Skip to main content

Minutes for TRILL at IETF-91
minutes-91-trill-1

Meeting Minutes Transparent Interconnection of Lots of Links (trill) WG
Date and time 2014-11-13 01:20
Title Minutes for TRILL at IETF-91
State Active
Other versions plain text
Last updated 2014-12-05

minutes-91-trill-1
TRILL Working Group Minutes
Chairs: Sue Hares (Hickory Hill Consulting), Jon Hudson (Brocade)
Secretary: Donald Eastlake (Huawei)

Date:   Wednesday, 12 November 2014
Facility: Hilton Hawaiian Village Hotel, Honolulu, Hawaii
Room:   Kahili Room
Time:   15:20-16:50

Minutes by Donald Eastlake (Secretary, Huawei), Hao Weiguo (Huawei),
and Andrew Qu (MediaTek).


ACTION ITEMS:
-------------

1. draf-eastlake-trill-rfc7180bis-01.txt was announced as adopted by
the WG [done:
http://www.ietf.org/mail-archive/web/trill/current/maillist.html]

2. Proposed new milestones will be posted to the TRILL WG mailing
list. [done:
http://www.ietf.org/mail-archive/web/trill/current/msg06519.html]

3. WG Last Call will be issued for draft-ietf-trill-oam-mib-01.txt
[done:
http://www.ietf.org/mail-archive/web/trill/current/msg06508.html]

4. Poll for WG adoption will be issued for
draft-hao-trill-centralized-replication-02 [done:
http://www.ietf.org/mail-archive/web/trill/current/msg06521.html]

5. WG Last Call will be issued for
draft-ietf-trill-pseudonode-nickname-02.txt [done:
http://www.ietf.org/mail-archive/web/trill/current/msg06509.html]

6. WG Last Call will be issued for draft-ietf-trill-aa-multi-attach-04
[done:
http://www.ietf.org/mail-archive/web/trill/current/msg06511.html]

7. WG Last Call will be issued for draft-ietf-trill-cmt-03 [done:
http://www.ietf.org/mail-archive/web/trill/current/msg06520.html]

8. Poll for WG adoption will be issued for
draft-dunbar-trill-directory-assisted-encap-08.txt [done:
http://www.ietf.org/mail-archive/web/trill/current/msg06522.html]

9. Poll for WG adoption will be issued for
draft-perlman-trill-smart-endnodes-04.txt [done:
http://www.ietf.org/mail-archive/web/trill/current/msg06515.html]


DETAILED MINUTES:
-----------------

[Times shown for agenda items are the time originally scheduled, not
the time actually taken.]

[Note Well slide shown]

Sue Hares (Co-Chair, Hickory Hill Consulting): People should move up
front in the room so they can hear better.

Jon Hudson (Co-Chair, Brocade): We don't bite.

Sue: At least not on Wednesday.

[Meeting called to order at 15:25]


 5 min.  Administrativia (scribes etc.), Agenda Bashing, Chairs
-------

Sue: Jon and I are your new Chairs. But Donald is here to help as
Secretary.  We are going to give you some administrivia and them
document status. Going over the agenda ...  By the way, can anyone
take a second set of notes especially when Donald is talking? Thanks
Weiguo and Andrew. ... continuing going over the agenda.


15 min.  Document Status,
-------  Review of Milestones, Chairs

Sue: Document status - see slides that are on line - ...

Sue: The rfc7180bis draft is in call for adoption and, as far as I can
see, it has been adopted. If you have any concerns, let us know. [No
one spoke up.] ...

Jon: Our main priorities are OAM, Active-Active, Directory Assist /
ARP&ND optimization. We will do other nifty things but we want to bang
these out pretty quickly. I cannot emphasize the importance of OAM
enough. It drastically affects customer views of TRILL.

Jon: OAM should be focused on as market really impacted by OAM.
Active-active is a must and demanded by market. Having multiple
interfaces on a host is a given. Finding a good way to do this is very
important and may apply outside of TRILL.  Directory-assistance is
important and maybe should have been done earlier. Proprietary
implementations of TRILL all have such a feature. It is important for
management of the network.

