[bess] Re: Iotdir telechat review of draft-ietf-bess-evpn-fast-df-recovery-09
Luc André Burdet <laburdet.ietf@gmail.com> Mon, 19 August 2024 20:24 UTC
Return-Path: <laburdet.ietf@gmail.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 01501C1A07F5; Mon, 19 Aug 2024 13:24:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZW36ihA1U8SH; Mon, 19 Aug 2024 13:24:09 -0700 (PDT)
Received: from mail-oo1-xc2e.google.com (mail-oo1-xc2e.google.com [IPv6:2607:f8b0:4864:20::c2e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4FBBC1CAE72; Mon, 19 Aug 2024 13:24:08 -0700 (PDT)
Received: by mail-oo1-xc2e.google.com with SMTP id 006d021491bc7-5d5bb03fe42so2742228eaf.3; Mon, 19 Aug 2024 13:24:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1724099048; x=1724703848; darn=ietf.org; h=mime-version:content-language:accept-language:in-reply-to :references:message-id:date:thread-index:thread-topic:subject:cc:to :from:from:to:cc:subject:date:message-id:reply-to; bh=HecvIZJpv10QVxMnL1f4T5WWgE3rQKkRsvveZ9Kz6K0=; b=SUVyTlHS2L2EScT9iR5Kt9ogN0k5odX6ICLHBumnciXmPsJ7GhWaIiJTWxv6DvXyty ni3+PZcgB+ARkydFpBqxQYWLkIRAo12fHAIOb1CzYBYdrO03U7T2+sgLUmPvaGFsfQHl QVTNjriziVfAJrFgcNTYRqsBMa5gFMJWbzqU7Lt7ikQRXNNDRIUUTPDjDq1zXpP5ZJfY j5JSbAQT7A2Mp8Z0hXgh3eRuexYndbt/IlHEsYPh0B/X0T7t/73mGCAjPhlIhHNocQ3V b6/tHjBtKm+bxYgklFQ+hID7VRl9TnDQ+Zw5jB5VlSUirDKy4m5nK9wAyJiuPYd8QumD yZ4g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1724099048; x=1724703848; h=mime-version:content-language:accept-language:in-reply-to :references:message-id:date:thread-index:thread-topic:subject:cc:to :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=HecvIZJpv10QVxMnL1f4T5WWgE3rQKkRsvveZ9Kz6K0=; b=A6xnmoXgPhTl6VDZm3eF4Hfk2hTEgiemb+JXp/hL7lbzsWfRCQ+EJeBroU1jz812N5 R95AC/IyDNVcwa8dfJygwVINRH0CO9gLnYV3wibuJ+oSjNhwjrplVK+LBQkvRy754aJB cCeJbmQnQmu6n1xmNSAGN/F2wZf2icCuWwTHQkQLcDh23iTah/MTUA4Orc5Gg3RzlGz9 yFuAZzqlifvyvBn9Q12N2d1KualLgVyTJuLS7CwgI0wnnk54/7m6kfq6SdARh3wP4FA2 goHhogoyWkyl6y8rxehyhdiqP3lWqtvx8L/ZnBB0328ZDrNOySqVA4g1elszZoWVJ4m1 BT3A==
X-Forwarded-Encrypted: i=1; AJvYcCU+8M88bbOUGjZjxU26QGxOylDg6LYrIgOO0nKg2UHg+goMyRMMCyRcj0BOfRug2/4o2XcOQSrLaz9fAz5CYPyf@ietf.org, AJvYcCXZyn2lE/NGyaLaxhfjJ0Hl228G7k0k4kQoFSh7JSkbe03+35wfzp0S3JdGxkTaKk6CvXmvgcNDqWN1F4p9xvuLTY8VWNO7CTRzv0/Z3oySF2ilD6kilCHrGg==@ietf.org, AJvYcCXyHDS1xCkGEEpHE8cTVD5ZECYisnnxZglbxNA/MMW38bz2L7U+INNb4CGPLbo+T3ssHXv1CdAnYgmK@ietf.org
X-Gm-Message-State: AOJu0Yz9iORBb2jwdce1q7T11QjaMG2V1KPgzBMC9KWC/yQ2lI0krJLb rJCEagvP46rYAgoSM/7RpUkp1VUhNxxOkHl6WGHTNJrEnG7Dnu3h
X-Google-Smtp-Source: AGHT+IGLwtZvk6QpzUs97PC1pQYNQFEyaBkOmrkkF9Ycu48XtQxOl9yI597yekrZPVMeFCOd9YaF0g==
X-Received: by 2002:a05:6358:5328:b0:1ac:f7ac:e302 with SMTP id e5c5f4694b2df-1b5951929b7mr13923955d.18.1724099047104; Mon, 19 Aug 2024 13:24:07 -0700 (PDT)
Received: from CH0PR14MB4962.namprd14.prod.outlook.com ([2603:1036:304:80d::5]) by smtp.gmail.com with ESMTPSA id af79cd13be357-7a4ff11bee9sm462984985a.127.2024.08.19.13.24.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 19 Aug 2024 13:24:06 -0700 (PDT)
From: Luc André Burdet <laburdet.ietf@gmail.com>
To: Toerless Eckert <tte@cs.fau.de>, "iot-directorate@ietf.org" <iot-directorate@ietf.org>
Thread-Topic: [bess] Iotdir telechat review of draft-ietf-bess-evpn-fast-df-recovery-09
Thread-Index: ATAwMDU36zoVIzgd/FQfRig1q7aD5tWEglM8
X-MS-Exchange-MessageSentRepresentingType: 1
Date: Mon, 19 Aug 2024 20:24:05 +0000
Message-ID: <CH0PR14MB496232A56DFA436791928766AF8C2@CH0PR14MB4962.namprd14.prod.outlook.com>
References: <172365279719.1050163.4707569980076672660@dt-datatracker-6df4c9dcf5-t2x2k>
In-Reply-To: <172365279719.1050163.4707569980076672660@dt-datatracker-6df4c9dcf5-t2x2k>
Accept-Language: en-US
Content-Language: en-CA
X-Hashtags: #Promotions
X-MS-Has-Attach:
X-MS-Exchange-Organization-SCL: -1
X-MS-TNEF-Correlator:
X-MS-Exchange-Organization-RecordReviewCfmType: 0
Content-Type: multipart/alternative; boundary="_000_CH0PR14MB496232A56DFA436791928766AF8C2CH0PR14MB4962namp_"
MIME-Version: 1.0
Message-ID-Hash: CUIUV52UIM72TIEKMZTCWY6SAHAWWHPZ
X-Message-ID-Hash: CUIUV52UIM72TIEKMZTCWY6SAHAWWHPZ
X-MailFrom: laburdet.ietf@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-bess.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "bess@ietf.org" <bess@ietf.org>, "draft-ietf-bess-evpn-fast-df-recovery.all@ietf.org" <draft-ietf-bess-evpn-fast-df-recovery.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "evyncke@cisco.com" <evyncke@cisco.com>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [bess] Re: Iotdir telechat review of draft-ietf-bess-evpn-fast-df-recovery-09
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/JdzfQuVtznPCdmQ17MDHC6inh94>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Owner: <mailto:bess-owner@ietf.org>
List-Post: <mailto:bess@ietf.org>
List-Subscribe: <mailto:bess-join@ietf.org>
List-Unsubscribe: <mailto:bess-leave@ietf.org>
Hi Toerless, Thank you for the detailed review. I have updated the inline-comments for -10 which will be posted soon. For the itemized questions please see below. Thanks ! G.1 and G.2 : I will leave that question for a wider scope, this document merely updates existing RFCs -> and the reference to HRW is ‘en passant’ as an improvement which happened over time (perfect or not...) G.3 is a very interesting proposal actually, for orderly ‘removal’ from network (maintenance operations). I will give this some more thought with co-authors to see how to incorporate this, thanks for the valuable suggestion ! G.4 please note this draft currently addresses “controlled recovery” only, not “controlled failures” (as in G.3). while technically accurate, in reality interface recovery is very rarely the “same millisecond” or close thereto. In practice, even if unlatched all together interfaces recovering will also have some time gaps in between them. To address this concern is to provide for a non-default (configured) skew to account for hw programing speed(s). More pertinent though, is that this draft allows for larger non-default peering values (the 3s from base RFC) and interfaces that have known-slow-programming or a large number of subinterfaces or hosts to program can easily avail of a larger peering timer specific to the conditions of that ES. The SCT represents the wall-clock of this base-RFC peering timer at the recovering PE. G.5/G.6 the variant (a) is the one I am aware of implemented by vendors: wait for NTP sync before proceeding to many or most operations in control plane, incl this peering of ethernet-segments. If NTP snc becomes an issue (on router first-reload for example) delays are usually added prior to inserting the router into the network (advertising routes). In short, NTP sync often becomes a gate to some operations -> I could add some text with a stronger link to clock-sync before including the