Protocol Action: 'GRE-in-UDP Encapsulation' to Proposed Standard (draft-ietf-tsvwg-gre-in-udp-encap-19.txt)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



The IESG has approved the following document:
- 'GRE-in-UDP Encapsulation'
  (draft-ietf-tsvwg-gre-in-udp-encap-19.txt) as Proposed Standard

This document is the product of the Transport Area Working Group.

The IESG contact persons are Mirja Kühlewind and Spencer Dawkins.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-tsvwg-gre-in-udp-encap/





Technical Summary

   This document specifies a method of encapsulating network protocol
   packet within GRE and UDP headers. This GRE-in-UDP encapsulation
   allows the UDP source port field to be used as an entropy field.
   This may be used for load balancing of GRE traffic in transit
   networks using existing ECMP mechanisms. This document also
   specifies GRE-in-UDP tunnel requirements for two applicability
   scenarios: (1) general Internet; (2) a traffic-managed controlled
   environment. The controlled environment has less restrictive
   requirements than the general Internet.

   This draft requires the GRE and UDP tunnel endpoints to coincide (both
   the GRE and UDP headers have to be applied and removed as a pair).
   This draft does not cover scenarios where arriving GRE traffic is
   UDP-encapsulated and/or GRE traffic is forwarded after UDP decapsulation.

   The WG has requested Proposed Standard status because this draft
   specifies a protocol that is intended for use in the Internet.

Working Group Summary

The Transport Area WG (TSVWG) is a collection of people with varied
interests that don't individually justify their own working groups.

This draft is supported by the portion of the tsvwg working group that
is familiar with and interested in UDP encapsulation.  The draft has
received significant review and critique from a number of Transport
experts, including the draft shepherd, and has undergone significant
modification as a result.  These reviews and related work on this draft
have resultings in several changes to the UDP guidelines draft
(also in TSVWG - rfc5405bis) - this GRE/UDP draft is now aligned with
that UDP guidelines draft.

This GRE/UDP draft has had a long history - it originally replaced an
earlier draft that proposed encapsulation of arbitrary protocols in
UDP without a shim header (draft-yong-tsvwg-udp-encap-4-ip-tunneling).
This replacement focused initial work on a single encapsulated protocol,
GRE.  The resulting draft then got caught up in the UDP encapsulation
adventure set off by the initial (failed) IETF Last Call on the
MPLS/UDP draft.

A design team was formed to work out the Transport issues affecting
both  drafts, primarily requirements for omission of UDP checksums for
IPv6 (these cannot be simply stated by reference to RFCs 6935 sand 6936,
because some of the requirements apply to protocol design) and congestion
control (MPLS/UDP turned out to only be deployable by network operators,
and hence can rely to a large extent on network operator provisioning
and traffic management).   The design team's work on these two problems
(and some additional concerns) lead to the publication of the MPLS/UDP
draft as RFC 7510 in April 2015, with the expectation that RFC publication
of the GRE/UDP draft would follow shortly thereafter.

Unfortunately, that didn't happen - the underlying cause is that it was
not feasible to specify a single set of requirements that cover both
network operator usage of GRE/UDP (Controlled Environment) and general
Internet usage (the latter does not apply to MPLS/UDP).  The GRE/UDP
draft was revised to specify requirements for both applicability
scenarios.  Multiple reviews by Transport experts have been performed
on this draft subsequent to that revision, revision was done, and the
shepherd believes that the draft is now (finally) ready for RFC
Publication.

Document Quality

   Versions of this specification have been reported for both BSD and
   Linux, although they may not be current with the revision being 
   forwarded for publication yet. 

   The document shepherd and authors reported that Gorry Fairhurst 
   and Jouni Korhonen both provided reviews with significant impact
   on the specification. The working group solicited reviews from 
   Donald Eastlake III and Eliot Lear late in the process, and these 
   reviews did not identify significant new issues. 

Personnel

Document Shepherd: David Black
Responsible AD: Spencer Dawkins




[Index of Archives]     [IETF]     [IETF Discussion]     [Linux Kernel]

  Powered by Linux