Sue: Milestones. Many have been completed but we do have some overdue
due to prioritization of OAM and active-active. Future milestones,
Security ones are particularly important.

Jon: There is a lot of value to security. TRILL tries to be minimal
configuration. If we can find a way to do Security with little to no
configuration, that will be great.

Sue: If we run out of milestones and are waiting for implementations
to catch up, it is possible to put a WG into a hiatus state. Here are
the proposed new milestones. I think they correspond to what we have
been saying. [See slide.] We will check on the mailing list but we
think these are good.

Doug Otis (TrendMicro): I have tried to promote TRILL and I get some
pushback in respect to wireless due to chatty nature of TRILL control
plane. Also chatter of multicast DNS. Flat L2 space is large and that
causes concern. That seems to be the biggest problem in getting it
deployed. Also better security needed.

Sue: If you have a few minutes after the meeting perhaps Donald and I
can talk with you.

Doug: We have a large campus and have configured a lot of VLANs, which
are very easy to configure with RBridges.  This helps a lot but it is
hard to convince people of that.


 5 min.  TRILL OAM Status Update,
-------     Tissa Senevirathne, Deepak Kumar
	 draft-ietf-trill-oam-mib-01
         draft-ietf-trill-yang-oam-00

Deepak Kumar (Cisco): [See "TRILL OAM" Slides] I am speaking on behalf
of Tissa. OAM Requirements and Framework have been issued as RFCs. OAM
FM [Fault Management] and PM [Performance Management] are in the RFC
Editor's queue. OAM MIB and OAM YANG are WG drafts. On the MIB draft,
we would like WG comments - perhaps WG Last Call. A Generic YANG model
has been submitted to the LIME WG. We expect to coordinate with LIME.

Sue: You might also send it to the Routing YANG group as a courtesy.

Deepak: The Routing group has already reviewed the Generic YANG
draft. TRILL OAM YANG should also be reviewed there. TRILL OAM YANG
for PM is an open item.

Sue: Are you planning to write a document [for YANG TRILL PM]?

Deepak: I've started and would welcome co-authors.

Jon: Thanks, we appreciate the effort.

Sue: Are there any comments on the MIB? Is there any objection to a WG
Last Call on the OAM MIB? OK, Last Call will be posted. Are there any
comments on the YANG document?


10 min.  TRILL Clarifications, Corrections, and Updates
-------     Donald Eastlake
         draft-eastlake-trill-rfc7180bis-01

Donald Eastlake (Huawei): [see Slides] Existing RFC 7180 is on
Clarifications, Corrections, and Updates to the base TRILL documents.
Earlier documents and RFC 7180 itself were delayed a bit in
publication due to normative dependencies. Further update is needed
now.  I'll go over what's being added to, deleted from, or left in RFC
7180 by the rfc7180bis draft.  ... Add E-L1FS support.  ...  Add
alternative RPF Check. ... Add Nickname Flags APPsub-TLV.  ...
Deprecates extending the TRILL Header beyond one word of added flags.
...  Add optional color and extended hop count bits.  ... Add some
informative appendicis. ... Things taken out are previously included
changes to RFC 6327 and RFC 6439. The changes to RFC 6327 have been
included in RFC 7177. The changes in RFC 6439 should be included in an
rfc6439bis.  Everything else is retained.  There could be further
additions but this draft should move forward rapidly because other
drafts depend on it, particularly on E-L1FS support.

[There were no comments or questions from the Audience.]


