Re: [bess] Shepherd's review of draft-ietf-bess-mvpn-expl-track
Eric C Rosen <erosen@juniper.net> Tue, 16 January 2018 16:31 UTC
Return-Path: <erosen@juniper.net>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1DB7B1315E7; Tue, 16 Jan 2018 08:31:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a2ofyH5g5GsU; Tue, 16 Jan 2018 08:31:05 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E271131602; Tue, 16 Jan 2018 08:29:16 -0800 (PST)
Received: from pps.filterd (m0108161.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w0GGPmDb013737; Tue, 16 Jan 2018 08:29:14 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type; s=PPS1017; bh=A/N908lnjjbzyIcPIIzLdY5IkkrtQD6BIEPYOMwWgK0=; b=0KbVmLSIDRcIVwd6bBRPjk3C6QOAoOj9/aDsvkurhdJ/d6J29oij+AOOB0zo4JCHWqZE z5/SKTT/JV9uEWosyAACDRAkw3Zaq2UruFYkw7uY7jTVdqemC/ipxhJRDLxa8c+FFS7w Cjy0HsRfPkIzLfmgAo7zE9M38V8vvBwokYDFeU58+JxafNSIkZzavi902DhFCz+O48GN yKmbPasXg3Fx8if4CZROHZKbC33fMxn3uqxjeA2Sb6qAIlBTcWq3aI3xRNsklzchaPEp cya2JFD0HRwxwCynWxeiKk+jFwBDNlLGno2OiV1QCfShcgWVRLBN/1JnuybrCniCRX2e Ew==
Received: from nam03-co1-obe.outbound.protection.outlook.com (mail-co1nam03lp0015.outbound.protection.outlook.com [216.32.181.15]) by mx0b-00273201.pphosted.com with ESMTP id 2fhmj382mm-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Tue, 16 Jan 2018 08:29:13 -0800
Received: from [172.29.38.133] (66.129.241.12) by CY1PR05MB2300.namprd05.prod.outlook.com (10.166.192.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.428.9; Tue, 16 Jan 2018 16:29:10 +0000
To: stephane.litkowski@orange.com, "draft-ietf-bess-mvpn-expl-track.authors@ietf.org" <draft-ietf-bess-mvpn-expl-track.authors@ietf.org>
Cc: "bess@ietf.org" <bess@ietf.org>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>
References: <7712_1514984470_5A4CD416_7712_401_1_9E32478DFA9976438E7A22F69B08FF921EB01322@OPEXCLILMA4.corporate.adroot.infra.ftgroup>
From: Eric C Rosen <erosen@juniper.net>
Message-ID: <ecd0de7c-c395-2105-ab94-e1a9ca5381be@juniper.net>
Date: Tue, 16 Jan 2018 11:29:08 -0500
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
In-Reply-To: <7712_1514984470_5A4CD416_7712_401_1_9E32478DFA9976438E7A22F69B08FF921EB01322@OPEXCLILMA4.corporate.adroot.infra.ftgroup>
Content-Type: multipart/alternative; boundary="------------269282E6C4FBEFF74F908491"
Content-Language: en-US
X-Originating-IP: [66.129.241.12]
X-ClientProxiedBy: CY4PR1001CA0004.namprd10.prod.outlook.com (10.171.218.145) To CY1PR05MB2300.namprd05.prod.outlook.com (10.166.192.146)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 3ba2a0db-6e5f-4ca7-a3e6-08d55cfe4684
X-MS-Office365-Filtering-HT: Tenant
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(48565401081)(2017052603307)(7153060)(7193020); SRVR:CY1PR05MB2300;
X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2300; 3:euGQC9RMrQfint70FMKT/APgCjceTQ19Rl/QlhnaEPzr1vwPzkBcABAp16nfb/mytnAeYXLSz6VUC5NIz4K4tE7kl2DVcB1bUgJLMfWZaHUUuQCVexyqFKDeTK0+RXoGB6q91uzVVxSulOTESkiv3b1sOoRSdqTrHY48duifo6MO55M6xG+XpzBoR+ZNvBjMutZi7h/FYAMN6ib5HPsFP9KUbA6NfB6oEjVTzi95ESBhkpGkJHuYKR9WzWxezUgb; 25:C1BrNI4faz5KuPwFZxchE+id2LwqYnQj+QUqVR0Yg73z2xPah4bENzqM+rMtmkANZYQQ+2Yrz0JJr7htE4BxwgU2baWoFZU8hUrgIHG9oFzHcWIleymkIhmwIS1fPfd/ISCwFuIU0iqtkaQIYYAek2ykGCXvefT/kzRsGcuUcgrpCFW8Pao3Y9d19SuKZeoSy5zERm0dq/nq8XY6n7yiO4iSv5PRQ0EHg6iAL32KHELrrDEdC/yDjTZGmYUH9ObaYR7yykYOabZhhsF0pcDqQ8RQpqG+78ejeZAm5TJ4y9lylRtT0gdXjVmg49/uSOwc8tBdXRDkLUl9hKSE7jrHzw==; 31:GYxr9xsIy9SGW20oV6nHSUncUz7x08reI2um+6iJOMhPwq+7fywQ+rl1M/E15NKXjG/WDolDPFSlSKWcdDGjAfB+zkDUwgnANmeC8jjQdcMDuKbfzOnjF6FJn9KbRh2eAE0DoMF3es0kIOcsLwWTj8/ayQgfZ+d4Bw2Tv5DgWtULECS5Qo3CpP2xrbbXPo4xSoHDLUIJAJnl/EnD4PIkpX1eMEEntnyLbwcIk0a+6+k=
