[bess] Re: [Shepherding AD review] Pre-IETF Last-Call review of draft-ietf-bess-evpn-virtual-eth-segment-15

"Ali Sajassi (sajassi)" <sajassi@cisco.com> Sun, 03 November 2024 20:40 UTC

Return-Path: <sajassi@cisco.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A11AC14F5F5 for <bess@ietfa.amsl.com>; Sun, 3 Nov 2024 12:40:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.741
X-Spam-Level:
X-Spam-Status: No, score=-9.741 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.148, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_PERMERROR=0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gmBYUcFKaqkj for <bess@ietfa.amsl.com>; Sun, 3 Nov 2024 12:40:27 -0800 (PST)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 168DDC14F6F0 for <bess@ietf.org>; Sun, 3 Nov 2024 12:40:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=101654; q=dns/txt; s=iport; t=1730666427; x=1731876027; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=FNygwWfHgWh9Pb5zJD5PGXD9K8VSZlaE9QXUnWLuH68=; b=VZfdnyNxW7uAjx9pSPI7il13sgM7aV59+foR7ltcIUQwRlDMM40Jps1g 1R4mbzdG3UY6FgyfGusyutcIlrY7o65EijbTn3iecx+WOS234xrAeIZH5 J2yb8L5j59yW/sow0CEA8H8JC8Xzptr4nEk4JBD7qpGt7OMM0nwT0Erux g=;
X-CSE-ConnectionGUID: I/02UvvaQausBeBCdzooAg==
X-CSE-MsgGUID: k7IfmE7zTZaXdGxZJzoFXw==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:kPeSZBSY6EWtpBdJfY+4z7D22tpso47LVj580XJvo7tKdqLm+IztI wmFo/5sl1TOG47c7qEMh+nXtvX4UHcbqdaasX8EeYBRTRJNl8gMngIhDcLEQU32JfLndWo7S exJVURu+DewNk09JQ==
IronPort-Data: A9a23:COxeyaxYErAG+F/TAtZ6t+dJxirEfRIJ4+MujC+fZmUNrF6WrkUDz TMdX2vUPPiMZzahL49+btng9EsOsZTdyNY3HQpl+1hgHilAwSbn6Xt1DatR0we6dJCroJdPt p1GAjX4BJlpCCKa/FH1a+iJQUBUjcmgXqD7BPPPJhd/TAplTDZJoR94kobVuKYw6TSCK13L4 IqaT/H3Ygf/h2ctajlMscpvlTs21BjMkGJA1rABTagjUG/2zxE9EJ8ZLKetGHr0KqE8NvK6X evK0Iai9Wrf+Ro3Yvv9+losWhRXKlJ6FVHmZkt+A8BOsDAbzsAB+vpT2M4nVKtio27hc+adZ zl6ncfYpQ8BZsUgkQmGOvVSO3kW0aZuoNcrLZUj2CCe5xWuTpfi/xlhJGBxZdcl5Ph+OGhT7 tYVAhsBfBeEru3jldpXSsE07igiBMDvOIVavjRryivUSK58B5vCWK7No9Rf2V/chOgXQq2YP JRfMGQpNU+RC/FMEg9/5JYWh+6qj2LkchVTqUmeouw85G27IAlZi+e9aoGPKozVLSlTtkXHh 2zD0jvrPiMTBNCw2Qin4HWCtvCayEsXX6pJSeXnraQ16LGJ/UQZBQYNfVq2vff/jVSxM++zM GQd/i4o6Kx3/0uxQ5ylBVuzoWWPuVgXXN84//AGBB+l6+2MuTuHGGE9RyNaQtEMn8MkQjsD2 Qrc9z/2PgBHvLqQQHOb076bqzKuJCQYRVPugwdaEGPpBPG9/OkOYgLzczp1LEKiYjTI9dDML 9Ki8HhWa1Y71JJjO0CHEbbv2WPESn/hFVVd2+kvdjj5hj6Vnab8D2BS1XDV7OxbMKGSRUSbs X4PlqC2tb9VVczSznfRELhQR9lFAspp1hWC2DaD+LF8p1yQF4KLJNE4DMxWfR0wa51VI1cFn meO518Lufe/w0dGnYcsPtruUJ51pUQRPd/kTfvTJsFfeYR8cRTP/SdlIyatM5PFziARfVUEE c7DK66EVC9CYYw+lWbeb7lGi9cDmHthrV4/sLinlHxLJ5LCPybNEd/o8TKmMogE0U9ziF+Pq 4sHZprXkUg3vS+XSnC/zLP/5GsidBATLZv3sMdQMOWEJ2Jb9KsJUpc9HZtJl1RZoplo