SCT extended community ? G.7 this was always poorly written – I have updated to “substracting a positive value” throughtout- but the “break before make” is actually on purpose. On recovery you do not want 2 interfaces in DF mode, that will create duplicates, loops etc. Regards, Luc André Luc André Burdet | Cisco | laburdet.ietf@gmail.com | Tel: +1 613 254 4814 From: Toerless Eckert via Datatracker <noreply@ietf.org> Date: Wednesday, August 14, 2024 at 12:27 To: iot-directorate@ietf.org <iot-directorate@ietf.org> Cc: bess@ietf.org <bess@ietf.org>, draft-ietf-bess-evpn-fast-df-recovery.all@ietf.org <draft-ietf-bess-evpn-fast-df-recovery.all@ietf.org>, last-call@ietf.org <last-call@ietf.org>, evyncke@cisco.com <evyncke@cisco.com> Subject: [bess] Iotdir telechat review of draft-ietf-bess-evpn-fast-df-recovery-09 Reviewer: Toerless Eckert Review result: On the Right Track Reviewer: Toerless Eckert Summary: The purpose of the document is to extend the BGP message signaling and local router procedures for failover of "Designated Forwarders" for pseudowires using calculated future timestamps and expecting clock synchronization across the forwarders, so that after receipt of the BGP message, the switchover can be handled autonomously by every node as synchronously as desired and allowed for by the clock synchronization method used. Review result: On The Right Track I am the assigned IOTDIR reviewer. I found the document well written and easy to read, except for some typos, other nits and some logical description gap. (unfortunately ?) I find the approach of the draft very useful, and i always wished we would have been able to build this in other IETF protocol domains (IP multicast), so i happen to have a range of technical concerns and suggestions primarily around the completeness of the documents methods and detail specifications, which i hope will be helpfull to improve on the quality of the text and usefulness of the solution. The following is a list of G.i general comments followed by the commented idnits version of the draft. Thank you very much for the work! Toerless Eckert General comments: G.1 minor: Why IOTdir review ? I am a bit puzzled why this draft was given to IOTdir for early review. Neither the draft nor the RFCs it references mentions IoT. And the mentioned pseudowire use-cases are all around DataCenter. So i wonder what specific IoT feedback the authors/WG is looking for. If thereactually is a specific type of use-cases for IoT with this technology, then it would be great to mention. G.2 minor/suggestion: HRW has known problems HRW was popularized and (in)validated in deployments of PIM-SM since 1995 and hence rfc2362 way before HRW1998 was written, but of course not credited in RFC8485. I would nevertheless like to point out that the IP Multicast community in the IETF had some run-ins with operators over the decades who where disappointed by its non-equal distribution in face of specific typical set of parameters such as consecutive or close to each other router-IDs. Of course, the parameters used in EVPN are different, and i have not tried to validate if or how such deployment specific anomalies would or could equally apply to the EVPN version, but i would strongly suggest to be aware that HRW is by far a well randomizing algorithm especially for the order of the input parameters. HRW is now probably 30 years old, and maybe EVPN may wants to look into newer, and supposedly better algorithms such as MurmurHash (which was a recommendation from a math geek colleague even 15 years ago - and other proposals in the IETF are picking up on it too). G.3 minor/question: Please consider adding ordered shutdown support If my understanding of RFC7432/RFC8584 and this draft is correct, the interruption in case of an ordered shutdown of a DF is as large as that of an unexpected shutdown/service interruption (without the detection of interruption of course). I think this is not necessary. I think it would be great if this draft could add support for the synchronized switchover in case of ordered shutdown of a DF because such procedures constitute likely a large number of outages in daily operations of larger networks. For example, the new extended community could have a flag indication of such an ordered shutdown so that the indicated SCT will trigger synchronized failover to the BDF (Backup DF). And only after the failover has happened would the primary DF send out the NLRI withdraw route and finish the shutdown operation. G.4 mayor: analysis of actual failover behavior The mechanism of this draft seems to aspire through synchronized switchover to achieve a switchover interruption in the order of 10 msec (the skew default value). I am worried that in the face of a large number of failovers (because of a large number of VLAN/ES services), that the interruption becomes larger and that it will be inconsistent across different services. The way i imagine the failover to operate (from similar failovers n other technologies like multicast), A router may fairly quickly be able to generate the SCT carrying routes, so there can be a burst of SCT routes all with the same SCT. When those SCT then actually expire both on the sending and receiving router, the speed at which they are added/deleted in hardware-forwarding will depend on the performance of updating hardware forwarding registers. Which may be inconsistent across different routers. It is also not clear to me if the BGP infrastructure or other factors can or can not introduce any reordering. But if for example we have thousand routes that need to be updated, and one router can update 1000 routes/sec and the other can update 2000 routes/sec, then one will be done after half a second, the other after one second - no reordering assumed. So it would be very helpfull to have some idea about the maximum imaginable scalability required and likely min/max performances to vet the impact of this candidate issue. There is of course a way to overcome this issue, which is to generate SCT that take the performance of (de)installation of hardware forwarding entries into account, for example by assuming some floor performance and generate SCT for such burst of service routes with timestamps increasing such that when they will be executed, they will stay under such a performance floor. Aka: Have a difference of e.g.: 4msec between each route, in result creating no more than 250 SCP updates/second. In any case, it would be great if the grat target goal of this draft - less than 10 msec interruption would not be invalidated by such real-world performance impacts if it actually is easy to overcome it with a bit of additional text in the draft. G.5 mayor: Behavior upon non-synchronization. I think the draft should do more due-diligence in its text for various