10 min.  Centralized Replication for BUM Traffic in Active-Active TRILL Edge
-------     Weiguo Hao
         draft-hao-trill-centralized-replication-02

Hao Weiguo (Huawei): [see Slides] ... Motivation is when we use data
plane learning.  Pseudo-nickname is used to avoid flip-flop at remote
RBridge.  ...  Overview of RPF check problem. Avoided by centralized
replication ... Together provide a comprehensive active-active
solution.  ...  Unicast encapsulate multi-destination to tree root that
then distributes it. ... RPF check done as if the ingress was the
root.  ...  Local forwarding behavior. ... BUM traffic load balancing
among multiple centralized nodes.  ... TRILL extension Nick Flag bit
to indicate nickname used for centralized replication. ... I think
this is a correct, applicable solution for TRILL active-active. Seek
some comments and feedback and call for WG adoption.

Jon: How many people have read this draft? Are there any objections?
Is everyone happy with how it is progressing? I would love to hear any
concerns, even minor.


 5 min.  TRILL Active-Active Status/Summary
-------     Hongjun Zhai, Tissa Senevirathne, Yizhou Li,
            Weiguo Hao, Mingui Zhang
         draft-ietf-trill-aa-multi-attach-04
         draft-ietf-trill-cmt-03
	 draft-ietf-trill-pseudonode-nickname-02

Donald Eastlake (Huawei): [see Slides] This is a brief status summary
for Active-Active TRILL Edge. CE are today connected by proprietary
Multi-Chassis LAG which can handle one box at one end and multiple
boxes at the other end. For example 1 to 4.  But some other protocol
could be running on the link to the CE devices.  The IETF just got a
liaison from IEEE 802.1 about a revision to Link Aggregation [LAG],
which is 802.1AX, that is quite far along in the process. This
802.1AX-REV will allow multiple devices at both ends but will, as I
understand it, be limited to a maximum of 3 on each end. ... As a
practical matter the edge group TRILL switches will always be from the
same manufacturer but you might have mixed remote RBridges so those
remote RBridges should not have to be modified to support
active-active.  Next slide. Here is a list of previous presentations
to the WG on active-active. ... Pseudonode-nickname assumes a nickname
for a fake RBridge that the CE appears to be attached to. In
aa-multi-attach the CE is seen as connected to all the edge RBridges.
CMT is a solution to the RPF Check problem but requires that the edge
group be no larger than the number of trees you have. We just saw
centralized replication which can fix the RPF Check problem without
that restriction. CMT also has other uses. ... Pseudonode-nickname
works best for data plane learning while aa-multi-attach works best
with control plane learning. Looking at the draft dependencies, both
depend on rfc7180bis which is one reason it should be high priority.
You could have pseudonode-nickname and aa-multi-attach both deployed
in the same TRILL campus at the same time. A particular edge group
would have to use one or the other but different edge groups could use
different strategies.

Fangwei Hu (ZTE): The smart end node draft could be added. It depends
on aa-multi-attach.

Donald: Yes. This does not claim to be a complete chart of TRILL draft
dependencies, just those for active-active.

Hao Weiguo: You chart is very clear. For data plane learning and
control plane learning, you can have both in the same network at the
same time. For example, some VLANs can use centralized replication
solution and some VLANs can use as-multi-attach solution.

Donald: I would have said some edge groups use one and some edge
groups use the other. I haven't thought about trying to use VLANs to
determine which.

Weiguo: This is just one partition method. But they can co-exist in a
single physical network.

Donald: Yes. Next Slide. So, since this is our highest major priority,
I suggest that we WG Last Call CMT, pseudonode-nickname, and
aa-multi-attach.

Sue: Donald, are you OK with WG Last Call with all at the same time?

Donald: Yes, although if we do them all we might want to run it for
longer than usual since it is more to review. I will also commit to
trying to get the rfc7180bis draft ready for WG Last Call within a few
weeks. 

Sue: I'd like to ask the room: we have gone through these drafts
several times in IETF, since e are pushing these a bit, does anyone
feel that we need an interim meeting to go over them again?

Jon: Please, if there are any reservations at all, speak up.

Sue: But we can use the interim process if you want a tutorial or have
questions. 

Donald: I would point out that people can post questions during WG
Last Call also.

