by a similar 
>>>> analysis.
>>>> 
>>>> Encapsulated payloads may have a priority field that may or may not be 
>>>> mapped to the DSCP field of the outer IP header (part of Type of Service 
>>>> in IPv4 or Traffic Class in IPv6). Such new encapsulated payloads, when 
>>>> registered with LISP-GPE, MUST be accompanied by an analysis similar to 
>>>> the one performed in Section 3.1.1 of this document for Ethernet payloads. 
>>>> 
>>>> Encapsulated payloads may have Explicit Congestion Notification mechanisms 
>>>> that may or may not be mapped to the outer IP header ECN field. Such new 
>>>> encapsulated payolads, when registered with LISP-GPE, MUST  be accompanied 
>>>> by a set of guidelines derived from 
>>>> [draft-ietf-tsvwg-ecn-encap-guidelines] and [RFC6040]. 
>>>> 
>>>> The rest of this section specifies payload specific transport interactions 
>>>> considerations for the two new LISP-GPE encapsulated payloads specified in 
>>>> this document: Ethernet and NSH. 
>>>> 
>>>> 3.1.1 Payload Specific Transport Interactions for Ethernet Encapsulated 
>>>> Payloads
>>>> 
>>>> The UDP Checksum considerations specified in section 5.3 of 
>>>> [draft-ietf-lisp-rfc6830bis] apply to Ethernet Encapsulated Payloads. 
>>>> Implementors are encouraged to consider the UDP checksum usage guidelines 
>>>> in section 3.4 of [RFC8085] when it is desirable to protect UDP, LISP and 
>>>> Ethernet headers against corruption.
>>> So this is not the necessary documentation of the analysis that IP/UDP(with 
>>> zero checksum)/LISP(with GPE)/Ethernet is a safe to use. There needs to be 
>>> an analysis here to verify that this protocol combination do work. You will 
>>> actually have to discuss how the Ethernet encapsulation fulfills the 
>>> requirements listed in Section 4 of RFC 6936.  
>>> https://datatracker.ietf.org/doc/rfc7510/ 
>>> <https://datatracker.ietf.org/doc/rfc7510/> is an example where such an 
>>> analysis was included. I would also note the applicability limitations this 
>>> has. 
>>> Which actually brings up an additional issue for Ethernet encapsulation. 
>>> For IP the assumption is that the IP traffic that is encapsulated is 
>>> congestion controlled. This assumption is even less certain when having 
>>> Ethernet. Thus, some consideration of that issue is likely needed. 
>>> 
>>>> 
>>>> When a LISP-GPE router performs Ethernet encapsulation, the inner 802.1Q 
>>>> [IEEE.802.1Q_2014] priority code point (PCP) field MAY be mapped from the 
>>>> encapsulated frame to the Type of Service field in the outer IPv4 header, 
>>>> or in the case of IPv6 the 'Traffic Class' field as per guidelines 
>>>> provided by [RFC8325].
>>> I don't know enough about IEEE and the various versions of Ethernet and 
>>> WLAN here to be certain that 802.1Q PCP's can be mapped directly to the 
>>> 802.11 User Priorities discussed in RFC8325. Please investigate if they are 
>>> the same, and if they are the same priorities, then make a explicit 
>>> statement that they are applicable. 
>>>> 
>>>> When a LISP-GPE router performs Ethernet encapsulation, the inner header 
>>>> 802.1Q [IEEE8021Q] VLAN Identifier (VID) MAY be mapped to, or used to 
>>>> determine the LISP Instance ID field.
>>>> 
>>>> 3.1.2 Payload Specific Transport Interactions for NSH Encapsulated 
>>>> Payloads 
>>>> 
>>>> The UDP Checksum considerations specified in section 5.3 of 
>>>> [draft-ietf-lisp-rfc6830bis] apply to NSH Encapsulated Payloads. 
>>>> Implementors are encouraged to consider the UDP checksum usage guidelines 
>>>> in section 3.4 of [RFC8085] when it is desirable to protect UDP, LISP, and 
>>>> NSH headers against corruption.