IronPort-HdrOrdr: A9a23:KsJOUaguDBsdMlACA8gW3IhEFXBQX5x23DAbv31ZSRFFG/FwyP re/8jzhCWVtN9OYhAdcIi7Sda9qBPnmaKdkrNhQ4tKPTOW9FdAQ7sSlrcKrweQfxEWs9QtqZ uIEJIOR+EYb2IK9/oSiTPQe71Psbv3lZxAx92uskuFJjsaDZ2Imj0JcjpzZXcGPTWua6BJc6 a0145snRblU3IRaciwG3kCWMb+h/CjrvjbSC9DLSQKrC2Vgx2VyJOSKXWlNxElPA9n8PMHyy zoggb57qKsv7WQ0RnHzVLe6JxQhZ/I1sZDLNbksLlVFhzcziKTIKhxUbyLuz445Mu17kwxrd XKqxA8e+xu9nLqeH2vqxeF4Xih7N9u0Q6g9baruwqnnSXLfkN/NyOHv/MfTvLt0TtjgDi76t MM44vWjesPMfqKplWN2zGBbWAbqqPzmwttrQbW5EYvCrf3r9Rq3NQi1VIQH5EaEC3g7oc7VO FoEcHH/f5TNUiXdnbDowBUsZeRt1kIb167q3I5y4So+ikTmGo8w1oTxcQZkHtF/JUhS4Nc7+ CBNqhzjrlBQsIfcKo4XY46MIaKI32IRQiJPHOZIFzhGq1CM3XRq4Tv6LFw4O2xYpQHwJY7hZ yEWlJFsmw5fV7oFKS1rdd22wGIRH/4USXmy8lY6ZQ8srrgRKDzOSnGU1wqm9vImYRoPiQaYY fFBHt7OY6WEYK1I/c64yTuH51JbWITWMcJutA9QTu107H2w6XRx5nmTMo=
X-Talos-CUID: 9a23:Uuda+W+WQVcEUzTV3hqVv29TQpoYbGPU9X7NOGW1I01lWrqSYFDFrQ==
X-Talos-MUID: 9a23:dXbCFgwAnnGZprof7PHZGRLOr8KaqKfxKU4IvMoUh/uNBSBfKwW/njOZcpByfw==
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-l-core-02.cisco.com ([173.36.16.139]) by alln-iport-1.cisco.com with ESMTP/TLS/TLS_AES_256_GCM_SHA384; 03 Nov 2024 20:40:25 +0000
Received: from alln-opgw-2.cisco.com (alln-opgw-2.cisco.com [173.37.147.250]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by alln-l-core-02.cisco.com (Postfix) with ESMTPS id 6719018000194 for <bess@ietf.org>; Sun, 3 Nov 2024 20:40:25 +0000 (GMT)
X-CSE-ConnectionGUID: j+u95oBWTnG6wo8L/qR5oA==
X-CSE-MsgGUID: hJXmdTBoTuOcMzcRK1hNCg==
Authentication-Results: alln-opgw-2.cisco.com; dkim=pass (signature verified) header.i=@cisco.com
X-IronPort-AV: E=Sophos;i="6.11,255,1725321600"; d="scan'208,217";a="14782506"
Received: from mail-bn7nam10lp2045.outbound.protection.outlook.com (HELO NAM10-BN7-obe.outbound.protection.outlook.com) ([104.47.70.45]) by alln-opgw-2.cisco.com with ESMTP/TLS/TLS_AES_256_GCM_SHA384; 03 Nov 2024 20:40:24 