Re: [bess] Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Mon, 03 May 2021 14:37 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49CDC3A1669; Mon, 3 May 2021 07:37:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.917
X-Spam-Level:
X-Spam-Status: No, score=-11.917 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=X2hGsrkH; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=Zcb7BGHh
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SowgewXftlQD; Mon, 3 May 2021 07:37:19 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E91303A1666; Mon, 3 May 2021 07:37:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=118195; q=dns/txt; s=iport; t=1620052639; x=1621262239; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=AVGLMr54zgo10e3GJT4ZXVhtVZr/sIaK3qi4Iach8qA=; b=X2hGsrkHWCW3w+Mue95Tv0DZhM+SVY2+1yDOOYpzgWomfgr/iUgtdyrm qYVIg6V2m8XpQBI9liSEhKmv/xGNIF7Z3TqgE/fIg4oSwUT1JYSZLIMOt 121PadqhhBMFuqRlm9XApjY+yXjudp6Rk2w3B8uwBmkajGkuWF975ii2j 8=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:FxLsHxRl33cwxfsRAgBlADI549pso0/LVj590bIulq5Of6K//p/rI E3Y47B3gUTUWZnAg9pCjOnXuubrXmlTqZqCsXVXdptKWldFjMgNhAUvDYaDDlGzN//laSE2X aEgHF9o9n22Kw5ZTcD5YVCBpHqx7DdUERL6ZkJ5I+3vEdvUiMK6n+m555zUZVBOgzywKbN/J Rm7t0PfrM4T1IBjMa02jBDOpyggRg==
IronPort-HdrOrdr: A9a23:VexgX6yN5/sBSqLWXIU1KrPxbu8kLtp033Aq2lEZdDV8Sebdv9 yynfgdyB//gCsQXnZlotybJKycWxrnlKJdybI6eZOvRhPvtmftFoFt6oP+3ybtcheRysd07o 0lSaR3DbTLYmRSpczx7BCkV/Mpx9ea+K6l7N2usEtFZysCUdAG0y5SDAGHHkpqACxPApQkHJ SRj/A32QaIU3IRc8i9Gz05T/HOzue71a7OTDwnI1oc6AeIhS6187KSKXil9zoXTj8n+8ZYzU HriAr8j5/T1s2T6hiZ7GPL6oQTpd2J8Ko+OOWpquw4bgrhkRypYoMJYczDgBkQrPu04Fgn1P ngyi1QRfhb0H/acmGrrRaF4WCJu1xChw6AuD2lqEDursDjSDUxB9Apv/MlTjLi90EisNtguZ g7uV6xiptNARvM2AT76tTYPisa7nacnHs4neYfy0FYSIsVAYUh1LA3wUU9KuZlIAvKrKQcVM V+BsDV4/hbNXmAaWrCg2VpyNuwGlwuAxavWCE5y4+o+gkTuEo841oTxcQZkHtF3ok6UYN46+ PNNbktvK1ST/URcbl2CI46MImKI12IZSiJHHOZIFzhGq1CEWnKsYTL7LI84/zvX5AU0p0omt DkXElDvWA/P2LiYPf+maFjw1ToeiGQTD7twsZR69xSobvnXofmNiWFVRQgiM2lr/IDAtDKWv q6NZ5MasWTalfGKMJs5UnTSpNSIX4RXIk+odAgQW+DpcrNN8nru4XgAbDuDYuoNQxhdnL0A3 MFUjS2Dt5H9FqXVnjxhwWUX3vsf0f47I9hCaSyxZlL9KE9cql39iQFg1Ww4c+GbRdYtLYtQU d4KLT71qWhpWe3+m7M535zOgVUC1tU5LmIaQIPmSY6d2fPNZoTsdSWfm5fmFGdIAVkcs/QGA lD40hs9bmvNJyWzyA6A9ehOmaX5kFj/E6iftM5oOmu9M3lcpQ3AtIaQ6R3DxzMDAEwsx1tsn 1/ZAgNQVL/Gjvihb6+toEdAPjSerBH8VyWCP8RjUialE2H4ekzW3MQXleVIL+qqDdrYwARu3 pc3Os0hqGalTOmNG0l6d5IQGFkWSCwG7JJDAOMeYNOvKvkETsAF1uitHi9lww5fHbs+gE0gG HsRBfkJc3jMx56pm1S1Lrs/RdPUlilO2h0anx8rORGZDn7k35uzO6GYbey2WONal0EhvoQKi 3BfCF6GHId+/mqzhKP3D6NGXI6r69eTdD1HfAtdare1WiqL5DNnaYaH+VM9JIgL9z2tPQXON jvNzO9PXf9C+kz3RaSqWtgMC5oqGM8mfeA4myu0EGomHo+C+HVOlJoWvUSJMyd9XHtQ7KN3I 