conditions of non-correct time synchronization between devices. Let first agree on the conditions and general direction, and the i am happy to propose text if it makes sense to the WG. a) A router can and then should validate the state of synchronization of its clock (in NTP for example this is typically possible via some management API, not sure if there is already a YANG model). When restarting, the that its clock is not synchronized to a necessary degree of accuracy yet. Minimum required synchronization accuracy should be configurable, default maybe 3 msec. In this case the router would wait until the synchronization is sufficient up to a maximum time period (configurable, default maybe 30 seconds). If synchronization is not sufficient then, revert to behave as non-draft compliant router - and upgrade later on if and when synchronization is successful. b) A router which is aware that it is correctly synchronized is is receiving an SCT update from another router which did not correctly recognize its own synchronization failure (e.g.: does not have the API to validate its local clock being synchronized). This condition might warrant a flag bit in the route updates, if feasible. To discover and work around this condition, routers will perform plausibility check on received SCT timestamps, e.g.: validate that the received timestamp is within a reasonable window around the local (synchronzied) clock at the time of reception of the SCT carrying route: at least one second from current clock, at most the configured interval (default 3 seconds), plus extensions, such as some seconds if concern G.4 is taken into account. If ithe received SCD is out of bounds, then the receiving router would raise some error condition and perform some fallback failover, e.g.: within 3 seconds from reception (to avoid that failover would happen at an imappropriately long time in the future immediately, when SCT is in the past). G.6 minor: some suggested NTP operational text The following is proposed text for some NTP clock synchronization operational considerations sections including only G.5 suggestion a). But also other aspects crucial for successfull deployment. ---- While the use of a synchronized clock between the participating routers makes the solution itself very simple and accurate, it does introduce a new potentially large and complex dependency against the clock synchronization mechanism used. Because of the use of NTP timestamps, it is not possible to build really lightweight and autonomously operating clock synchronization systems. Instead, one will likely need to create an operational dependency against a clock source with automated inclusion of complexities specifically the leap seconds, which includes satellite clock sources (Beidou, Galileo, GLONASS or GPS), or terrestrial (DCF77, WWVB, MSF or JJY). If this dependency is operationally already established for other purposes, then the mechanism of this document does not provide incremental requirements except maybe for the required accuracy. Otherwise the requirements to operate the clock synchronization need to be analyzed. For the mechanism of this document to provide the desired benefit, synchronization of a few millisecond (5) or less is required, so that the skew is sufficient to separate the break DF times from the make DF times. This should in general not be a problem to achieve with minimal NTPv4 installations that are aware of common pittfalls as follows. When a router restarts, initial synchronization to other NTP server(s) is sped up if the router has a local battery backed RTC clock from which it can derive derive a starting time as well as the capability to step the clock to quickly synchronize to the other NTP server(s). If either is not possible, synchronization may take more than a few seconds after reboot and it may be desirable to delay the bringing up DF functionality up until the desired accuracy of clock synchronization is achieved. Synchronization across WAN links can be subject to asymmetric latency, which can be as high as some msec, such as for pseudowires across transcontinental connectibity between backup DCs. Clock synchronization protocols can not automatically figure out such asymmetric propagation latencies. If deployments with such asymmetric latencies is required, the clock synchronization protocol needs to have options to learn about such asymmetries, such as through configuration. G.7 minor: make before break instead of break before make I think that it would make sense to define skew as configurable and explicitly point to the option of making it positive so as to achieve "make before break" functionality, E.g.: making the recovering router become DF slightly before the withdrawing router. I can think of several type of customer services that can better deal with duplicates than with even short term losses. And unless i am overlooking some looping issues in the broadcast domains (which i likely may), the only reason to do break before make is IMHO services where the simultaneous sending will result in overload. But whenever a service has a lot rate of actual user traffic, most application will prefer a few duplicates over a few losst packets. -- The following is idnits output to have line numbers. issues/discussions from the review have no line numbers. ------ draft-ietf-bess-evpn-fast-df-recovery-09.txt: Showing Errors (**), Flaws (~~), Warnings (==), and Comments (--). Errors MUST be fixed before draft submission. Flaws SHOULD be fixed before draft submission. Checking boilerplate required by RFC 5378 and the IETF Trust (see https://trustee.ietf.org/license-info) ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- No issues found here. Running in submission checking mode -- *not* checking nits according to https://www.ietf.org/id-info/checklist . ---------------------------------------------------------------------------- No nits found. -------------------------------------------------------------------------------- 2 BESS Working Group P. Brissette, Ed. 3 Internet-Draft A. Sajassi 4 Updates: 8584 (if approved) LA. Burdet 5 Intended status: Standards Track Cisco 6 Expires: 9 January 2025 J. Drake 7 Independent 8 J. Rabadan 9 Nokia 10 8 July 2024 12 Fast Recovery for EVPN Designated Forwarder Election 13 draft-ietf-bess-evpn-fast-df-recovery-09 15 Abstract 17 The Ethernet Virtual Private Network (EVPN) solution provides 18 Designated Forwarder (DF) election procedures for multihomed Ethernet 19 Segments. These procedures have been enhanced further by applying 20 Highest Random Weight (HRW) algorithm for Designated Forwarder 21 election in order to avoid unnecessary DF status changes upon a 22 failure. This document improves these procedures by providing a fast 23 Designated Forwarder election upon recovery of the failed link or 24 node associated with the multihomed Ethernet Segment. This document 25 updates Section 2.1 of [RFC8584] by optionally introducing delays 26 between some of the events therein. 