X-MS-TrafficTypeDiagnostic: CY1PR05MB2300:
X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2300; 20:wM10dg1ncCjXnWhGE6pnRNlI4iRugbiJh0/oidfkOIiZcOAlekEw6NiSl/y5/MKWF8mlr6ECCGzijK8CuCePGA4t9mSB8ccFpKm7DBRIY5/ipwy28LI+GpfI3JYfxJESz3R82sQZljGad9nS2KcwFaMczzJd2tJyk+MgohERSW2b1/mYz+EFfPiu6y81nsk3jfqbuVHP3JevDyH/heCPpSSxd3U3HAmHkHGWt4t6F7peS8QoDFvAdlcL8QMSeYEsoD32oR7wI8NBxVnhaIaq0JpkY7TfE3/3lnXPQYhuN8drcNVv1bv2q5/ytfhoAPfwz8m0+Im+XvItlC9Q0BHl9YG76c3+xlQZr+6Q1S24bxCVsQ/4IAm/nW441RLQd0lXfHd4KazBCmUE3uRv42UVOGeK2LFP2hkOfoqLgrw+GdTnqcX8tOecVpBPrG7MVs6NiqXFhexeBgy7VyJibgJo+XS/+hiDLfcrZimgiX2VFw/RhMBd8j7TXvIU//3rI7KxYOum6meUMZsmgUVKwP7+bNciw9ofDPsHbLL/5ZErcB6bFOFSEAOizpGAVhRlf1liU56Wiz5L8dgRpV3S0U3XMCdl0fIX3wKEOPve2IJCo1c=; 4:jaBZeWP7jdirjHVZlKYtYkF66E8CpUuekQe/49QxVl+bPotQC2VopYiFV1UybW4YlCzr+KdCi2pEqM0Q+E6yZrIcpFf8Hx0Wx3TzBBBchc48pq+pbxDShqlJ1B9WeKeYqT/Py9Yyj6SoWVWOITtTm9A1c+MYBYM9H+c2iCRdd0zItZ2Jas1mb3Tc2csuKgHaUk06CqMqW3HWTjSBJeIJ4gw0qZRhesyJLl0Nv6xnfWlBYwAoKGnso9thkWkxy29DuWZlkvuUX5NA8w1ccJ402OPckqCj3Cp9jy65I10ybLrNR/zUr3XD7MulrqGmk/CL
X-Microsoft-Antispam-PRVS: <CY1PR05MB230048818BAF38EE6098B4D9D4EA0@CY1PR05MB2300.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(18271650672692);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040470)(2401047)(8121501046)(5005006)(3002001)(93006095)(93001095)(10201501046)(3231023)(944501161)(6055026)(6041268)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123562045)(20161123560045)(20161123564045)(6072148)(201708071742011); SRVR:CY1PR05MB2300; BCL:0; PCL:0; RULEID:(100000803101)(100110400095); SRVR:CY1PR05MB2300;
X-Forefront-PRVS: 0554B1F54F
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(6049001)(366004)(396003)(39380400002)(376002)(346002)(39860400002)(189003)(43544003)(24454002)(199004)(51444003)(76176011)(59450400001)(53546011)(316002)(386003)(68736007)(105586002)(8676002)(8936002)(106356001)(52116002)(64126003)(65806001)(65956001)(230783001)(81166006)(81156014)(5660300001)(2501003)(2906002)(84326002)(6116002)(790700001)(3846002)(66066001)(86362001)(6246003)(236005)(54896002)(53936002)(25786009)(53946003)(3260700006)(2950100002)(4326008)(561944003)(65826007)(6916009)(31686004)(77096006)(6486002)(229853002)(90366009)(478600001)(26005)(16576012)(83506002)(97736004)(37036004)(54906003)(58126008)(16526018)(36756003)(16586007)(31696002)(7736002)(579004)(559001); DIR:OUT; SFP:1102; SCL:1; SRVR:CY1PR05MB2300; H:[172.29.38.133]; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
Received-SPF: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2300; 23: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