9ihdw4+eu2PWOZUK/K9YjHKzpCIAjUu2i4UqUhro1Vp7s7sP9rBIbAOAG4nU1vzVE7NoP5hU keSKN07PTIPZJuZdUbf2Zc8kAynNqCIUM3umXNc6ADVEBoi2WeM8KC4rLOp7ZqGEGHqQfqMV SU8iFW/Z7+LmC+/K9fD7h1LXVdaUA65ngn4fiLcJfIDh62M+5E51i3PxaGAfFgYbnAHa9VqB l049uFxbDKMyX53R3dpjt9LOZF9X29Tca7HQKLHqpJ/rWBSCOxq7rv5NT2ijH9DSa/YQAfg4 ZOcEQLdMRNijU4luQMo2CPY72yplhgikdU5DFsi0Xk1Yen6nrKBE0uC3ysvrxGGT1IdmWShc vL8eKExG3w7ThM157EDlpRdLh1aq4tZ5myKTxvJ8gWtKOp+KRqgj0rWmZaM1IB
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.82,270,1613433600"; d="scan'208,217";a="686289814"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 03 May 2021 14:37:17 +0000
Received: from mail.cisco.com (xbe-rcd-002.cisco.com [173.37.102.17]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 143EbHcF001431 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 3 May 2021 14:37:17 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xbe-rcd-002.cisco.com (173.37.102.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Mon, 3 May 2021 09:37:16 -0500
Received: from xfe-rcd-002.cisco.com (173.37.227.250) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 3 May 2021 10:37:15 -0400
Received: from NAM11-BN8-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3 via Frontend Transport; Mon, 3 May 2021 09:37:15 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WEnxd2gH6qwhXmQKrTIFnzePc75U3WQbGmTwTlgI9yRLdsyxJiaqiQcuf6WdVxDdoYAYMLR960ewL4x2vDep36Sn+crJ4tihG+O4GdLNjKwzP7TzRoCI5NhAg4FFd99LYp784UbnPjeRe0m+bBNKXOTtTMfo+CH26ADuCKDJYapPYInOIMQCMVyUD8Vsy2wyI/QPfck/K79cHlkpq4mvAV1qXRrT7Oz2ypt+ChZa+koTo5nm1vlCHFmXqFFmwy4EGQGFL83N+CQgis/jVxM8BEuiL5R/LIEwHXANHGYhc7DzZvJPfCpmSxaf25pFuUgv/LC//t6/J9re8ug5zGKX3Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AVGLMr54zgo10e3GJT4ZXVhtVZr/sIaK3qi4Iach8qA=; b=lZtEsYDAI38YXis8HSESvRYLOzNADbkhSGi1WOaaJmuzct1VOiXk0h8G1OUL0HnelNY6RQuLJy/IW3sMdOIjRw9V2Q+JAkxMKQhXF4ge+Qg/oSsycGhRhruYYCZCjx9l5S1lDRQyk1pJocEriYO4PpzdXPlXJNsAsQ+rEyT/dkfYaLeFn5Hop6xcHoM90fTLQ0yRbQGRlC8UndeKBpoBBK05IHm8vdw47CVztcZEHrraI9kf4B1ElI5WZrRnyMRmtEUoIF5eIBktf1s6tJq2x8aysFgdjxwELXHrcnQ+koICboguiHurY2HgZoWKzWFz5N0Q7CP15j3d5bvQqdyaDg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=AVGLMr54zgo10e3GJT4ZXVhtVZr/sIaK3qi4Iach8qA=; b=Zcb7BGHh25fA13PM71ZKFtKuT2TjWdd1qx6QGYrzYuaAUiS+UEV3xF6RYolnR8suaEpI40AtTIUaLph6rVjAY2J5UnigEfnbvESqQBJ90uWtXjKIzqDuF9F8d+7b3mPC/S2AarcUaglOL0+a2moVmx29FwyIhE2HrLR7tMzuLMQ=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by PH0PR11MB4886.namprd11.prod.outlook.com (2603:10b6:510:33::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4087.25; Mon, 3 May 2021 14:37:10 