Andrew Qu (MediaTek): Pseudo-nickname approach has been deployed by
vendors already and is quite mature. I have no problems with last
calling it and CMT.


10 min.  TRILL over IP, Margaret Wasserman, Dacheng Zhang, Donald Eastlake
-------  draft-ietf-trill-over-ip-01

Margaret Wasserman (Painless Security): [see Slides] TRILL over IP
specifies a natural IP/UDP encapsulation for TRILL and treats IP as a
link. So you can connect sites over IP into one campus. Current
security encapsulation uses DTLS so you have TRILL over UDP over DTLS
over IP in the secure case. That's what's in the current draft.  ...
Security does not interfere with IS-IS authentication.  ...  Work
remaining: Congestion... Middle Box... QoS Considerations... Port
configuration specification... Bigger issue is that current draft uses
obvious choices from an application development viewpoint without
really taking into consideration the fast path implications. So we
have some questions we should consider as a WG.

Weiguo:  Is a TRILL over IP port a physical port or a logical port?

Margaret: I guess it is a physical port but there is logical
configuration so I'm not sure how to answer this... Donald?

Donald: Well, there is a physical port but that port could have more
than one IP address so it could look like multiple TRILL over IP
ports. So the root is a physical port. But it could have both an IPv4
and IPv6 address and there would be configuration for each of those
for example.

Margaret: If two TRILL switches are connected by TRILL over IP you
have a physical port on each of them. Theoretically other ports could
also be on the IP network. But above the physical port you could have
multiple interfaces to the TCP/IP stack because there is not always a
1 to 1 correspondence.

Andrew: I'm not sure what Weiguo's concern is but since this TRILL
over IP is a logical connection, to me, the port is not so important.
Does not matter what the carrier is as long as you have a
point-to-point IP connection.

Margaret: You can have two physical ports that are aggregated into
one but then have three interfaces to the higher protocol stack. This
is where it isn't 1 to 1.

Sue: I think we have clarified this enough for now. Thanks Margaret.

Margaret: OK. We have a question on the security protocol. We have
specified DTLS but there is a lot more hardware support, ether
off-load support or fast path support, for IPsec in switching chip
sets.  In either case we can do default keying based on IS-IS keying
so the main concern is the data frame format between the outer IP
header and the inner UDP header.  ...  And it seems undesirable to
have to support two security protocols for TRILL.  Since IPsec has
much more widely available hardware fast path support the draft
authors are suggesting we switch to IPsec. Discussion?

Andrew: Why don't we leave this orthogonal? If you consider Data
Center interconnected, normally the IP data itself has whatever
security.  So as long as we take care of TRILL over IP and let the
generic security that does IP security between the Data Centers or
branch office take care of it since we have already formatted it as an
IP packet. Let IP security devices do security on its own unless you
want to put it into this protocol. IP has a lot security tools out
there already, just take advantage of it...

Margaret: We are talking about encapsulating TRILL packets and TRILL,
like any IETF protocol, needs to be secure. We are looking for a way
to protect the TRILL packet. Every TRILL [over IP] implementation is
going to have to implement this. If we just say "do what you want" we
won't have interoperability. One vendor could do IPsec, one could do
DTLS, one could do something proprietary... We need to list one
mandatory to implement security protocol for TRILL over IP.

Jon: Because of the way a lot of these products are produced, while
IPsec is very common, it is not common in Data Center switches. So
IPsec being more available in hardware might not be true in this
case. 

Margaret: There are chip sets that will do IPsec. I'm not sure there
are any that do DTLS. So I could do IPsec in available hardware but I
don't think I could do DTLS.

Andrew: At this moment, TRILL is usually deployed in Data Centers,
proprietary, or in the cloud. And this is normally implemented in
ASICs. As far as I know, no ASIC out there can do IPsec. There may be
NPU that can do it.

Margaret: So you are saying you will come out of the fast path for
either IPsec or DTLS.

Andrew: So you are saying the operator has to do this for TRILL.