X-Microsoft-Exchange-Diagnostics: 1; CY1PR05MB2300; 6:kuZDJ7H7p2dhM54UQnkjOWTpU3vFu+TfeT66X4yWy993CHI0MLFywUEQj4EKBHyU3kkJQPY4Ijd0y/+HMTJOn6zl2Dm5XBVhuwKKtqeCMWt0vG1Yc5XNFX+tfKtU2yMmS30Rt+OAuAI+aDK+vpNL/nh5KTb+PgilRkElDqigIw3oM4XIcXE7l0yzjORuvX0J66mdo8qpoyyOa7B9RyHb+FipuRL6PLkjgvFRKGA7PFUhrCUeJvfAUXSO42prgnOMitSgkporhamNnzjeDmYFxZh4+zq7J1XRZRUaxRdpPYQeLDrEzIuBaVzuBDxzICOLbnTPdTX2TdNVjny8s/FWL04ITSeKsFxyXiX7/o1GEKI=; 5:ArokKThNzRJbQedQgMwYqZ/Dqo75+Wmz0JG9RIxyNMyVaieH5RT2zhv67Mvpfzr1O0ybJVoUnhY536HZ1x6HorasvKWFSgLJu1434nvVL7PmtVu6mOctsApVM/paMDptdrVNODb7uoZjVVBQ86aCzrSCyaQt1viDyCmPO4LAWAI=; 24:mBwCBcQPC+HL+t/EyVS/KXWdn7lDEWuQfeceWWBAWPzZKD5qApbU0UCGT+w7sVpxVjch3YctnHdMJruzOYNOb1vZp0Ww4G0bEmbbyOSJ8es=; 7:oAlY7bbRL11TSe6/AgWac79eO+ZkGP2csNACLkQfUsnGTo63VfcD7QEs5oqZADPuuZpgqdtUsbiWnukmrrX7RA3qWNvtUOH84zLZpIUUn6INjRyiqDHylJOuT544PQBdwSmm3Q+MdQFpUu9HDtOClwyIhFERgjtZ7wcFv6ibDaXmUd7sC0UQ1apdEnHiABxDk9AHIn1H8E8CL3nuS8xbLwRQ1XbCgIX7oXVUaX8zaZpvbW0H/4641g64rsvvVGGe
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Jan 2018 16:29:10.9057 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 3ba2a0db-6e5f-4ca7-a3e6-08d55cfe4684
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR05MB2300
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2018-01-16_05:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1801160229
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/Ke1NRlUc840v6SFmt3THTyuzwvU>
Subject: Re: [bess] Shepherd's review of draft-ietf-bess-mvpn-expl-track
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Jan 2018 16:31:14 -0000
Thanks for your review. I have posted revision -04 which I believe addresses your substantive comments. On 1/3/2018 8:01 AM, stephane.litkowski@orange.com wrote: > > Hi, > > As shepherd of this document, please find below some comments that I have: > > Overall comments: > > -Please add a section that contains all the abbreviations expansions: > that may help non expert people to follow the acronyms without looking > for the first reference in the text. > This is not generally required of an RFC. > -I usually like figures. For the intro, it may be wonderful to build a > figure that reminds the existing S-PMSI/Leaf A-D procedure. So without > reading the text, we can remember how it works. > > -The interAS case may also be better with a Figure and an example (or > couples of). > This seems like a matter of taste. Admitedly, I'd probably like figures more if I had any skill in producing them ;-) > Introduction: > > “By originating one of these BGP routes, an ingress node advertises that > > it is transmitting a particular multicast flow.” > > [SLI] Is “is transmitting” correct ? Can’t we have situations where an > S-PMSI route is/was advertised but no traffic is flowing (no yet > started or switched, or stopped). > Fixed. > “Now > suppose that the ingress node wants explicit tracking for each > individual flow that it transmits (following the procedures of > [RFC6625] on that P-tunnel.” > [SLI] Missing “)” Fixed. > “This allows the > ingress node to determine the set of egress nodes that are receiving > flows from the ingress node.” > [SLI] I think the Leaf A-D tells that there is a receiver interested > by the flow, but does not tell that it actually receives it. Correct; fixed. > “ Howver, this procedure requires several clarifications:” > [SLI] There is a typo s/Howver/However/ Fixed. > “The procedures of [RFC6625] do not clearly state how to handle an > S-PMSI A-D route if its NLRI contains wild cards, but its PTA > specifies "no tunnel info".” > [SLI] I quickly ran