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::ccc:1b78:44b5:b74b]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::ccc:1b78:44b5:b74b%3]) with mapi id 15.20.4087.044; Mon, 3 May 2021 14:37:10 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-bess-evpn-proxy-arp-nd@ietf.org" <draft-ietf-bess-evpn-proxy-arp-nd@ietf.org>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "Bocci, Matthew (Nokia - GB)" <matthew.bocci@nokia.com>, "jeanmichel.combes@orange.com" <jeanmichel.combes@orange.com>
Thread-Topic: Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)
Thread-Index: AQHW7/+kojHR0jJxH0WfhBI9FWDqyKqI7LLQgEmobYA=
Date: Mon, 03 May 2021 14:37:10 +0000
Message-ID: <980E5BB9-CA75-479A-8448-7C4AD76EC1CE@cisco.com>
References: <161123842361.25230.14225434357147230236@ietfa.amsl.com> <MWHPR08MB3520DEA4E1426AF839CBF079F76A9@MWHPR08MB3520.namprd08.prod.outlook.com>
In-Reply-To: <MWHPR08MB3520DEA4E1426AF839CBF079F76A9@MWHPR08MB3520.namprd08.prod.outlook.com>
Accept-Language: fr-BE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.48.21041102
authentication-results: nokia.com; dkim=none (message not signed) header.d=none;nokia.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [2001:420:c0c1:36:c401:173a:bf65:b950]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4c7825bb-5c82-48ce-02f6-08d90e40ef24
x-ms-traffictypediagnostic: PH0PR11MB4886:
x-microsoft-antispam-prvs: <PH0PR11MB488658CE3D100120168DC17BA95B9@PH0PR11MB4886.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(346002)(376002)(39860400002)(396003)(366004)(136003)(83380400001)(166002)(36756003)(224303003)(2906002)(30864003)(66574015)(33656002)(86362001)(64756008)(66946007)(66556008)(8936002)(122000001)(316002)(91956017)(6486002)(76116006)(54906003)(110136005)(66476007)(2616005)(6512007)(38100700002)(4326008)(5660300002)(6506007)(53546011)(21615005)(966005)(478600001)(71200400001)(66446008)(296002)(186003)(45980500001)(559001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_980E5BB9CA75479A84487C4AD76EC1CEciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4c7825bb-5c82-48ce-02f6-08d90e40ef24
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 May 2021 14:37:10.0773 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: CQJwVzx9G6YzttziRH1L0UkZntazauaU9JD8eDSsoe0Ngs2APm+vt9L4BaFSBh8fBax4Q4mzS4ZOLeqzdGiG7g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB4886
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.17, xbe-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/BEpBgVWbFAE0jWoB2aUFVZOOkn4>
Subject: Re: [bess] Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 May 2021 14:37:27 -0000