Margaret: A mandatory to implement does not mean that everyone has to
turn it on. If you have a campus with some other kind of security, you
don't have to turn this on. If you have a remote office, I can't
imagine that you wouldn't want to run some kind of security. You might
run over a lower level VPN or something but somewhere you are going to
want to encrypt these packets so that your traffic isn't visible on
the network and your control traffic can't be corrupted.

Donald: Yeah, you can always use some sort of tunnel or something. I
don't think it matters much inside a Data Center because the links
there between adjacent TRILL switches are not IP, they are usually
Ethernet.  This is only if are encapsulating things over IP, probably
for a somewhat larger distance. Not necessarily over the global
Internet but probably getting out of the room.  If you are doing TRILL
over IP you would want to have security available and if one protocol
has better hardware support, it seems like a factor in favor of that
protocol.

Jon: But you need to consider the case of a tenant inside a Data
Center that would need to traverse part of that Data Center before
getting to the outside. So they may have to do this.

Margaret: Well, we have received some feedback that IPsec would be
better.  I'm not hearing any feedback that DTLS would be better, only
that IPsec isn't better. Does anyone want to argue that DTLS is better
or are you just saying it doesn't matter? If some people think IPsec
is better and everyone else doesn't care, then we switch to IPsec,
right?

Sue: OK. Do we have any people with deployments with comments?

Margaret: If we have people who have already implemented TRILL over
IP with DTLS, that would be an argument not to change it.

Sue: Any further comments?

Andrew: For Data Center interconnect -- VPLS -- for Layer 2 normally
secured with EVPN or IP over GRE or ... also let the Data Center
operator worry about it. If we require support of IPsec I'm afraid the
operator will need an extra device to do this job. If we just say...
ask security guys.

Margaret: There is a distinction between mandatory to implement and
mandatory to turn on. You don't even have to make the default to be
that it is turned on. So maybe in a Data Center no one would ever run
it over IP but when we make a protocol run over IP we instantly have
the possibility that someone will run it over an open IP network. So,
we hold in the IETF that any protocol running over IP must have a
mandatory to implement security protocol so that people running it
over the Internet can turn it [security] on. That doesn't mean people
running it in a Data Center need to turn it on; they can leave it
off. But when you get to the remote office scenario the name "remote
office" pretty much implies they are not in your Data Center so you
need to have a security protocol you can run if the path to the remote
office is not secure. That is why the IETF has the policy that there
must be a mandatory to implement security mechanism. This is really
only for that sort of remote office or where you have two TRILL
campuses running over an IP backbone with other people and you want to
secure the TRILL traffic.

Donald: I think one thing Andrew was talking about, he can correct me
if I am wrong, is various secure layer 2 ways of connecting parts of a
TRILL campus. That's fine but that isn't TRILL over IP, that's TRILL
over layer 2. Your layer 2 might be tunneled over IP but from what he
was talking about, the layer 2 is already secured. That's fine, but
this is for TRILL directly over IP.

Margaret: OK, but let's say it's TRILL directly over IP but the IP is
over a secured line leased from some vendor who secures it. Then I
don't have to turn on this feature.

Donald: Right.

??? (???): If we are connecting separate domains of TRILL, this seems
analogous to Fiber Channel over a tunnel. You might have native Fiber
Channel encryption ... and you might have tunnel encryption. To me,
those are orthogonal levels of encryption. The other thing, from a
network design point of view, if you are running your TRILL over IP,
you were saying a campus, you have your students using the same
network, so something is very wrong with your network design.

[Note: it is possible that the speaker above was unaware that the term
"TRILL campus" is just a term for a TRILL network, like "bridged LAN"
is a term for a bridged network, and has nothing to do with students
or academia.]

Margaret: I don't think you would have students using the same
network.  But in the remote office scenario, a small campus, you want
to connect to your main TRILL campus, you might want to run over a
VPN, and despite P standing for Private, this might go over an IP
network unencrypted through intermediate routers and there might be
man-in-the-middle attacks, right?