28 The solution is independent of the number of EVPN Instances (EVIs) 29 associated with that Ethernet Segment and it is performed via a 30 simple signaling between the recovered node and each of the other 31 nodes in the multihoming group. 33 Status of This Memo 35 This Internet-Draft is submitted in full conformance with the 36 provisions of BCP 78 and BCP 79. 38 Internet-Drafts are working documents of the Internet Engineering 39 Task Force (IETF). Note that other groups may also distribute 40 working documents as Internet-Drafts. The list of current Internet- 41 Drafts is at https://datatracker.ietf.org/drafts/current/. 43 Internet-Drafts are draft documents valid for a maximum of six months 44 and may be updated, replaced, or obsoleted by other documents at any 45 time. It is inappropriate to use Internet-Drafts as reference 46 material or to cite them other than as "work in progress." 48 This Internet-Draft will expire on 9 January 2025. 50 Copyright Notice 52 Copyright (c) 2024 IETF Trust and the persons identified as the 53 document authors. All rights reserved. 55 This document is subject to BCP 78 and the IETF Trust's Legal 56 Provisions Relating to IETF Documents (https://trustee.ietf.org/ 57 license-info) in effect on the date of publication of this document. 58 Please review these documents carefully, as they describe your rights 59 and restrictions with respect to this document. Code Components 60 extracted from this document must include Revised BSD License text as 61 described in Section 4.e of the Trust Legal Provisions and are 62 provided without warranty as described in the Revised BSD License. 64 Table of Contents 66 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 67 1.1. Requirements Language . . . . . . . . . . . . . . . . . . 3 68 1.2. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3 69 1.3. Challenges with Existing Mechanism . . . . . . . . . . . 3 70 1.4. Design Principles for a Solution . . . . . . . . . . . . 5 71 2. DF Election Synchronization Solution . . . . . . . . . . . . 5 72 2.1. BGP Encoding . . . . . . . . . . . . . . . . . . . . . . 6 73 2.2. Updates to RFC8584 . . . . . . . . . . . . . . . . . . . 7 74 3. Synchronization Scenarios . . . . . . . . . . . . . . . . . . 8 75 3.1. Concurrent Recoveries . . . . . . . . . . . . . . . . . . 10 76 4. Backwards Compatibility . . . . . . . . . . . . . . . . . . . 11 77 5. Security Considerations . . . . . . . . . . . . . . . . . . . 11 78 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 12 79 7. Normative References . . . . . . . . . . . . . . . . . . . . 12 80 Appendix A. Contributors . . . . . . . . . . . . . . . . . . . . 13 81 Appendix B. Acknowledgements . . . . . . . . . . . . . . . . . . 13 82 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 14 84 1. Introduction 86 The Ethernet Virtual Private Network (EVPN) solution [RFC7432] is 87 becoming pervasive in data center (DC) applications for Network 88 Virtualization Overlay (NVO) and DC interconnect (DCI) services, and 89 in service provider (SP) applications for next generation virtual 90 private LAN services. nit: If there is any IoT use, please mention nit: "pervasive" is a bold statement. I do not know enough to support or doubt it, but if there was any reference you could add to support the claim, then it would make it stronger. Else maybe tone it down ("widely used")... 92 [RFC7432] describes Designated Frowarder (DF) election procedures for ^ typo 93 multihomed Ethernet Segments. These procedures are enhanced further 94 in [RFC8584] by applying the Highest Random Weight (HRW) algorithm nit: please add the HRW1998 reference as used in RFC8584 as reference for the term HRW and include it here. 95 for DF election in order to avoid unnecessary DF status changes upon 96 a link or node failure associated with the multihomed Ethernet 97 Segment. This document makes further improvements to the DF election nit: insert paragraph break before "This" (background -> contribution). 98 procedures in [RFC8584] by providing an option for a fast DF election 99 upon recovery of the failed link or node associated with the 100 multihomed Ethernet Segment. This DF election is achieved 101 independent of the number of EVPN Instances (EVIs) associated with 102 that Ethernet Segment and it is performed via straightforward 103 signaling between the recovered node and each of the other nodes in 104 the multihomed group. 105 This document updates the DF Election Finite State Machine (FSM) 106 described in Section 2.1 of [RFC8584], by optionally introducing 107 delays between some events, as further detailed in Section 2.2. The 108 solution is based on a simple one-way signaling mechanism. 110 1.1. Requirements Language 112 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 113 "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and 114 "OPTIONAL" in this document are to be interpreted as described in BCP 115 14 [RFC2119] [RFC8174] when, and only when, they appear in all 116 capitals, as shown here. 118 1.2. Terminology 120 PE: Provider Edge device. 122 Designated Forwarder (DF): A PE that is currently forwarding 123 (encapsulating/decapsulating) traffic for a given VLAN in and out 124 of a site. 126 EVI: An EVPN instance spanning the Provider Edge (PE) devices 127 participating in that EVPN. 129 1.3. Challenges with Existing Mechanism 131 In EVPN technology, multiple Provider Edge (PE) devices have the 132 ability to encapsulate and decapsulate data belonging to the same 133 VLAN. Under certain conditions, this may cause Layer2 duplicates and 134 potential loops if there is a momentary overlap in forwarding roles 135 between two or more PE devices, consequently leading to broadcast 136 storms. 138 EVPN [RFC7432] currently specifies timer-based synchronization among 139 PE devices within a redundancy group. This approach can lead to 140 duplications and potential loops due to multiple Designated 141 Forwarders (DFs) if the timer interval is too short, or to packet 142 drops if the timer interval is too long. 144 Split-horizon filtering, as described in Section 8.3 of [RFC7432], 145 can prevent loops but does not address duplicates. However, if there 146 are overlapping Designated Forwarders (DFs) of two different sites 147 simultaneously for the same VLAN, the site identifier will differ 148 when the packet re-enters the Ethernet Segment. Consequently, the 149 split-horizon check will fail, resulting in Layer 2 loops. minor: i can not find a description of this setup and problem in [RFC7342], and the description in the paragraph above is quite terse so that i am not sure that i would make up from scratch a fitting example. I think it would thus be useful to provide an topology with an appropriate example of this condition and explain the problem based on that topology example. 