Hello Jorge,

Sorry for belated reply… Your email was kind of lost in my post-IETF-110 filled in-tray...

See below for EV> (for the many comments, as you have addressed them, I replied nothing).

Once I am clear about how normal DAD (i.e., non optimized by your document) continues to work, then I am clearing my DISCUSS. So, more explanations by email or in the I-D are welcome.

Regards

-éric


From: "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>
Date: Thursday, 18 March 2021 at 09:04
To: Eric Vyncke <evyncke@cisco.com>, The IESG <iesg@ietf.org>
Cc: "draft-ietf-bess-evpn-proxy-arp-nd@ietf.org" <draft-ietf-bess-evpn-proxy-arp-nd@ietf.org>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "Bocci, Matthew (Nokia - GB)" <matthew.bocci@nokia.com>, "jeanmichel.combes@orange.com" <jeanmichel.combes@orange.com>
Subject: Re: Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)

Hi Éric,

Thanks for this, it is very useful. Please see my comments in-line with [jorge].
We just published a revision, addressing yours and all the comments received in all the reviews.

Thanks again!
Jorge

From: Éric Vyncke via Datatracker <noreply@ietf.org>
Date: Thursday, January 21, 2021 at 3:13 PM
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-bess-evpn-proxy-arp-nd@ietf.org <draft-ietf-bess-evpn-proxy-arp-nd@ietf.org>, bess-chairs@ietf.org <bess-chairs@ietf.org>, bess@ietf.org <bess@ietf.org>, Bocci, Matthew (Nokia - GB) <matthew.bocci@nokia.com>, Bocci, Matthew (Nokia - GB) <matthew.bocci@nokia.com>, jeanmichel.combes@orange.com <jeanmichel.combes@orange.com>
Subject: Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)
Éric Vyncke has entered the following ballot position for
draft-ietf-bess-evpn-proxy-arp-nd-11: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-proxy-arp-nd/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Thank you for the work put into this document. This system could indeed be very
useful but I am afraid that this is a very complex system especially for IPv6
NDP.

Minor regret in the shepherd write-up as the WG summary did not include any
comment on the WG consensus.

Thanks to Jean-Michel Combes for its Internet directorate review at:
https://datatracker.ietf.org/doc/review-ietf-bess-evpn-proxy-arp-nd-11-intdir-telechat-combes-2021-01-20/
as Jean-Michel added some important comments, please review them as well as I
support them especially those around DAD that should be a blocking DISCUSS
point.

I also second Erik Kline's DISCUSS points.

Question to the authors and BESS WG chairs: was this document submitted to a
6MAN/V6OPS WGs review ? This is where all IPv6 experts live :-)

Please find below some blocking DISCUSS points, some non-blocking COMMENT
points (but replies would be appreciated), and some nits.

I hope that this helps to improve the document,

Regards,

-éric

== DISCUSS ==

Would RFC 8929 be enough to solve the problem ?
[jorge] I found RFC8929 an interesting reading, thanks for the reference. However, unless I’m missing something the use-case is very different.
It seems RFC8929 tries to reduce broadcast domains by using MLSNs where each link is its own broadcast domain. In EVPN BDs, the idea is reduce the control plane Broadcast/Multicast flooding among PEs of the same BD by replacing them with BGP EVPN routes. For ARP/ND, this basically means we learn at the ingress PE by snooping ARP/NAs and advertise the entries in EVPN MAC/IP routes so that the egress PE learns ARP/ND entries, and can reply to its local ARP-Requests/NS. Also in RFC8929, even for the bridging proxy, it seems that the proxy appears as an IPv6 host on the backbone, which is not the case in this document. Another difference is that the proxy in RFC8929 uses only ND messages to register bindings and in our document, we also use static entries and EVPN messages (in addition to snooped ARP and NA messages).
Please let me know if you see it otherwise.

EV> the use case is indeed different but the handling of new ND code should be the same or similar even if the ‘transport/sharing’ of information is different. Moreover RFC 8929 has been published by an IPv6-heavy WG.


-- Section 3 --
"A Proxy-ARP/ND implementation MAY support all those sub-functions or only a
subset of them.", I am afraid that it is mandatory that the reply and
duplicate-ip must be coupled: either both of them are active or none of them
are active else the system allows for duplicate IP addresses.
[jorge] the new text is as follows, let me know if it is okay. Note that the duplicate ip detection on the PEs is new in this document, and we didn’t want to make it mandatory we allow backwards compatibility with RFC7432 EVPN PEs that do proxy-ARP/ND.

   A Proxy-ARP/ND implementation MUST at least support the Learning,
   Reply and Maintenance sub-functions.  The following sections describe
   each individual sub-function.

EV> this is a progress of course but I am still puzzled how duplicate address detection can work then ? Failing to do DAD can cause very critical operational issues. Or do you rely on other mechanisms ?


-- Section 3.1 --
"A Proxy-ARP/ND implementation SHOULD support static, dynamic and EVPN-learned
entries." why not a MUST ? Or at least for dynamic & EVPN-learned ? or at least
one ?
[jorge] new text is as follows, let me know if it is ok:

   A Proxy-ARP/ND implementation in an EVPN BD MUST support dynamic and

   EVPN-learned entries, and SHOULD support static entries.