???: Yes but why don't you just run two tunnels, one for TRILL over
IP, and one for everything else. Much simpler to operate.

Margaret: So you would run a tunnel from the remote office?

???: Two tunnels, one for TRILL over IP and one for everything else.

Margaret: I don't know what everything else would be in that case. In
any case, we can't specify in the TRILL document how "everything else"
is handled. But you are saying that TRILL over IP should require a
dedicated tunnel.

???: Yes.

Margaret: And that the tunnel should be encrypted and that is what we
should specify?

???: That is the network design level, how you design and run your
network, and personally I wouldn't see much protocol work. You run two
tunnels, one for TRILL over IP and one for everything else.

Margaret: And somehow the TRILL tunnel ends up encrypted or else it
isn't a security mechanism at all?

???: In my view, encryption of the TRILL tunnel is orthogonal. You
encrypt the tunnel transport.  ...  To give an example with Fiber
Channel, you can have native Fiber Channel encryption. ... If you are
really paranoid you can run that over an encrypted IP tunnel. Whether
than makes practical sense, I don't know.

Margaret: The problem is that unless we can guarantee through
something in our protocol that it will never be run over an insecure
network, we have to specify a mandatory to implement security design
in our protocol. This is an IETF policy. Whether everyone will
implement our mandatory to implement protocol, well, we don't have
police and people will do what they think is right for their
product. If you build a Data Center only product that doesn't include
security, the police are not going to do anything to you. But we
believe that anything specified to run over IP will eventually be run
on the open Internet so it must be possible to secure it. Security can
be turned off by default but it has to have the capability to be
secured so it can run over the open Internet.

Andrew: Sure but this is an IP packet, so the exit of the Data Center
will already have what security is needed. We don't have to specify it
here, the equipment is already there as long as it is an IP packet.
They will encrypt it according to your instructions.

Margaret: So you are saying that this whole thing [the TRILL over UDP
over IP] will be encrypted because there is an IPsec header here
[before the initially added IP header]? We could specify that in our
document. So that would mean, in the secured case, we have TRILL over
UDP over IP over IPSEC over IP.

Andrew: Yes. I make this IP packet already. All the IP security
appliances encrypt the whole thing. The tools exist, we don't want to
invent a new feature. If we come up with something new, I don't know
if vendors will want to implement it. There is a lot of overhead in
ASIC design. If we don't see any major need to do this, it will
confuse all the ASIC designers.

Sue: Thanks Andrew, Jon and I have heard you. I think we have gone
through all the points.  Does anyone have any new points? [no
response]

Margaret: We have one more issue. That's encapsulation. Current draft
only supports natural UDP encapsulation. But we have been told there
is more hardware support and perhaps more flexibility with other
encapsulations. The one that comes up most frequently is VxLAN. There
was a consensus determination that the TRILL WG preferred UDP/IP to a
new custom encapsulation such as a new IP protocol number. But we
would just be using existing standard encapsulations, not defining a
new one.  For example, we might want a TRILL in VxLAN. Do people think
that is needed to get high performance? Any comments or questions?

Jon: I know of one implementation that does exactly this but I don't
know how much performance benefit there is.

Margaret: Well, they will get better performance if they have fast
path support for TRILL in VxLAN but not for TRILL in UDP, right? So
the question to ASIC designers is do you support TRILL over VxLAN or
TRILL UDP?

Andrew: The chip we are designing can already do TRILL over VxLAN and
TRILL over GRE. Of course, it takes two passes through the ASIC to do
this because we think this will be an uncommon corner case. We did not
design it to do it in one pass.

Margaret: So, that sounds like we should do the VxLAN encapsulation.
Does anyone thing we should not do the VxLAN encapsulation?

Jon: My only hesitation personally would be about saying it must be
VxLAN.

Margaret: I think the idea was to keep the UDP encapsulation and add
VxLAN. So you could use TRIILL over IP with either direct UDP or
VxLAN. 