over RFC6625, it does not mention anything on > explicit tracking or Leaf A-D routes.So we assume that RFC6513/6514 > only applies here. RFC 6625 specifies the handling of wildcard S-PMSI A-D routes, but did not consider the case where the S-PMSI A-D routes do not carry a PTA. This document corrects that. > “ * The explicit tracking procedures do not allow an ingress node > to "see" past the boundaries of the segmentation domain. > This particular problem is not further addressed in this > revision of this document. > “ > [SLI] Do you plan to address it ? Or do we now consider it as out of > scope ? I think this is actually addressed in Section 5.3, so I've removed the remark. > Section 2: > “Prior specifications define one flag in the PTA, the "Leaf Info > Required" (LIR) flag, that is used for explicit tracking.” > [SLI] Please point to the right reference Fixed. > “If the LIR-pF flag is set in a given PTA, the LIR flag of that PTA > SHOULD also be set.” > [SLI] Why not using a MUST ? If all the PEs support the LIR-pF flag, the procedures will work as intended even if the LIR flag is not set. So I don't think a MUST is appropriate. > “one forces a > a response to be sent an egress node that does not support LIR-pF” > [SLI] Is there a missing word like ‘sent by an egress node” ? Fixed. > Section 3: > > “The definition of "match for reception" in [RFC6625] is hereby > modified as follows:” > [SLI] Please point to the section that you are updating. > In addition, section 3.2 of RFC6625 contains multiple if then else > conditions for each cases (C-S,C-G) and (C-*,C-G). Please give some > precision in where do you want to insert your new statement in this > processing sequence. I guess it is at the beginning. I tried to make this clearer. > “When finding the "match for reception" for a given (C-S,C-G) or > (C-*,C-G), ignore any S-PMSI A-D route that has no PTA, or whose > PTA specifying "no tunnel information".” > > [SLI] I would be in favor to introduce a normative statement here. > Fixed. > “We also introduce a new notion: the "match for tracking". This > differs from the "match for reception" as follows:” > [SLI] It would be better to give a definition of the “match for > tracking” before giving the rules. Here you’re explaining only the > rules, not the difference in the meaning. Wouldn’t it be easier to > tell that the implementation MUST consider only the S-PMSI A-D routes > that have a LIR flag and/or LR-pF flag set and then run the same rules > as the RFC6625. Why do you want to have S-PMSI routes with PTA and LIR > unset in your route list for “match for tracking” ? You need to take > care here on your text proposal as one of your previous statement > updates the RFC6625 and the match reception procedure, so the rules to > be applied are the original one from RFC6625 and not the updated one. IMO, the clearest way to express this is to give the rules and then illustrate with a couple of examples. > “ Also note that if a match for tracking does not have the LIR flag or > the LIR-pF flag set, no explicit tracking information will be > generated. See Section 5.” > [SLI] Again I do not see the value added of keeping such route as a > match for tracking as there is no tracking requested. As the terms are defined, there