151 The updated Designated Forwarder (DF) procedures outlined in 152 [RFC8584] use the well-known Highest Random Weight (HRW) algorithm to 153 prevent the reshuffling of VLANs among PE devices within the 154 redundancy group during failure or recovery events. This approach 155 minimizes the impact on VLANs not assigned to the failed or recovered 156 ports and eliminates the occurrence of loops or duplicates during 157 such events. 159 However, upon PE insertion or a port being newly added to a 160 multihomed Ethernet Segment, HRW also cannot help as a transfer of DF 161 role to the new port must occur while the old DF is still active. 163 +---------+ 164 +-------------+ | | 165 | | | | 166 / | PE1 |----| | +-------------+ 167 / | | | MPLS/ | | |---CE3 168 / +-------------+ | VxLAN/ | | PE3 | 169 CE1 - | Cloud | | | 170 \ +-------------+ | |---| | 171 \ | | | | +-------------+ 172 \ | PE2 |----| | 173 | | | | 174 +-------------+ | | 175 +---------+ 177 Figure 1: CE1 multihomed to PE1 and PE2. 179 In Figure 1, when PE2 is inserted in the Ethernet Segment or its 180 CE1-facing interface recovered, PE1 will transfer the DF role of some 181 VLANs to PE2 to achieve load balancing. However, because there is no 182 handshake mechanism between PE1 and PE2, overlapping of DF roles for 183 a given VLAN is possible which leads to duplication of traffic as 184 well as Layer 2 loops. 186 Current EVPN specifications [RFC7432] and [RFC8584] rely on a timer- 187 based approach for transferring the DF role to the newly inserted 188 device. This can cause the following issues: 190 * Loops/Duplicates if the timer value is too short 191 * Prolonged Traffic Blackholing if the timer value is too long 193 1.4. Design Principles for a Solution 195 The clock-synchronization solution for fast DF recovery presented in 196 this document follows several design principles and presents 197 multiples advantages, namely: 199 * Complex handshake signaling mechanisms and state machines are 200 avoided in favor of a simple uni-directional signaling approach. 202 * The fast DF recovery solution maintains backwards-compatibility 203 (see Section 4) by ensuring that PEs any unrecognized new BGP 204 Extended Community. 206 * Existing DF Election algorithms remain supported. 208 * The fast DF recovery solution is independent of any BGP delays in 209 propagation of Ethernet Segment routes (Route Type 4) minor: This claim is unclear to me. There is an overall maximum for the propagation latency plus processing time of "just" a few seconds with the default SCT calculation, right ? And that is communicated "in conjunction with" the Ethernet Segment routes according to your below explanation. So there is a maximum propagation limit. And likely some serialization, timing dependencies.... ??!! 211 * The fast DF recovery solution is agnostic of the actual time 212 synchronization mechanism used, and normalizes to NTP for EVPN 213 signalling only. XXX 215 2. DF Election Synchronization Solution 217 The fast DF recovery solution relies on the concept of common clock 218 alignment between partner PEs participating in a common Ethernet 219 Segment i.e. PE1 and PE2 in Figure 1. The main idea is to have all 220 peering PEs of that Ethernet Segment perform DF election, and apply 221 the result at the same pre-announced time. 223 The DF Election procedure, as described in [RFC7432] and as 224 optionally signalled in [RFC8584], is applied. All PEs attached to a 225 given Ethernet Segment are clock-synchronized using a networking 226 protocol for clock synchronization (e.g., NTP, PTP). When a new PE 227 is inserted in an Ethernet Segment or a failed PE device of the 228 Ethernet Segment recovers, that PE communicates to peering partners 229 the current time plus the value of the timer for partner discovery 230 from step 2 in Section 8.5 of [RFC7432]. This constitutes an "end 231 time" or "absolute time" as seen from the local PE. That absolute 232 time is called the "Service Carving Time" (SCT). 234 A new BGP Extended Community, the Service Carving Timestamp is 235 advertised along with the Ethernet Segment route (RT-4) to 236 communicate the Service Carving Time to other partners. 238 Upon receipt of the new BGP Extended Community, partner PEs can 239 determine the service carving time of the newly insterted PE. To 240 eliminate any potential for duplicate traffic or loops, the concept 241 of skew is introduced: a small time offset to ensure a controlled and 242 orderly transition when multiple Provider Edge (PE) devices are 243 involved. The receiving partner PEs add a skew (default = -10ms) to 244 the Service Carving Time to enforce this mechanism. The previously 245 inserted PE(s) must perform service carving first, followed shortly 246 by the newly insterted PE, after the specified skew delay. 248 To summarize, all peering PEs perform service carving almost 249 simultaneously at the time announced by the newly added/recovered PE. 250 The newly inserted PE initiates the SCT, and triggers service carving 251 immediately on its local timer expiry. The previously inserted PE(s) 252 receiving Ethernet Segment route (RT-4) with a SCT BGP extended 253 community, perform service carving shortly before Service Carving 254 Time. 256 2.1. BGP Encoding 258 A new BGP extended community is defined to communicate the Service 259 Carving Timestamp for each Ethernet Segment. 261 A new transitive extended community where the Type field is 0x06, and 262 the Sub-Type is 0x0F is advertised along with the Ethernet Segment 263 route. The expected Service Carving Time is encoded as an 8-octet 264 value as follows: 266 1 2 3 267 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 268 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 269 | Type = 0x06 | Sub-Type(0x0F)| Timestamp Seconds ~ 270 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 271 ~ Timestamp Seconds | Timestamp Fractional Seconds | 272 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 274 Figure 2: Service Carving Time 276 The timestamp exchanged uses the NTP prime epoch of January 1, 1900 277 [RFC5905] and the 64-bit NTP Timestamp Format. The NTP Era value is 278 not exchanged and Era 0 is assumed as of the writing of this 279 document. A DF Election operation occurring exactly at the Era 280 transition boundary some time in 2036 is outside of the scope of this 281 document. mayor: This description effectively only supports the protocol until the end of Era 0, because it not only describes what to do during switchover to Era N+1, but it does not describe how to