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=UQg+A3pPSWY//vnrSg4yJ3rR0MFH59NMQRrNBg0wZVS1WPolBR6RyjFsJ2NQlR+B8w7BqaCvJmmsa/zb1DzpB84CJzSsQLGiVf+4uEuIpsJ72exsgzJkAXB+9SlszEIjpKAemeyj3/HGSEPqncX94zHB4q631W6cJZPLbTD3cWtaNyd7mPH7/aagAEf20VT+E/j6Va7yg82QDbyjn8yXATqBOCMd3GPoEzD64waurlElbzzwF0OfvYSWw9PUrqkx0/aIurcJZ8zVAbVxPVC7CvdCjk35YrBtwgqxVZWQ3URxJs8aGEtjDyfvGKh9Qy/yVfkU9D3lXnatZMLHIeIa+w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=FNygwWfHgWh9Pb5zJD5PGXD9K8VSZlaE9QXUnWLuH68=; b=GOur0Fl3QhWQEBHd5HuX1obR7uh2yrrcd1mD34UBGyENn322xQUSOCYsdznFhnFtZYGBhZeAueCt38kPVYF4wN2NlA8mYR+Yrm2If4ovX+hm5Q2+ipGuUGI2BtkUrRVMbPWvT3mleUcRhytQF2WaeKX0YzxhomEhXN0eC5h7LsgRRK/rup94z4IDvG8ZBoMwxK6c0teteTyXxYvbKIEuQeA0GFivHbwZ96qWc8bwn10qZaXJWZBJvAquPbgTpNJaOkH8vzM58GWw8K168jhSpvsu4E9OcKxFC+0PvEw06p+dEmvovJ6MVDMtK0YEGo6txidFST++esNfUn6kGUQUNQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from SJ0PR11MB5770.namprd11.prod.outlook.com (2603:10b6:a03:421::6) by CH3PR11MB7274.namprd11.prod.outlook.com (2603:10b6:610:140::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8114.30; Sun, 3 Nov 2024 20:40:22 +0000
Received: from SJ0PR11MB5770.namprd11.prod.outlook.com ([fe80::6380:de9d:7f00:e9ea]) by SJ0PR11MB5770.namprd11.prod.outlook.com ([fe80::6380:de9d:7f00:e9ea%5]) with mapi id 15.20.8114.020; Sun, 3 Nov 2024 20:40:21 +0000
From: "Ali Sajassi (sajassi)" <sajassi@cisco.com>
To: "Gunter van de Velde (Nokia)" <gunter.van_de_velde=40nokia.com@dmarc.ietf.org>, 'BESS' <bess@ietf.org>
Thread-Topic: [Shepherding AD review] Pre-IETF Last-Call review of draft-ietf-bess-evpn-virtual-eth-segment-15
Thread-Index: Adq48z/HWZvqCSpZS+KOnCnuCb288BuRe6Ci
Date: Sun, 03 Nov 2024 20:40:21 +0000
Message-ID: <SJ0PR11MB57702CFF879262B8DBCDC4FCB04F2@SJ0PR11MB5770.namprd11.prod.outlook.com>
References: <AS1PR07MB8589545FFAC1BB0B285ED21DE0FB2@AS1PR07MB8589.eurprd07.prod.outlook.com>
In-Reply-To: <AS1PR07MB8589545FFAC1BB0B285ED21DE0FB2@AS1PR07MB8589.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-reactions: allow
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SJ0PR11MB5770:EE_|CH3PR11MB7274:EE_
x-ms-office365-filtering-correlation-id: a845dbb6-d1c2-4e8f-7a91-08dcfc47bc86
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|10070799003|366016|376014|1800799024|4022899009|8096899003|38070700018;
x-microsoft-antispam-message-info: zSuEe1+H4Dd8OXxCQMiypOhIaZjyBpNSHXstbaneQvBcHb5aART+zj6gqgulckd0kHDVcW6SSpSTyG+pST1981qW83PnI8NhTnWV/lKXye0ugC3L8KRiSyJd8CKKHJvxkshO67h8F/cE9Jsvh3UfJw+vImRCsGiNVaTir5D3Dsx7obRAmZegWGA1Pm5apOZ604POn/b4OfREsvB6/aFKcC7ohorhVJF1qda9YKrJTkd5FgfYegcWaVH/yLRFjoBtVqJ7ydU4QnNh5NFp7NS1eWp6s+NCqCLcYmAAnXbIy+8eEGx6fr4UNASe1i0kWskZ0nbMlvd9HWHQFEx665bzDkHAsRWLNFe3at6qHTooGDaOhjskpFvxb3pDRXb0O/0BiePL3lA/trspczo12TSM/5NcB7/NJI93b8gtp7NaSzenDB4vgPVONVG7ed2kwBLWS5NxfLkWeV04k6iWkKsQvYct+sRDuTvIqzSpRfcQD59Kw3jzQe5yOoMFaSe8BO15fXA7y6j/Dp3rGdXbf8zDX2NmjMKErlHTcZviOSc7NstOeXteiXIsCWVt3VqzS5yRJvcxejQ1To2xPh7KdrAPLY5nafYr14YbBPLXSIa6TGfxgeCCtWdvwPU2PBtVyOEixvmv5Rri6dpNv8ecahfTvN9L92V7J/33c+v5rD2L2gMtf3H0rBxDMgdmS+6sGnuTg2HbrtcvMnv2LD7SCuE+J/bvDUdUj3Fk4CcQW2avOMQ962zGujc3wblwx1xFl9mRUKt/NYgg1B2z8vN1sD3LAfqCSHKWzYmqlctb9YN0EWw8KK4V7fjgLA6WdIZExM1Ip4GK4eh9pMi6Ffv2azfrNDVWB11YDG/MVOesZzVAVhXMB0XkkOHY/HUipJdihrfm1icfJo3USvolLbfeX8cx/qhOgEjDtJix5C4D/8b+pQgXD86m5jhtyxn6KSx7n37rajUrImZRUZnLkUlPohLh953KGBmQ7uNohDdrR5aQntimKSNgoFxWlB2FglKasOtUzGSNFKOA00aTth9kdGByuX2T6EtjKpmBnf3YOrOBREcqacuPG12D4uUkAWVEnv2pt0rBUM5MZuemWRojezJd76T4P76qpEos2X6hQf+TYLGIwSVyOp0esRkqI2uxImZaKEaSTEBTtHcy8s6C4YO6c5V5oW1/wI8McnEMDPcc9eVcccfuxCckbwQ1yliB5nwEe5CuFRqXAz2pC6nPTkUM+b/EsB722SidcCC6emmjbvE5LaXxhkSGLlkD2Navz8TdP6ylNPKKZjtFaSKyqJa1e3YIV11QUoy88QkhDttNUMK1Sj4GjRQrk6IvVSZSKUzR4e1XiR72mH9d0Z4MVg+yRkcYHMgwOSO1xPZbjS/T6gbjkg5g2Vxk2TGsg/an3Gwj
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ0PR11MB5770.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(10070799003)(366016)(376014)(1800799024)(4022899009)(8096899003)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_SJ0PR11MB57702CFF879262B8DBCDC4FCB04F2SJ0PR11MB5770namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5770.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a845dbb6-d1c2-4e8f-7a91-08dcfc47bc86
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Nov 2024 20:40:21.5415 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: fvBnI+qJvCohMhhKYzqJsssg9uxGOCII7GNEjJaEehPzmggVrZtUi1orn1or0Jf3np/KgHcFCU+AT2+zx3sngg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR11MB7274
X-Outbound-SMTP-Client: 173.37.147.250, alln-opgw-2.cisco.com
X-Outbound-Node: alln-l-core-02.cisco.com
Message-ID-Hash: F3XK6OLFQDCRWUL755R5LGU6G3OYTRMA
X-Message-ID-Hash: F3XK6OLFQDCRWUL755R5LGU6G3OYTRMA
X-MailFrom: sajassi@cisco.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-bess.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [bess] Re: [Shepherding AD review] Pre-IETF Last-Call review of draft-ietf-bess-evpn-virtual-eth-segment-15
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/LruCpC4_R_27UhPXQW-6FEvx0vg>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Owner: <mailto:bess-owner@ietf.org>
List-Post: <mailto:bess@ietf.org>
List-Subscribe: <mailto:bess-join@ietf.org>
List-Unsubscribe: <mailto:bess-leave@ietf.org>


