If I were writing these things, I would put the registration for each of those types in the companion document. That way, a reader could judge the safety and utility of the proposed usage. Otherwise, the registration itself is not understandable.

Asked backwards, why is there value in putting a bunch of IDs that are not needed in base implementation into a spec that does not explain what they are for?

Yours,
Joel

On 9/10/13 11:01 AM, Dino Farinacci wrote:
Speaking personally, I have some concerns about this.

I think my concerns can be lumped into two related categories.  Bother are 
about interoperability.

Firstly, I find the registration of LCAFs without any explanation of how or why 
they would be used to be awkward.  I know that some members of the WG like to 
have everything in one document.  But this is why we maintain

We have companion documents (that are not working group chartered documents). 
Here are some examples:

(1) The draft-ermagen-nat-travesal draft states how to use the NAT-Traversal 
LCAF type.
(2) The draft-farinacci-lisp-te draft states how to use the Explicit Locator 
Path (ELP) LCAF type.
(3) The draft-codas-lisp-re draft states how to use the Replication List Entry 
(RLE) LCAF type.
(4) The draft-ietf-lisp-ddt draft stats how to use the Security LCAF type for 
LISP-DDT-sec.

registries.  Once we have defined LCAFs, it is quite sensible for documents 
which need LCAFs to add them to the registry, with the explanation of how and 
why the particular LCAF is beign defined.

So I would suspect that the JSON Data Model Type would have a companion 
document.

Note that unlike base protocol mechanisms, the set of LCAFs is not something 
that all implementations need to understand.  A LISP implementation that is 
never going to do 5-tuple lookup does not need to know about LCAFs

Correct.

that are designed to handle that.  And conversely defining new LCAFs ought in 
my view create an obligation for new behavior in all LISP devices.  (I don't 
think the authors intend that kind of obligation.)

This is generally true but I am finding more use-cases, where people just want 
to store data in the RLOC LCAF encoding for easier management and 
network-self-documentation.

On a related note, I find very general LCAFs a cause for concern. Particular 
the JSON LCAF, which seems to allow the mapping system to reprogram the packet 
processing hardware on the fly seems excessive.  I understand it is

The LCAF document doesn't say how the JSON Data Model LCAF will be used so we 
can't assume it is for the case you state above.

neat for experimentation.  But how does something injecting a JSON LCAF have a 
reasonable judgment about whether the ITR which will receive it will be able to 
implement the processing required?  If we are assuming particular deployment 
models, we need to describe that.  (Which leads to the question as to why it is 
in this document.)

What we have done in two cases for similar compatibility issues is this:

(1) For wanting to store Geo-Coordinates with RLOCs for ITRs that do not 
understand it, you encode the Geo-Coordinates LCAF type along with an AFI=1 or 
AFI=2 RLOC address in a AFI-List LCAF RLOC record. Then the ITR that doesn't 
understand the first AFI in the AFI-List (the Geo-Coordinate encoding), skips 
over it and goes to the next AFI in the AFI-List LCAF, where low and behold, 
there is an address it can encapsulate to.

(2) The above is done for ELP encodings too.

Dino

I may be in the rough on these concerns.

Yours,
Joel

On 9/10/13 12:35 AM, Dino Farinacci wrote:
Folks, I compiled all the input I received for updates to the LCAF draft. Find 
enclosed the updated draft and a diff file.

Deadline is tomorrow but we can have discussion before I post. So if there are 
any changes or comments, I can add them into the -03 draft. So I am not that 
worried about missing the deadline.

Changes include:

B.1.  Changes to draft-ietf-lisp-lcaf-03.txt

    o  Submitted September 2013.

    o  Updated references and author's affliations.

    o  Added Instance-ID to the Multicast Info Type so there is relative
       ease in parsing (S,G) entries within a VPN.

    o  Add port range encodings to the Application Data LCAF Type.

    o  Add a new JSON LCAF Type.

    o  Add Address Key/Value LCAF Type to allow attributes to be attached
       to an address.

Dino







_______________________________________________
lisp mailing list
lisp@ietf.org
https://www.ietf.org/mailman/listinfo/lisp



_______________________________________________
lisp mailing list
lisp@ietf.org
https://www.ietf.org/mailman/listinfo/lisp

Reply via email to