operate without encoding the Era. This makes the protocol useful (without another RFC) for less than 12 years. That is IMHO insufficient. One simple solution, would be to describe that the Era is not included in the encoding, but that a plausibility check is made on received timestamps. If it is completely out of range with the receiving routers current Era, but within rage with Era-1 or Era+1, then the timestamp is accordingly adjusted to use that Era. In another solution option, you can encode the Era by carving space from the SCT encoding as follows: IMHO, it is unnecessary to encode the fractional seconds with 16 bits. The accuracy of the signalled timestamp does NOT impact the synchronized accuracy of the execution of DF switchover. It only impacts the granularity of timestamps that can be generated. If you would signal only the top 8 bits of the fractional seconds, then you could still trigger a synchronized switchover at intervals of 4 msec, which IMHO is more than necessary. And the switchover could still be synchronized to an arbitrary better accuracy, such as 1 usec if just the clock synchronization between the router is that good. Practically speaking, NTP clock synchronization may often be just 1 msec accurate anyhow. Even if you consider my thoughts from above concern G.4, and want to assign different timestamps for every Ethernet Segment (especially with large number of ethernet segments), then an interval of 4 msec would likely be more than sufficient granularity. So with just 8 bit fractional second encoding, you have 8 bit spare in the encoding you can use for Era and other features (in the future). 282 The 64-bit NTP Timestamp Format consists of a 32-bit part for Seconds 283 and a 32-bit part for Fraction, which are encoded in the Service 284 Carving Time as follows: 286 * Timestamp Seconds: 32-bit NTP seconds are encoded in this field. 288 * Timestamp Fractional Seconds: the high order 16 bits of the NTP 289 'Fraction' field are encoded in this field. 291 When rebuilding a 64-bit NTP Timestamp Format using the values from a 292 received SCT BGP extended community, the lower order 16 bits of the 293 Fractional field are set to 0. The use of a 16-bit fractional 294 seconds yields adequate precision of 15 microseconds (2^-16 s). 296 This document introduces a new flag called "T" (for Time 297 Synchronization) to the bitmap field of the DF Election Extended 298 Community defined in [RFC8584]. 300 1 2 3 301 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 302 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 303 | Type = 0x06 | Sub-Type(0x06)| RSV | DF Alg | |A| |T| ~ 304 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 305 ~ Bitmap | Reserved = 0 | 306 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 308 Figure 3: DF Election Extended Community 310 * Bit 3: Time Synchronization (corresponds to Bit 27 of the DF 311 Election Extended Community). When set to 1, it indicates the 312 desire to use Time Synchronization capability with the rest of the 313 PEs in the Ethernet Segment. nit: "Bit 3" is a confusing definition because the "DF Election Extended Community" field is only mentioned in the prior paragraph and not shown with this name in the picture. I would suggest to replace picture 3 with Figure 4 from rfc8584 - which does show "Bitmap", and then follow it with Figure 5 from rfc8584 with "T" added, and then follow with the "Bit 3" bullet point. 315 This capability is utilized in conjunction with the agreed-upon DF 316 Election Type. For instance, if all the PE devices in the Ethernet 317 Segment indicate possessing Time Synchronization capability and ^^^^^^^^^^ nit: "the desire to use the" (to be consistent with the definition of T in line 312. 318 request the DF Election Type to be Highest Random Weight (HRW), then 319 the HRW algorithm is edused in conjunction with this capability. A ^^^^^^ nit: deduced ? 320 PE which does not support the procedures set out in this document, or 321 receives a route from another PE in which th capability is not set ^ nit: "e" 322 MUST NOT delay Designated Forwarder election as this could lead to 323 duplicate traffic in some instances (overlapping Designated 324 Forwarders). 326 2.2. Updates to RFC8584 328 This document introduces an additional delay to the events and 329 transitions defined for the default DF election algorithm FSM in 330 Section 2.1 of [RFC8584] without changing the FSM state or event 331 definitions themselves. 333 Upon receiving a RECV_ES message, the peering PE's Finite State nit: RFC8584 uses the term "RCVD_ES" for an event, and does not use the term "RECV_ES" for a message. Unless there is good reason to introduce new (inconsistent/duplicate) terminology, pls. change to terminology RCVD_ES event. Also further below (line 350). 334 Machine (FSM) transitions from the DF_DONE (indicating the DF 335 election process was complete) state to the DF_CALC (indicating that 336 a new DF calculation is needed) state . Due to the Service Carving 337 Time (SCT) included in the Ethernet-Segment update, the completion of 338 the DF_CALC state and the subsequent transition back to the DF_DONE 339 state are delayed. This delay ensures proper synchronization and 340 prevents conflicts. Consequently, the accompanying forwarding 341 updates to the Designated Forwarder (DF) and Non-Designated Forwarder 342 (NDF) states are also deferred. 344 The corresponding actions when transitions are performed or states 345 are entered/exited are modified as follows: nit: Suggest to rewrite to the following, to be more precise: Item 9. in RFC8584, Section 2.1, List "Corresponding actions when transitions are performed or states are entered/exited" is changed as follows: 347 9. DF_CALC on CALCULATED: Mark the election result for the VLAN or 348 VLAN Bundle. 350 9.1 If an SCT timestamp is present during the RECV_ES event of 351 Action 11, wait until the time indicated by the SCT before 352 proceeding to step 9.2. 354 9.2 Assume the role of DF or NDF for the local PE concerning the 355 VLAN or VLAN Bundle, and transition to the DF_DONE state. 357 This revised approach ensures proper timing and synchronization in 358 the DF election process, avoiding conflicts and ensuring accurate 359 forwarding updates minor: a) Given how this is the normative text, i am worried that the "skew" variable is not mentioned. Please insert accordingly. b) 9.1 does not seem to cover the SCT delay that needs to be performed (equally, except for skew) by the newly inserted PE. 9.1 only mentions the condition of RECV_ES, which to me does not sounds like the newly inserted PE. minor: I am somewhat irritated that neither RFC8584 nor this draft have any text in the state machiner section to indicate when/how ES routes are generated. This would help IMHO especially in this new draft, because it is the time when the timestamp is taken, SCT calculated and inserted into the ES route, and i guess that that also starts the process leading to CALCULATED event on the newly inserted router. 