Hi Gunter,

Thanks very much for your review and combing through the document and providing helpful comments specially for both clarification and improving readability. I have incorporated all of your comments (please refer to my resolutions below for details). I have also checked in the latest version(Rev 16).

Considering that vast majority of the changes (if not all the changes) since the last WGLC have been for clarification purposes and improving the readability of the document, I am wondering if we need another WGLC? The document passed WGLC and sent to the IESG for “Publication Requested” on 2021/9/27.

Regards,
Ali

From: Gunter van de Velde (Nokia) <gunter.van_de_velde=40nokia.com@dmarc.ietf.org>
Date: Friday, June 7, 2024 at 9:08 AM
To: 'BESS' <bess@ietf.org>
Subject: [bess] [Shepherding AD review] Pre-IETF Last-Call review of draft-ietf-bess-evpn-virtual-eth-segment-15
Hi Authors,

The review includes several questions and observations that arose during a thorough examination of the document.

Please find my review notes below. Before proceeding further requesting an IETF Last-Call and consequently with the IESG, I would appreciate it if you could consider my observations. These primarily aim to improve grammar and clarify certain formal procedures.

I look forward to receiving your revised document.

# Gunter Van de Velde, RTG AD, comments for draft-ietf-bess-evpn-virtual-eth-segment-15

#GENERIC COMMENTS
#================
##EVPN supports SRv6 as dataplane, however SRv6 or IPv6 is not mentioned once in this document. Maybe it should be explicit mentioned that this document is MPLS focussed and explicit exclude SRv6 from its scope?

Ali> Done! Added couple of sentences to explicitly indicate what is included and what is excluded.


##Is the necessary IPR pre-November 2009? (i was looking at dates involved for this document)

Ali> No, the individual rev00 of this document was written in 2014.


If not certain, you can use pre5378Trust200902 clause according:
https://datatracker.ietf.org/doc/html/rfc7749#appendix-A.2.1.4

#DETAILED COMMENTS
#=================
##classified as [minor] and [major]

18         Etheret VPN (EVPN) and Provider Backbone EVPN (PBB-EVPN) introduce a
19         family of solutions for Ethernet services over MPLS/IP network with
20         many advanced features including multi-homing capabilities.  These
21         solutions introduce Single-Active and All-Active redundancy modes for
22         an Ethernet Segment (ES), itself defined as a set of physical links
23         between the multi-homed device/network and a set of PE devices that
24         they are connected to.  This document extends the Ethernet Segment
25         concept so that an ES can be associated to a set of Ethernet Virtual
26         Circuits (EVCs e.g., VLANs) or other objects such as MPLS Label
27         Switch Paths (LSPs) or Pseudowires (PWs).  Such an ES is referred to
28         as Virtual Ethernet Segments (vES).  This draft describes the
29         requirements and the extensions needed to support vES in EVPN and
30         PBB-EVPN.

[minor]
I saw few typos and odd grammatical constructs. I tried to clean this up with following rewrite proposal:

"Ethernet VPN (EVPN) and Provider Backbone EVPN (PBB-EVPN) introduce a comprehensive suite of solutions for delivering Ethernet services over MPLS/IP networks. These solutions offer advanced features, including multi-homing capabilities. Specifically, they support Single-Active and All-Active redundancy modes for an Ethernet Segment (ES), which is defined as a collection of physical links connecting a multi-homed device or network to a set of Provider Edge (PE) devices.

This document extends the concept of an Ethernet Segment by allowing an ES to be associated with a set of Ethernet Virtual Circuits (EVCs, such as VLANs) or other entities, including MPLS Label Switched Paths (LSPs) or Pseudowires (PWs). This extended concept is referred to as Virtual Ethernet Segments (vES). This draft outlines the requirements and necessary extensions to support vES in both EVPN and PBB-EVPN, in alignment with the foundational principles established in RFC 7432.
"

Ali> Done except the very last phrase because it needs elaboration which is covered in introduction section.

[major]
What about SRv6 dataplane? should it be explicit mentioned that this is excluded?

114        An Ethernet Segment, as defined in [RFC7432], represents a set of
115        Ethernet links connecting customer site to one or more PE.  This
116        document extends the Ethernet Segment concept so that an ES can be
117        associated to a set of Ethernet Virtual Circuits (EVCs e.g., VLANs)
118        or other objects such as MPLS Label Switch Paths (LSPs) or
119        Pseudowires (PWs).  Such an ES is referred to as Virtual Ethernet
120        Segments (vES).  This draft describes the requirements and the
121        extensions needed to support vES in EVPN and PBB-EVPN.

[minor]
A brief proposed readability rewrite of the section
"As defined in [RFC 7432], an Ethernet Segment (ES) represents a collection of Ethernet links that connect a customer site to one or more PE devices. This document extends the concept of an Ethernet Segment by allowing an ES to be associated with a set of Ethernet Virtual Circuits (EVCs, such as VLANs), or other entities including MPLS Label Switched Paths (LSPs) and Pseudowires (PWs). This extended concept is referred to as Virtual Ethernet Segments (vES). This draft delineates the requirements and extensions necessary to support vES in both EVPN and PBB-EVPN.
"
Ali> Done

125        Some Service Providers (SPs) want to extend the concept of the
126        physical links in an ES to Ethernet Virtual Circuits (EVCs) where
127        many of such EVCs (e.g., VLANs) can be aggregated on a single
128        physical External Network-to-Network Interface (ENNI).  An ES that
129        consists of a set of EVCs instead of physical links is referred to as
130        a virtual ES (vES).  Figure-1 depicts two PE devices (PE1 and PE2)
131        each with an ENNI that aggregates several EVCs.  Some of the EVCs on
132        a given ENNI can be associated with vESes.  For example, the multi-
133        homed vES in Figure-1 consists of EVC4 on ENNI1 and EVC5 on ENNI2.