>>> Same as for Ethernet also the NSH header needs to have a documented 
>>> analsysis of fulfillment of the requirements.
>>> 
>>> 
>>>> 
>>>> When a LISP-GPE router performs an NSH encapsulation, DSCP and ECN values 
>>>> MAY be mapped as specified for the Next Protocol encapsulated by NSH 
>>>> (namely IPv4, IPv6 and Ethernet)."  
>>>> 
>>>> 
>>>> I will also add a paragraph to "Iana Considerations" that says: 
>>>> 
>>>> 
>>>> "To ensure that protocols that are encapsulated in LISP-GPE will work well 
>>>> from a transport interaction perspective, the registration of a new 
>>>> encapsulated payload MUST contain an analysis of how LISP-GPE SHOULD deal 
>>>> with outer UDP Checksum, DSCP mapping, and Explicit Congestion 
>>>> Notification (ECN) bits whenever they apply to the new encapsulated 
>>>> payload. The analysis for the new encapsulated payload registered in this 
>>>> document is in section 3.1."
>>>> 
>>>> Please, let me know if this address your comments. 
>>>> 
>>>> Thanks,
>>>> Fabio
>>>> 
>>>> 
>>>> 
>>>> On 8/29/18 2:17 AM, Magnus Westerlund wrote:
>>>>> Reviewer: Magnus Westerlund
>>>>> Review result: Not Ready
>>>>> 
>>>>> This document has been reviewed as part of the transport area 
>>>>> directorate's
>>>>> ongoing effort to review key IETF documents. These comments were written
>>>>> primarily for the transport area directors, but are copied to the 
>>>>> document's
>>>>> authors and WG for their information and to allow them to address any 
>>>>> issues
>>>>> raised.
>>>>> 
>>>>> When done at the time of IETF Last Call, the authors should consider this
>>>>> review together with any other last-call comments they receive.
>>>>> Please always CC [email protected] <mailto:[email protected]> if you reply 
>>>>> to or forward this review.
>>>>> 
>>>>> Issue A.
>>>>> 
>>>>> The reason I state Not Ready has to do with this documents failure to 
>>>>> consider
>>>>> the use of zero checksum for IPv6 when tunneling other things than IP. 
>>>>> The none
>>>>> GPE version is limited to tunnel IP for which the analysis for use of zero
>>>>> checksum has been done. Each of the new tunneled protocols that are 
>>>>> specified
>>>>> in this document, i.e. ethernet and NHS, will need to perform the 
>>>>> analysis if
>>>>> they are safe to use zero checksum or not, and if not disallow zero 
>>>>> checksum
>>>>> for IPv6/UDP. The documetn also need a requirement in the registration
>>>>> requirements to perform this analysis and defined if zero checksum is
>>>>> acceptable or not.
>>>>> 
>>>>> Citing Section 5.3 of draft-ietf-lisp-rfc6830bis
>>>>> 
>>>>>    UDP Checksum:  The 'UDP Checksum' field SHOULD be transmitted as zero
>>>>>       by an ITR for either IPv4 [RFC0768] and IPv6 encapsulation
>>>>>       [RFC6935] [RFC6936].  When a packet with a zero UDP checksum is
>>>>>       received by an ETR, the ETR MUST accept the packet for
>>>>>       decapsulation.  When an ITR transmits a non-zero value for the UDP
>>>>>       checksum, it MUST send a correctly computed value in this field.
>>>>>       When an ETR receives a packet with a non-zero UDP checksum, it MAY
>>>>>       choose to verify the checksum value.  If it chooses to perform
>>>>>       such verification, and the verification fails, the packet MUST be
>>>>>       silently dropped.  If the ETR chooses not to perform the
>>>>>       verification, or performs the verification successfully, the
>>>>>       packet MUST be accepted for decapsulation.  The handling of UDP
>>>>>       zero checksums over IPv6 for all tunneling protocols, including
>>>>>       LISP, is subject to the applicability statement in [RFC6936].