EV> Perfect thank you


"Upon receiving traffic from the CE... the PE will activate the IP->MAC and
advertise it in EVPN" it is unspecified how many bindings can be advertised in
the case of multiple static MAC for one IP... only one or all ?
[jorge] good point, thx, changed it to:

Only in that case, the PE will activate the IP->MAC and advertise

   only that IP and MAC in an EVPN MAC/IP Advertisement route.

EV> thank you


-- Section 3.2 --
Why not flooding to all other PEs the ARP/NS with unknown options ? It would be
safer.
[jorge] yes, the new text is as follows, let me know please:

   f.  A PE MUST only reply to ARP-Request and NS messages with the

       format specified in [RFC0826] and [RFC4861] respectively.

       Received ARP-Requests and NS messages with unknown options SHOULD

       be either forwarded (as unicast packets) to the owner of the

       requested IP (assuming the MAC is known in the Proxy-ARP/ND table

       and BD) or discarded.  An option to flood ARP-Requests/NS

       messages with unknown options MAY be used.  The operator should

       assess if flooding those unknown options may be a security risk

       for the EVPN BD.  An administrative option to control this

       behavior ('unicast-forward', 'discard' or 'forward') SHOULD be

       supported.  The 'unicast-forward' option is described in

       Section 3.4.

EV> please note that the ‘forward’ behavior does not seem to be listed as a sub-function
EV> nevertheless with the added text in section 3.6, this appears to be OK for me now.



-- Section 3.6 --
This function MUST be a mandatory part of the list of functions of section 3.
[jorge] the next text is as follows. As discussed, we didn’t want to make it a MUST to allow RFC7432 backwards compatibility.. let me know if it is okay.

   The Proxy-ARP/ND function SHOULD support duplicate IP detection as

   per this section so that ARP/ND-spoofing attacks or duplicate IPs due

   to human errors can be detected.  For IPv6 addresses, CEs will

   continue to carry out the DAD procedures as per [RFC4862].

EV> still a little unsure how DAD could work without this sub-element. Even if appears to me that this sub-element is more an anti-spoofing feature than a DAD proxy...



-- Section 5.2 --
An easy to fix: "Any unknown source MAC->IP entries" isn't it IP->MAC as in the
rest of the document including the terminology section ?
[jorge] fixed this one and a couple of other occurrences. Thanks!

EV> you are welcome


-- Section 5.4 --
"traffic to unknown entries is discarded" which traffic (section 5.5 is much
better to this point suggest to copy the text)? The NDP/ARP or normal data
plane traffic ? Where is this behavior specified in the 6 sub-functions of
section 3 ?
[jorge] added the following text, let me know if it is okay:

   In this scenario, the Learning sub-function is

   limited to static entries, the Maintenance sub-function will not

   require any procedures due to the static entries, and the Flooding

   reduction sub-function will completely suppress Unknown ARP-Requests/

   NS messages as well as GARP and unsolicited-NA messages.

EV> OK



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Consider adding a section about host not doing GARP or doing no DAD or
optimistic DAD.
[jorge] the document does not impose the use of GARP or DAD or ODAD, or its absence. Could you please elaborate what you would like to see in that section?

EV> what would be the impact of a CE moving ‘silently’ (no GARP/DAD/ODAD) from PE1 to PE2 ?


-- Section 1 --
Is there any reason why the terminology section is not alphabetically sorted ?
[jorge] none, I just sorted it.

EV> ;-)

-- Section 2.1 --
I would have assumed that the multicast nature of IPv6 address resolution would
cause more problems than IPv4 ARP. The use of link-local multicast groups do
not usually help as MLD snooping is often disabled in switches for link-local.
Not to mention that there could be more IPv6 addresses per node than IPv4
address and IPv6 addresses keep changing. Do the authors have data to back this
section ?
[jorge] I added a sentence in that respect. As a side note, one of the references that we include claims that the use of SN-multicast addresses in NS messages is actually better than broadcast in ARP, given that SN-multicast IP Das can be easily identified and discarded at the receiving CEs (assuming that the PEs do not have MLD snooping enabled) https://delaat.net/rp/2008-2009/p23/report.pdf