[minor]
What about the following:
"Some Service Providers (SPs) seek to extend the concept of physical links in an ES to encompass Ethernet Virtual Circuits (EVCs), wherein multiple EVCs (such as VLANs) can be aggregated onto a single physical External Network-to-Network Interface (ENNI). An ES composed of a set of EVCs rather than physical links is referred to as a virtual ES (vES). Figure 1 illustrates two PE devices (PE1 and PE2), each with an ENNI aggregating several EVCs. Some of these EVCs on a given ENNI can be associated with vESes. For instance, the multi-homed vES depicted in Figure 1 consists of EVC4 on ENNI1 and EVC5 on ENNI2.
"
Ali> Done

180        associated with tens or hundreds of All-Active vESes.  Specific
181        numbers (hundreds, thousands, etc.) being used through this document
182        are used to describe the relation of various elements between them at
183        time of writing.


[minor]
The tone used for the numerical quantities can be made more clear

"The specific figures (hundreds, thousands, etc.) used throughout this document reflect the relative quantities of various elements as understood at the time of writing.
"
Ali> Done

220        In some cases, Service Providers use MPLS Aggregation Networks that
221        belong to separate administrative entities or third parties to get
222        access to their own IP/MPLS Core network infrastructure.  This is the
223        case illustrated in Figure 2.

[minor]
I found that this section does not read very smooth. What about the following writeup?

"In certain scenarios, Service Providers utilize MPLS Aggregation Networks that are managed by separate administrative entities or third-party organizations to gain access to their own IP/MPLS core network infrastructure. This situation is depicted in Figure 2."

Ali> Done

225        In such scenarios, a virtual ES (vES) is defined as a set of
226        individual PWs if they cannot be aggregated.  If the aggregation of
227        PWs is possible, the vES can be associated to a group of PWs that
228        share the same unidirectional LSP pair (by LSP pair we mean the
229        ingress and egress LSPs between the same endpoints).

[minor]
I am not a fan of using the word 'we' in formal procedural documents. What about the following rewrite:

"In such scenarios, a virtual ES (vES) is defined as a set of individual PWs when aggregation is not feasible. If aggregation is possible, the vES can be associated with a group of PWs that share the same unidirectional LSP pair, where the LSP pair consists of the ingress and egress LSPs between the same endpoints.
"
Ali> Done


251        For MPLS/IP access networks where a vES represents a set of LSP pairs
252        or a set of PWs, this document extends Single-Active multi-homing
253        procedures of [RFC7432] and [RFC7623] to vES.  The vES extension to
254        All-Active multi-homing is outside of the scope of this document for
255        MPLS/IP access networks.

[minor]
Fixing typos in this section:

"For MPLS/IP access networks where a virtual vES represents a set of LSP pairs or a set of PWs, this document extends the Single-Active multi-homing procedures defined in [RFC 7432] and [RFC 7623] to accommodate vES. The extension of vES to support All-Active multi-homing in MPLS/IP access networks is beyond the scope of this document.
"
Ali> Done

257        This draft defines the concept of a vES and additional extensions
258        needed to support a vES in [RFC7432] and [RFC7623].  Section 3 lists
259        the set of requirements for a vES.  Section 4 describes extensions
260        for a vES that are applicable to EVPN solutions including [RFC7432]
261        and [RFC7209].  Furthermore, these extensions meet the requirements
262        described in Section 3.  Section 4 gives solution overview and
263        Section 5 describes failure handling, recovery, scalability, and fast
264        convergence of [RFC7432] and [RFC7623] for vESes.