361 3. Synchronization Scenarios 363 Consider Figure 1 as an example, where initially PE2 has failed and 364 PE1 has taken over. This scenario illustrates the problem with the 365 DF-Election mechanism described in Section 8.5 of [RFC7432], 366 specifically in the context of the timer value configured for all PEs 367 on the Ethernet Segment. 369 Procedure based on Section 8.5 of [RFC7432] with the default 3 second 370 timer in step 2: 372 1. Initial state: PE1 is in a steady-state and PE2 is recovering 374 2. Recovery: PE2 recovers at an absolute time of t=99. 376 3. Advertisement: PE2 advertises RT-4, sent at t=100, to partner 377 PE1. 379 4. Timer Start: PE2 starts a 3 second timer to allow the reception 380 of RT-4 from other PE nodes. 382 5. Immediate carving: PE1 performs service carving immediately upon 383 RT-4 reception, i.e. t=100 plus some BGP propagation delay. 385 6. Delayed Carving: PE2 performs service carving at time t=103 387 [RFC7432] favors traffic drops over duplicate traffic. With the 388 above procedure, traffic drops will occur as part of each PE recovery 389 sequence since PE1 transitions some VLANs to Non-Designated Forwarder 390 (NDF) immediately upon RT-4 reception. 391 The timer value (default = 3 seconds) directly affects the duration 392 of the packet drops. A shorter (or zero) timer may result in 393 duplicate traffic or traffic loops. 395 Procedure based on the Service Carving Time (SCT) approach: 397 1. Initial state: PE1 is in a steady state, and PE2 is recovering 399 2. Recovery: PE2 recovers at an absolute time of t=99. 401 3. Advertisement: PE2 advertises RT-4, sent at t=100, with a target 402 SCT value of t=103 to partner PE1. 404 4. Timer Start: PE2 starts a 3 second timer to allow the reception 405 of RT-4 from other PE nodes. minor: IMHO, this is not a 3 second timer, but a timer with a deadline of t=103. Which is only at most 3 seconds, depending on whether step 4. happens exactly at t=100 or somewhat later. Practically, it would always be later. IMHO, it would be good to emphasize on this crucial benefit of the new mechanism. Maybe need to insert some addtl. processing delay into the section 8.5 example vs. this example to show this difference (delay between steps 3 and 4). 407 5. Service Carving Timer: PE1 starts the service carving timer, with 408 the remaining time until t=103 410 6. Simultaneous Carving: Both PE1 and PE2 carve at an absolute time 411 of t=103 413 To maintain the preference for minimal loss over duplicate traffic, 414 PE1 should carve slightly before PE2 (with skew). The recovering PE2 415 performs both DF to NDF and NDF to DF transitions per VLAN at the 416 timer's expiry. The original PE1, which received the SCT, applies 417 the following: 419 * DF to NDF Transition(s): at t=SCT minus skew, where both PEs are 420 NDF for the skew duration. 422 * NDF to DF Transition(s): at t=SCT minor: In line 238, the draft says "Upon receipt of the new BGP Extended Community" ... skew is being applied. Above text (line 419) instead defines application of skew upon determination of the state transitiom. It may be that in all cases where the BGP Extended Community is received, there is always only at most a DF to NDF transition (but no NDF to DF transition), staying at NDF), but it still is not ideal to have two inconsistent definitions when skew is being applied. Technically i think the DF to NDF transition case is more sound than the "receipt of the BGP extended community", aka: fix text around line 238 ?! 424 This split-behavior ensures a smooth DF role transition with minimal 425 loss. 427 Using the SCT approach, the negative effect of the timer to allow the 428 reception of RT-4 from other PE nodes is mitigated. Furthermore, the 429 BGP Ethernet Segment route (RT-4) transmission delay (from PE2 to 430 PE1) becomes a non-issue. The SCT approach shortens the 3-second 431 timer window to the order of milliseconds. 433 3.1. Concurrent Recoveries 435 In the eventuality 2 or more PEs in a peering Ethernet Segment group 436 are recovering concurrently or roughly the same time, each will 437 advertise a Service Carving Timestamp. This SCT value would 438 correspond to what each recovering PE considers the "end time" for DF 439 Election. A similar situation arises in sequentially recovering PEs, 440 when a second PE recovers approximately at the time of the first PE's 441 advertised SCT expiry, and with its own new SCT-2 outside of the 442 initial SCT window. 444 In the case of multiple concurrent DF elections, each initiated by 445 one of the recovering PEs, the SCTs must be ordered chronologically. 446 All PEs shall execute only a single DF Election at the service 447 carving time corresponding to the largest (latest) received timestamp 448 value. This DF Election will involve all active PEs in a unified DF 449 Election update. nit: I think the wording 444-449 is misleading/incomplete. The latest SCT timestamp is not the top critera, but if i understand the intent correctly, each "later" PEi also needs to be considered to be a better(best) DF than the prior PE, right ? Aka: In your below example (line 451ff), PE1 is DF When PE1 receives RT-4 from PE2, PE1 will redo DF calculation and consider PE2 to be the DF winner When PE2 later receives RT-4 from PE3, PE1 will redo DF calculation and now consider PE3 to be the DF winner. And only because PE3 is the DF winner, will PE1 now also cancel the SCT for PE2. If on the other hand, the DF HRW for PE3 would be lower than that of PE2, than PE1 would of course redo the DF election but given how PE3 does not show the result, this AFAIK should also mean that the SCT from PE3 should have no impact. Yes/No ? In any case it would be useful to improve the description to make this clearer. Especially if/when i misunderstood it. 451 Example: 453 1. Initial State: PE1 is in a steady state, with services elected at 454 PE1. 456 2. Recovery of PE2: PE2 recovers at time t=100 and advertises RT-4 457 with a target SCT value of t=103 to its partners (PE1) 459 3. Timer Initiation by PE2: PE2 starts a 3 second timer to allow the 460 reception of RT-4 from other PE nodes. 462 4. Timer Initiation by PE1: PE1 starts the service carving timer, 463 with the remaining time until t=103. 465 5. Recovery of PE3: PE3 recovers at time t=102 and advertises RT-4 466 with a target SCT value of t=105 to its partners (PE1, PE2). 468 6. Timer Initiation by PE3: PE3 starts a 3 second timer to allow the 469 reception of RT-4 from other PE nodes 471 7. Timer Update by PE2: PE2 cancels the running timer and starts the 472 service carving timer with the remaining time until t=105. 