EV> I failed to see the added sentence in -13
EV> the URL you wrote above does not work anymore... Also, quite an old reference


-- Section 2.2 --
Unsure about the meaning of "large layer-2 peering network"... Do we peer at
layer-2 ? Now, I understand what is meant of course but the wording appears
strange to me (not being an English native), may I suggest "large layer-2
network for peering" ?
[jorge] how about “A typical IXP provides access to a large layer-2 Broadcast Domain for peering purposes”

EV> ok


Please expand GARP in "Unsolicited GARP". Also, this is a pleonasm as
gratuitous ARP are by definition "unsolicited" ;-)
[jorge] ok, done. Note that GARP is included in the terminology section though.

EV> then no need to expand indeed, the pleonasm still stands though


The definition of a CE in an IXP network would be welcome.
[jorge] added:
“We refer to these Internet routers as Customer Edge (CE) devices in this section”

EV> thank you


I am afraid that I do not agree with "The issue may be better in IPv6 routers"
even if the IPv6 addresses are static in this environment (i.e., no RFC 4941
addresses).
[jorge] How about “The issue might be better in IPv6 routers if MLD-snooping was enabled, since ND uses SN-multicast address in NS messages”

EV> LGTM


-- Section 3 --
An IPv6 example would also be useful as NS is not like ARP.
[jorge] added:

   In the same example, if we assume IP1, IP2, IP3 and IP4 are now IPv6

   addresses and Proxy-ARP/ND is enabled in BD1:



   1.  PEs will start adding entries in a similar way as for IPv4,

       however there are some differences:



       A.  IP1->M1 and IP2->M2 are learned as dynamic entries in PE1 and

           PE2 respectively, by snooping NA messages and not by snooping

           NS messages.  In the IPv4 case, any ARP frame can be snooped

           to learn the dynamic Proxy-ARP entry.  When learning the

           dynamic entries, the R and O Flags contained in the snooped

           NA messages will be added to the Proxy-ND entries too.



       B.  PE1 and PE2 will advertise those entries in EVPN MAC/IP

           Advertisement routes, including the corresponding learned R

           and O Flags in the ARP/ND Extended Community.



       C.  PE3 also adds IP4->M4 as dynamic, after snooping an NA

           message sent by CE4.



   2.  When CE3 sends an NS message asking for the MAC address of IP1,

       PE3 behaves as in the IPv4 example, by intercepting the NS, doing

       a lookup on the IP and replying with an NA if the lookup is

       successful.  If it is successful the NS is not flooded to the

       EVPN PEs or any other local CEs.



   3.  If the lookup is not successful, PE3 will flood the NS to remote

       EVPN PEs attached to the same BD and the other local CEs as in

       the IPv4 case.


EV> thank you


Should the default behavior/sub-function of flooding be added to the list of 1)
to 6) ?
[jorge] based on the specific section for it, the flooding reduction sub-function can also be configured to not suppress any flooding… so it is sort of implicit? Let me know otherwise.

EV> still an ambiguous name though, what about ‘flood handling’ ? or similar


-- Section 3.1 --
"Upon receiving traffic from the CE"... but with which IP address ? (OK
guessable but let's be clear in a standard specification). It also seems to me
like a local policy / feature that do not require standardization.
[jorge] I clarified by using IP1 and MAC1 as an example, let me know if it clarifies please.

   Upon receiving traffic from the CE, the PE

   will check that the source MAC, E.g., MAC1, is included in the list of allowed

   MACs.  Only in that case, the PE will activate the

   IP1->MAC1 and advertise only that IP1 and MAC1 in an EVPN MAC/IP

   Advertisement route.

EV> thanks


"Note that MAC and IPs with value 0 SHOULD NOT be learned" unsure why it is a
singular MAC and plural IP ;-)
[jorge] changed to “a MAC or an IP address with value 0”

EV> I do not see the change in -13


"only if the ARP/NA message creating the entry was NOT flooded before" what is
meant by 'flooded' ?
[jorge] flooded in the BD to local CEs. If it was already received by other local CEs (if the ARP/NA message was multicast/broadcast) there is no need to flood multicast/broadcast the same information to the local CEs again. Changed the text to reflect that:

      The PE SHOULD send an

      unsolicited GARP/NA message for dynamic entries only if the ARP/NA

      message that previously created the entry on the PE was NOT

      flooded to all the local connected CEs before.  This unsolicited

      GARP/NA message makes sure the CE ARP/ND caches are updated even

      if the ARP/NS/NA messages from CEs connected to remote PEs are not

      flooded in the EVPN network.