[minor]
fixing typo's

"This draft defines the concept of a vES and outlines the additional extensions necessary to support a vES in accordance with [RFC 7432] and [RFC 7623]. Section 3 enumerates the set of requirements for a vES. Section 4 details the extensions for a vES applicable to EVPN solutions, including those specified in [RFC 7432] and [RFC 7209]. These extensions are designed to meet the requirements outlined in Section 3. Section 4 also provides an overview of the solution, while Section 5 addresses failure handling, recovery, scalability, and fast convergence of [RFC 7432] and [RFC 7623] for vESes.
"
Ali> Done

320     3.1.  Single-Homed and Multi-Homed vES
322        A PE needs to support the following types of vESes:
324        (R1a) A PE MUST handle single-homed vESes on a single physical port
325        (e.g., single ENNI)
327        (R1b) A PE MUST handle a mix of Single-Homed vESes and Single-Active
328        multi-homed vESes simultaneously on a single physical port (e.g.,
329        single ENNI).  Single-Active multi-homed vESes will be simply
330        referred to as Single-Active vESes through the rest of this document.
332        (R1c) A PE MAY handle All-Active multi-homed vESes on a single
333        physical port.  All-Active multi-homed vESes will be simply referred
334        to as All-Active vESes through the rest of this document.
336        (R1d) A PE MAY handle a mix of All-Active vESes along with other
337        types of vESes on a single physical port.
339        (R1e) A Multi-Homed vES (Single-Active or All-Active) can be spread
340        across two or more ENNIs, on any two or more PEs.

[minor] i believe we should use more strong MUST/MAY support' language here to make the requirement more clear. COnsider the following:

"A PE device MUST support the following types of virtual Ethernet Segments (vES):

(R1a) The PE MUST support single-homed vESes on a single physical port, such as a single ENNI.

(R1b) The PE MUST support a combination of single-homed vESes and Single-Active multi-homed vESes simultaneously on a single physical port, such as a single ENNI. Throughout this document, Single-Active multi-homed vESes will be referred to as Single-Active vESes.

(R1c) The PE MAY support All-Active multi-homed vESes on a single physical port. Throughout this document, All-Active multi-homed vESes will be referred to as All-Active vESes.

(R1d) The PE MAY support a combination of All-Active vESes along with other types of vESes on a single physical port.

(R1e) A Multi-Homed vES, whether Single-Active or All-Active, can span across two or more ENNIs on any two or more PEs.
"

Ali> Done

350        (R3a) A PE that supports vES function, MUST support local switching
351        among different vESes belonging to the same service instance (or
352        customer) on a single physical port.  For example, in Figure 1, PE1
353        must support local switching between CE11 and CE12 (both belonging to
354        customer A) that are mapped to two Single-homed vESes on ENNI1.  In
355        case of Single-Active vESes, the local switching is performed among
356        active EVCs belonging to the same service instance on the same ENNI.

[major]
I am not sure why the word 'customer' is mentioned here. I do understand that multiple vESes i a service instance is often associated with a single customer, but is that an absolute protocol requirement? does the association with customer add value in this paragraph?

Ali> Agreed, it is better to remove it.

Slight rephrasing of the paragraph:
"(R3a) A PE device that supports the vES function MUST support local switching among different vESes associated with the same service instance on a single physical port. For instance, in Figure 1, PE1 must support local switching between CE11 and CE12, which are mapped to two single-homed vESes on ENNI1. In the case of Single-Active vESes, the local switching is performed among active EVCs associated with the same service instance on the same ENNI.
"
Ali> Done

358     3.3.  EVC Service Types
360        A physical port (e.g., ENNI) of a PE can aggregate many EVCs each of
361        which is associated with a vES.  Furthermore, an EVC may carry one or
362        more VLANs.  Typically, an EVC carries a single VLAN and thus it is
363        associated with a single broadcast domain.  However, there is no
364        restriction preventing an EVC from carrying more than one VLAN.
366        (R4a) An EVC can be associated with a single broadcast domain - e.g.,
367        VLAN-based service or VLAN bundle service.
369        (R4b) An EVC MAY be associated with several broadcast domains - e.g.,
370        VLAN-aware bundle service.
372        In the same way, a PE can aggregate many LSPs and PWs.  In the case
373        of individual PWs per vES, typically a PW is associated with a single
374        broadcast domain, but there is no restriction preventing the PW from
375        carrying more than one VLAN if the PW is of type Raw mode.
377        (R4c) A PW can be associated with a single broadcast domain - e.g.,
378        VLAN-based service or VLAN bundle service.
380        (R4d) An PW MAY be associated with several broadcast domains - e.g.,
381        VLAN-aware bundle service.