>>>>> 
>>>>> The issue is that when LISP encapsulate other protocols the impact of a
>>>>> missdelivered tunnel packet to the wrong ETR can have different impacts. 
>>>>> As
>>>>> well as errors in the headers of the encapsulated packet that may be 
>>>>> assumed to
>>>>> be protected by the encapsulating layer. Thus, individual analysis of each
>>>>> protocol that are tunneled are needed.
>>>>> 
>>>>> B.) 4.2.  Type of Service
>>>>> 
>>>>>    When a LISP-GPE router performs Ethernet encapsulation, the inner
>>>>>    802.1Q [IEEE.802.1Q_2014] priority code point (PCP) field MAY be
>>>>>    mapped from the encapsulated frame to the Type of Service field in
>>>>>    the outer IPv4 header, or in the case of IPv6 the 'Traffic Class'
>>>>>    field.
>>>>> 
>>>>> Any recommendation about how to perform that mapping? Maybe parts of
>>>>> https://datatracker.ietf.org/doc/rfc8325/ 
>>>>> <https://datatracker.ietf.org/doc/rfc8325/> are relevant in this context.
>>>>> 
>>>>> C. General case of 4.2:
>>>>> 
>>>>> I expect other protocols than Ethernet may have a priority field that may 
>>>>> or
>>>>> may not be mapped to the DSCP field of the tunnel packet.
>>>>> 
>>>>> I would expect that for new protocol registration in the LISP-GPE Next 
>>>>> Protocol
>>>>> Registry should consider this. Thus, it would be good to note that such
>>>>> considerations are needed and part of what should be evaluated for new
>>>>> registrations.
>>>>> 
>>>>> D. ECN handling
>>>>> 
>>>>> Section 5.3 of draft-ietf-lisp-rfc6830bis states:
>>>>> 
>>>>>    o  The 'Explicit Congestion Notification' (ECN) field (bits 6 and 7
>>>>>       of the IPv6 'Traffic Class' field) requires special treatment in
>>>>>       order to avoid discarding indications of congestion [RFC3168].
>>>>>       ITR encapsulation MUST copy the 2-bit 'ECN' field from the inner
>>>>>       header to the outer header.  Re-encapsulation MUST copy the 2-bit
>>>>>       'ECN' field from the stripped outer header to the new outer
>>>>>       header.
>>>>> 
>>>>> The above rules may not be applicable for all transport protocols. Thus I 
>>>>> think
>>>>> it is required that one do protocol specific considerations of ECN. TSVWG 
>>>>> are
>>>>> working on recommendations for tunnels handling of  ECN here, see: 
>>>>> https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-encap-guidelines/ 
>>>>> <https://datatracker.ietf.org/doc/draft-ietf-tsvwg-ecn-encap-guidelines/> 
>>>>> Thus,
>>>>> my expectation would be to ensure that the registered protocols have 
>>>>> defined
>>>>> ECN handling, explicitly or by reference. Secondly that registration
>>>>> requirement states the need for this consideration.
>>>>> 
>>>>> Summary: To ensure that future added protocols that are encapsulated will 
>>>>> work
>>>>> well from a transport interaction perspective there need to be a 
>>>>> requirement on
>>>>> new registration to consider and define how they use zero checksum, any 
>>>>> DSCP
>>>>> mapping and ECN bits. In addition the current document needs to ensure 
>>>>> these
>>>>> things are clearly specified for the encapsulated protocols in this 
>>>>> document.
>>>>> 
>>>>> 
>>>> 
>>> -- 
>>> 
>>> Magnus Westerlund 
>>> 
>>> ----------------------------------------------------------------------
>>> Network Architecture & Protocols, Ericsson Research
>>> ----------------------------------------------------------------------
>>> Ericsson AB                 | Phone  +46 10 7148287
>>> Torshamnsgatan 23           | Mobile +46 73 0949079
>>> SE-164 80 Stockholm, Sweden | mailto: [email protected] 
>>> <mailto:[email protected]>
>>> ----------------------------------------------------------------------
>> 
> 

_______________________________________________
lisp mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to