EV> ok


Suggestion to add some descriptions of the impact of a rebooting/new PE with an
empty cache while other PE have caches.
[jorge] added the following, let me know if it makes sense.
“In case of a PE reboot, the static and EVPN entries will be re-added as soon as the PE is back online and receives all the EVPN routes for the BD. However, the dynamic entries will be gone. Due to that reason, new NS and ARP Requests will be flooded by the PE to remote PEs and dynamic entries gradually re-learned again.”

EV> thank you


-- Section 3.1.1 --
Should RFC 4861 also be mentioned in "The use of the R Flag in NA messages has
an impact on how hosts select their default gateways when sending packets
off-link" ?
[jorge] added, thx


"Static entries SHOULD have the R Flag information added by the management
interface.", else what is the default setting of te R-flag ?
[jorge] there is this sentence in the same bullet, let me know if it is not clear:
“If the R and O Flags are not configured, the default value is 1.”


"This configured R Flag SHOULD be an administrative choice with a default value
of 1", so all other CE will appear as a router ? Not critical in the case of
IXP as it is a default free zone but in a DC (suggest s/SHOULD/MAY/)?
[jorge] changed, thx


Is there a recommended setting for the O-flag?
[jorge] I modified the sentence as follows:
“These configured R and O Flags MAY be an administrative choice with a default value of 1.”


-- Section 3.2 --
Is "'anycast' is enabled in the BD" specified somewhere in this document ?
[jorge] good point. I added the following in the Learning sub-function section:
“This document specifies an "anycast" capability that can be configured for the proxy-ND function of the PE, and affects how dynamic Proxy-ND entries are learned based on the O Flag of the snooped NA messages. If the O Flag is zero in the received NA message, the IP->MAC SHOULD only be learned in case the IPv6 "anycast" capability is enabled in the BD. Irrespective, an NA message with O Flag = 0 will be normally forwarded by the PE based on a MAC DA lookup.”


Suggest to split the point d) in three items: one for each flag.
[jorge] done, thx


Why is there no IPv6 equivalent of e) ?
[jorge] we think the use of these ARP probes is not that common, whether IPv6 DAD procedures are performed by all CEs, and we want the PEs to reply to DAD messages if they can, to reduce the flooding among PEs. That’s how it has been implemented. Let me know if it is ok.


In point f), "or discarded" can a packet with known IP->MAC mapping be
discarded as well ?
[jorge] do you mean with known options? I don’t think that needs to be specified but let me know if you think differently.


-- Section 3.4 --
Please expand "IRB"
[jorge] done


Should "flushed if the owner is no longer in the network" be complemented with
a BGP withdrawal ?
[jorge] added: “..and flushed (and the associated RT2 withdrawn) if the owner..”


Is there any security exposure (control plane DoS) by forcing the PE without
IRB to have an IPv6 LLA ?
[jorge] if the BD does not have an IRB, the LLA is only used for the purpose of the refreshes. It is not associated to any reachable IP interface.. let me know if it is ok.


-- Section 3.6 --
Strong suggestion to s/the PE MAY send a CONFIRM message to the former owner of
the IP/the PE SHOULD send a CONFIRM message to the former owner of the IP/
[jorge] done.