is always a "match for tracking" route for each flow. If tracking is not requested, this route will have LIR and LIR-pF clear. There are no unnecessary routes. > Section 4: > “Such a route could be an > I-PMSI A-D route, a (C-*,C-G1) S-PMSI A-D route, a (C-S1,C-*) > S-PMSI A-D route, or a (C-*,C-*) S-PMSI A-D route. “ > [SLI] Is per flow explicit tracking also required for I-PMSI ? I do > not see it listed in the goals of the doc ? The goal was to address > wildcards S-PMSI AD routes. The above simply says that some route must specify the tunnel on which the (C-S1,C-G1) is to be transmitted, and that this route could be an I-PMSI A-D route. > “Further, if the ingress node originates a wildcard S-PMSI A-D > > route carrying a PTA specifying the tunnel to be used for > > carrying (C-S1,C-G1) traffic, and if that PTA has the LIR-pF bit > > set, then explicit tracking for (C-S1,C-G1) is requested by that > > S-PMSI A-D route. Thus the ingress node SHOULD NOT originate a > > (C-S1,C-G1) S-PMSI A-D route whose PTA specifies "no tunnel > > info"; such a route would not provide any additional > > functionality.” > > [SLI] I do not fully understand this text in the context of your > procedure 1. which deals with an origination of an (C-S1,C-G1) S-PMSI > A-D route (no wildcard). As I understand the procedure for the > wildcard is defined in 2. > This just says that there's no point in originating S-PMSI(C-S,C-G) with LIR set if you've already originated S-PMSI(C-*,C-G) with LIR-pF set. That seems to be an appropriate bit of advice. > “2. The following procedure can be used if (and only if) it is known > > that the egress nodes support the optional LIR-pF flag.” > > I have some issue with this sentence. It does not seem to be normative > as there is no normative statement. However I understand it as a > critical thing (“and only if” !) so it may require at least a SHOULD. > Then the issue I see is that this knowledge does not come from the > protocol, so it sounds important to me to highlight the impact of a > mistake. > BUT, reading the section 5. I understand that it is not as critical as > it seems as the receiver will ignore simply the LIR-pF flag and apply > the standard procedure (LIR set). > Please clarify the criticity to have or not this knowledge. I added some text saying that procedure 2 may yield unexpected results if not all the PEs support LIR-pF, and that the procedure SHOULD NOT be used in that case. > “ To terminate explicit tracking that has been initiated by an > > S-PMSI A-D route whose PTA specifies a tunnel, the ingress node > > re-originates the route without the LIR flag set” > > [SLI] Do we also need to clear the LIR-pf ? It would make sense to do so. > Fixed. > “If the match for tracking has LIR set and if either (a) the > > egress node does not support LIR-pF, or (b) LIR-pF is not set, > > then the egress node must respond to the match for tracking, > > following procedures specified in other documents for the case > > where LIR is set.” > > [SLI] Please state the relevant document references here. > In the case described above, the handling of the LIR flag is not modified by this document. I don't think it is necessary to cite a specific set of documents that discuss the LIR flag. > Section 