Donald: I think the idea was that it might be hard to do some
encapsulations so there would be a way to reach agreement about what
you both support.

Margaret: Our suggestion is that the default is to use TRILL over UDP
for Hellos. They are not frequent, so fast path support is not so
important.  Then capabilities in the Hello would indicate what
encapsulations are supported. ... There would be a very simple
negotiation.  If you share an encapsulation, you use that and if you
don't share one, then there is no data connectivity. Anyone have any
thoughts?

Weiguo: I think to be accurate, it is TRILL over Ethernet over VxLAN.

Margaret: Right. Any other feedback or questions?

Andrew: Just to follow up on Weiguo, TRILL over IP or TRILL over
Ethernet over IP will put more burden on the IP header to indicate
whether a Ethernet header is encaped. To ASICs, I really have to know
if there is a Ethernet header there.

Donald: How about if I assure you it will be well defined?

Andrew: OK because the hardware really needs to know.

 5 min.  Directory Assisted Edge Status
            Donald Eastlake, Linda Dunbar
         draft-ietf-trill-directory-assist-mechanisms-00
         draft-ietf-trill-ia-appsubtlv-01
         draft-ietf-trill-chanel-tunnel-01
         draft-dunbar-trill-directory-assisted-encap-08

Donald: [see Slides] This is a status update on Directory Assistance.
With it you can get directory information from Push or Pull
directories.  Directory information is really a set of addresses that
all correspond to one interface. For example, a MAC address and an
IPv4 address, ... plus the edge RBridge they are attached to. ...
With that information, you can answer ARPs and NDs, so you can do ARP
and ND optimization. With complete directory information that you are
really sure is complete, you don't have to flood unknown addresses
because if you get a MAC address that is not in the directory, you
know it is bogus and you can just toss it. With complete directory
information, you can even reject frames with a forged source MAC or IP
address because if you are an edge RBridge and get a frame from an end
station but the directory says that MAC address or IP is attached to a
different RBridge, you know it is bogus. You can even tell if it is
attached to the right port of an RBridge if the directory is carrying
port of attachment information. Push directories use ESADI. Pull
directories send queries and get responses. ... [List of
presentations.]  ...  [list of drafts] directory-assist-mechanisms is
actually -01. ... The channel-tunnel draft actually covers three
different orthogonal mechanisms.  You can do any one or two or all
three. One is security, which is why it is referenced by
directory-assist-mechanism, to secure Pull directory queries and
responses. There is also a payload type that is useful. But I think
the third "scope" mechanism makes it a bit too much. I'll send a
message to the WG list suggesting it be split out. So there would just
be two mechanisms in the draft.  ...
dunbar-trill-directory-assisted-encap describes an asymmetric
pre-encapsulation scheme using existing TRILL features and says why
that would be useful, saving space in the MAC tables of edge
RBridges...

Sue: Donald, that savings permits smaller edge nodes, right?

Donald: Yes, it allows edge RBridges to be cheaper/smaller. Here is
the draft dependency. ... This is lower priority than active-active
but the directory-assisted-encap has been around for a while so I'm
suggesting we could poll for WG adoption. ... I don't think these are
ready for WG Last Call yet.

Sue: Any concerns?  [no response]


 5 min.  Smart End Nodes, Hu Fangwei
 ------  draft-perlman-trill-smart-endnodes-04

Fangwei Hu (ZTE): [see Slides] TRILL Smart Endnode. Motivation is to
save endnode learning table, quickly refresh the node table, and
supports fine grained label aware end station. ... Changes from last
time draft was polled for WG adoption. ... I'd like to call for WG
adoption. 

Sue: OK. Any comments? [no response] We will re-echo this to the list.
Please read the drafts because we will be progressing these call for
adoption pretty quickly. Thanks for your presentation Fangwei.

 5 min.  Wrap-Up, Chairs

Sue: Anything else before we close the WG session? I'd like to ask the
wireless person to talk to Donald after the meeting ...

Sue: Thanks you all so much.