Unsure why CONFIRM is in uppercase BTW.
[jorge] changed to Confirm


"If the PE does not receive an answer within a given timer" is there a
recommended value for this timer ?
[jorge] Added “The default RECOMMENDED time to receive the confirmation is 30 seconds”


I have re-read three times the "anti-spoofing MAC" part, and, I still do not
understand it... Is MAC-AS the black-hole address (then why not using a all 0
MAC address) or an alternative MAC address (but then who modifies the frame
header to the CE) ?
[jorge] this is about updating all the CE’s ARP/ND caches with the AS-MAC for the IP, to make sure the spoofer does not attract the traffic for the IP. Using an all 0s MAC would not be accepted by the CEs, and we wouldn’t know if there is traffic from the CEs to the ‘suspect’ IP. I re-worded it a bit, let me know if it is better:
“Optionally the PE MAY associate an "anti-spoofing-mac" (AS-MAC) to the duplicate IP in the Proxy-ARP/ND table. The PE will send a GARP/unsolicited-NA message with IP1->AS-MAC to the local CEs as well as an RT2 (with IP1->AS-MAC) to the remote PEs. This will update the ARP/ND caches on all the CEs in the BD, and hence all the CEs in the BD will use the AS-MAC as MAC DA when sending traffic to IP1. This procedure prevents the spoofer from attracting any traffic for IP1. Since the AS-MAC is a managed MAC address known by all the PEs in the BD, all the PEs MAY apply filters to drop and/or log any frame with MAC DA= AS-MAC. The advertisement of the AS-MAC as a "black-hole MAC" (by using an indication in the RT2) that can be used directly in the BD to drop frames is for further study.”


-- Section 5.1 --
"in the peering network" is this use case only valid in the case of IXP ?
[jorge] changed it to “BD”, thx


-- Section 5.2 --
"The Proxy-ARP/ND function is enabled" but what about the sub-functions
enumerated in section 3 ?
[jorge] added:
“This scenario makes use of the Learning, Reply and Maintenance sub-functions, with an optional use of the Unicast-forward and Duplicate IP detection sub-functions. The Flooding reduction sub-function uses the default flooding for unknown ARP-Request/NS messages.”


"by snooping ARP/ND messages issued by the CEs" isn't the learning sub-function
?
[jorge] yes, added the functions.


-- Section 5.3 (and others) --
Why is this section apparently limited to IXP only ?
[jorge] it was written by our co-author IXP :-) but I replaced IXP with “operator” and “peering network” with “BD” in this section.


-- Section 5.5 --
There is a big overlap between this clear/good sub-sections and the previous
ones. Suggest to keep only this one + section 5.6.
[jorge] sections 5.1 to 5.4 are typical scenario types, and 5.5/5.6 refer to them for the particular examples of IXPs and DCs. I re-worded the sections a bit, but prefer to keep them since it was appreciated by some operators.


-- Section 5.6 --
"IPv6 'anycast' may be required in DCs, while it is not a requirement in IXP
networks." I have doubts that anycast is never used in IXP networks. Let's
rather say "seldom used in IXP networks".
[jorge] changed it to “while it is typically not a requirement in IXP networks” based on a previous review.


-- Section 6 --

Nothing is said about putting some limits on the number of entries for an IP
address... Else, this could lead to a DoS against the proxy & BGP sessions.
[jorge] added:
“The Proxy-ARP/ND function specified in this document does not allow the learning of an IP address mapped to multiple MAC addresses in the same table, unless the "anycast" capability is enabled (and only in case of Proxy-ND). When "anycast" is enabled in the Proxy-ND function, the number of allowed entries for the same IP address MUST be limited by the operator to prevent DoS attacks that attempt to fill the Proxy-ND table with a significant number of entries for the same IP.”


  "For example, IXPs should disable all unneeded control protocols, and
   block unwanted protocols from CEs so that only IPv4, ARP and IPv6
   Ethertypes are permitted on the peering network.  In addition, port
   security features and ACLs can provide an additional level of
   security."
While the above text is a good recommendation, I wonder what it the
relationship with this document ?
[jorge] true, however this document is a reference for IXPs (and co-author by one very relevant IXP) so this makes sure people is fully aware that there are other considerations to look at. We prefer to keep the text if it is okay.


== NITS ==

-- Abstract --
s/(DBs)/(BDs)/
[jorge] fixed, thx


-- Section 2.2 --
s/IPv4 layer-3 addresses/IPv4 addresses/
[jorge] fixed, thx


-- Section 3.1 --
Please use lower hexadecimal number, e.g., s/0x86dd/0x86dd/
[jorge] fixed, thx



-- Section 5.5 --
The "IXP-LAN" terminology is only used in this section while others are using
"peering network" or "IXP networks". Let's choose only one ;-)

[jorge] fixed, thx