5.2 > > “Note that, per RFC4364, every RD begins with a two-octet type field > > that is either 0, 1, or 2. By adding 16 to the second octet of the > > RD, we force the type field to be 16, 17, or 18. “ > > [SLI] It works but we may need to ensure that the types > 16 cannot be > used anymore by new applications. > There is a registry for the Route Distinguisher Type field. Only types 16, 17, and 18 are defined here, other values are still available. > Moreover if new RD types are created, new siblings will have to be > created. > Your point is correct, but there hasn't been a new RD type in 20 years. The draft shouldn't really say "add 16", it should just point out the new types. > Wouldn’t it be easier to set the MSB of the RD type to 1 ? so we only > lock half of the type space. > I think it is easier to use three new type values than to turn one of the bits into a flag. > Or what could be the impact of using the RD of the local VRF of the > egress node ? > The RD of the Leaf A-D route needs to be derived from the RD of the S-PMSI A-D route that elicits it. Otherwise the ingress node receiving the Leaf A-D route will have diffculty matching it to the corresponding S-PMSI A-D route. > Section 5.3 > > “In the case where the egress > > node is not a PE, but rather an ABR or ASBR, it will not know whether > > it needs to receive a given flow unless it receives a Leaf A-D route > > whose NLRI specifies that flow and whose IP-address-specific RT > > specifies an address of the egress node.” > > [SLI] The sentence works but when reading it I needed multiple reread > to understand that the “IP-address-specific RT > > specifies an address of the egress node.” was referring to the > ASBR/ABR and not the receiver PE. > > Do you mind using “this egress node” or “this ABR/ASBR” ? > I tried to clarify that. > Section 8. > > [SLI] Do we have counter-measures against such “attack” ? Ingress PE > dropping ? > I consider the specification of such counter-measures to be outside the scope of the document. > Section 9.2 > > I think RFC7524 needs to be referenced as normative giving that its > knowledge is required to understand section 5.3. > I'm not sure that RFC7524 should be a normative reference, as this draft does not require segmentation at the ABRs. However, since RFC7524 is already published, there's no harm in adding it to the "normative references" section. > I think that section 5.3 is also updating/complementing the procedures > in RFC7524 with the “no-tunnel info” case. > There don't seem to be any clear and objective criteria for determining whether one document "updates" another.
- [bess] Shepherd's review of draft-ietf-bess-mvpn-… stephane.litkowski
- Re: [bess] Shepherd's review of draft-ietf-bess-m… Eric C Rosen
- Re: [bess] Shepherd's review of draft-ietf-bess-m… Eric C Rosen
- Re: [bess] Shepherd's review of draft-ietf-bess-m… Dolganow, Andrew (Nokia - SG/Singapore)
- Re: [bess] Shepherd's review of draft-ietf-bess-m… stephane.litkowski
- Re: [bess] Shepherd's review of draft-ietf-bess-m… Eric C Rosen
- Re: [bess] Shepherd's review of draft-ietf-bess-m… Eric C Rosen
- Re: [bess] Shepherd's review of draft-ietf-bess-m… stephane.litkowski
- Re: [bess] Shepherd's review of draft-ietf-bess-m… stephane.litkowski