474 8. Timer Update by PE1: PE1 updates its service carving timer, with 475 the remaining time until t=105. 477 9. Service Carving: PE1, PE2, and PE3 perform service carving at the 478 absolute time of t=105. 480 In the eventuality a PE in a Ethernet Segment group recovers during 481 the discovery window specified in Section 8.5 of [RFC7432], and does 482 not support or advertise the T-bit, then all PEs in the current 483 peering sequence SHALL immediately revert to the default [RFC7432] 484 behavior. 486 4. Backwards Compatibility 488 For the DF election procedures to achieve global convergence and 489 unanimity within a redundancy group, it is essential that all 490 participating PEs agree on the DF election algorithm to be employed. 491 However, it is possible that some PEs may continue to use the 492 existing modulo-based DF election algorithm from [RFC7432] and not 493 utilize the new Service Carving Time (SCT) BGP extended community. 494 PEs that operate using the baseline DF election mechanism will simply 495 discard the new SCT BGP extended community as unrecognized. 496 [RFC7432] and do not rely on the new SCT BGP extended community. 498 A PE can indicate its willingness to support clock-synchronized 499 carving by signaling the new 'T' DF Election Capability and including 500 the new SCT BGP extended community along with the Ethernet Segment 501 Route (Type-4). If one or more PEs attached to the Ethernet Segment 502 do not signal T=1, then all PEs in the Ethernet Segment SHALL revert 503 to the timer-based approach as specified in [RFC7432]. This 504 reversion is particularly crucial in preventing VLAN shuffling when 505 more than two PEs are involved. 507 5. Security Considerations 509 The mechanisms in this document use EVPN control plane as defined in 510 [RFC7432]. Security considerations described in [RFC7432] are 511 equally applicable. 513 For the new SCT Extended Community, attack vectors may be setting the 514 value to zero, to a value in the past or to large times in the 515 future. The procedures in this document address implicitly what 516 occurs with a carving time in the past, as this would be a naturally 517 occurring event with a large BGP propagation delay: the receiving PE 518 SHALL treat the DF Election at the peer as having occurred already, 519 and proceed without starting any timer to futher delay service 520 carving. For timestamp values in the future, a rogue PE may be 521 advertising a value inconsistent with its local behavior. This is no 522 different than a rogue PE setting all its DF Election results 523 inconstently to its peers using (or ignoring adherence to) the 524 procedures from [RFC7432], and the result would similarly be 525 duplicate or dropped traffic. It is left to implementations to 526 decide what consists an "unreasonably large" SCT value. 528 This document uses MPLS and IP-based tunnel technologies to support 529 data plane transport. Security considerations described in [RFC7432] 530 and in [RFC8365] are equally applicable. 532 6. IANA Considerations 534 IANA maintains the "EVPN Extended Community Sub-Types" registry set 535 up by [RFC7153]. IANA is requested to confirm the First Come First 536 Served assignment as follows: 538 Sub-Type Value Name Reference Date 539 -------------- ------------------------- ------------- ---- 540 0x0F Service Carving Timestamp This document TBD 542 IANA should replace the field TBD with the date of publicaton of this 543 document as an RFC. 545 IANA maintains the "DF Election Capabilities" registry set up by 546 [RFC8584]. IANA is requested to make the following assignment from 547 this registry: 549 Bit Name Reference Date 550 ---- ---------------- ------------- ---- 551 3 Time Synchronization This document TBD 553 IANA should replace the field TBD with the date of publicaton of this 554 document as an RFC. 556 7. Normative References 558 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate 559 Requirement Levels", BCP 14, RFC 2119, 560 DOI 10.17487/RFC2119, March 1997, 561 <https://www.rfc-editor.org/info/rfc2119>. 563 [RFC5905] Mills, D., Martin, J., Ed., Burbank, J., and W. Kasch, 564 "Network Time Protocol Version 4: Protocol and Algorithms 565 Specification", RFC 5905, DOI 10.17487/RFC5905, June 2010, 566 <https://www.rfc-editor.org/info/rfc5905>. 568 [RFC7153] Rosen, E. and Y. Rekhter, "IANA Registries for BGP 569 Extended Communities", RFC 7153, DOI 10.17487/RFC7153, 570 March 2014, <https://www.rfc-editor.org/info/rfc7153>. 572 [RFC7432] Sajassi, A., Ed., Aggarwal, R., Bitar, N., Isaac, A., 573 Uttaro, J., Drake, J., and W. Henderickx, "BGP MPLS-Based 574 Ethernet VPN", RFC 7432, DOI 10.17487/RFC7432, February 575 2015, <https://www.rfc-editor.org/info/rfc7432>. 577 [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 578 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, 579 May 2017, <https://www.rfc-editor.org/info/rfc8174>. 581 [RFC8365] Sajassi, A., Ed., Drake, J., Ed., Bitar, N., Shekhar, R., 582 Uttaro, J., and W. Henderickx, "A Network Virtualization 583 Overlay Solution Using Ethernet VPN (EVPN)", RFC 8365, 584 DOI 10.17487/RFC8365, March 2018, 585 <https://www.rfc-editor.org/info/rfc8365>. 587 [RFC8584] Rabadan, J., Ed., Mohanty, S., Ed., Sajassi, A., Drake, 588 J., Nagaraj, K., and S. Sathappan, "Framework for Ethernet 589 VPN Designated Forwarder Election Extensibility", 590 RFC 8584, DOI 10.17487/RFC8584, April 2019, 591 <https://www.rfc-editor.org/info/rfc8584>. 593 Appendix A. Contributors 595 In addition to the authors listed on the front page, the following 596 co-authors have also contributed substantially to this document: 598 Gaurav Badoni 599 Cisco 601 Email: gbadoni@cisco.com 603 Dhananjaya Rao 604 Cisco 606 Email: dhrao@cisco.com 608 Appendix B. Acknowledgements 610 Authors would like to acknowledge helpful comments and contributions 611 of Satya Mohanty and Bharath Vasudevan. Also thank you to Anoop 612 Ghanwani and Gunter van de Velde for their thorough review with 613 valuable comments and corrections. 615 Authors' Addresses 617 Patrice Brissette (editor) 618 Cisco 619 Email: pbrisset@cisco.com 621 Ali Sajassi 622 Cisco 623 Email: sajassi@cisco.com 625 Luc Andre Burdet 626 Cisco 627 Email: lburdet@cisco.com 629 John Drake 630 Independent 631 Email: je_drake@yahoo.com 633 Jorge Rabadan 634 Nokia 635 Email: jorge.rabadan@nokia.com EOF _______________________________________________ BESS mailing list -- bess@ietf.org To unsubscribe send an email to bess-leave@ietf.org
- [bess] Iotdir telechat review of draft-ietf-bess-… Toerless Eckert via Datatracker
- [bess] Re: Iotdir telechat review of draft-ietf-b… Luc André Burdet
- [bess] Re: Iotdir telechat review of draft-ietf-b… Toerless Eckert