[minor]
Slight readability rewrite:

"A physical port, such as an ENNI of a PE device, can aggregate numerous EVCs, each associated with a vES. An EVC may carry one or more VLANs. Typically, an EVC carries a single VLAN and is therefore associated with a single broadcast domain. However, there are no restrictions preventing an EVC from carrying multiple VLANs.

(R4a) An EVC can be associated with a single broadcast domain, such as in a VLAN-based service or a VLAN bundle service.

(R4b) An EVC MAY be associated with several broadcast domains, such as in a VLAN-aware bundle service.

Similarly, a PE can aggregate multiple LSPs and PWs. In the case of individual PWs per vES, typically, a PW is associated with a single broadcast domain, although there are no restrictions preventing a PW from carrying multiple VLANs if the PW is configured in Raw mode.

(R4c) A PW can be associated with a single broadcast domain, such as in a VLAN-based service or a VLAN bundle service.

(R4d) A PW MAY be associated with several broadcast domains, such as in a VLAN-aware bundle service.
"

Ali> Done

383     3.4.  Designated Forwarder (DF) Election

385        Section 8.5 of [RFC7432] describes the default procedure for DF
386        election in EVPN which is also used in [RFC7623] and [RFC8214].
387        [RFC8584] describes the additional procedures for DF election in
388        EVPN.  These DF election procedures is performed at the granularity
389        of (ESI, Ethernet Tag).  In case of a vES, the same EVPN default
390        procedure for DF election also applies; however, at the granularity
391        of (vESI, Ethernet Tag); where vESI is the virtual Ethernet Segment
392        Identifier and the Ethernet Tag field is represented by and I-SID in
393        PBB-EVPN and by a VLAN ID (VID) in EVPN.  As in [RFC7432], this
394        default procedure for DF election at the granularity of (vESI,
395        Ethernet Tag) is also referred to as "service carving".  With service
396        carving, it is desirable to evenly partition the DFs for different
397        vESes among different PEs, thus evenly distributing the traffic among
398        different PEs.  The following list the requirements apply to DF
399        election of vESes for (PBB-)EVPN.

[minor]
Fixing typos in this textblob

"Section 8.5 of [RFC 7432] outlines the default procedure for DF election in EVPN, which is also applied in [RFC 7623] and [RFC 8214]. [RFC 8584] elaborates on additional procedures for DF election in EVPN. These DF election procedures are performed at the granularity of (ESI, Ethernet Tag). In the context of a vES, the same EVPN default procedure for DF election is applicable, but at the granularity of (vESI, Ethernet Tag). In this context, the Ethernet Tag is represented by an I-SID in PBB-EVPN and by a VLAN ID (VID) in EVPN.

As described in [RFC 7432], this default procedure for DF election at the granularity of (vESI, Ethernet Tag) is also known as "service carving." The goal of service carving is to evenly distribute the DFs for different vESes among various PEs, thereby ensuring an even distribution of traffic across the PEs. The following requirements are applicable to the DF election of vESes for (PBB-)EVPN:
"
Ali> Done

409     3.5.  OAM

411        To detect the failure of an individual EVC and perform DF election
412        for its associated vES as the result of this failure, each EVC should
413        be monitored independently.

415        (R6a) Each EVC SHOULD be monitored for its health independently.

417        (R6b) A single EVC failure (among many aggregated on a single
418        physical port/ENNI) MUST trigger DF election for its associated vES.

[minor]
gramatical rewrite proposal:

"To detect the failure of an individual EVC and subsequently perform DF election for its associated vES as a result of this failure, each EVC should be monitored independently.

(R6a) Each EVC SHOULD be independently monitored for its operational health.

(R6b) A failure in a single EVC, among many aggregated on a single physical port or ENNI, MUST trigger a DF election for its associated vES.
"
Ali> Done

469        For the EVPN solution, everything basically remains the same except
470        for the handling of physical port failure where many vESes can be
471        impacted.  Sections 5.1 and 5.3 below describe the handling of
472        physical port/link failure for EVPN.  In a typical multi-homed
473        operation, MAC addresses are learned behind a vES and are advertised
474        with the ESI corresponding to the vES (i.e., vESI).  EVPN aliasing
475        and mass-withdraw operations are performed with respect to vES
476        identifier: the Ethernet A-D routes for these operations are
477        advertised with vESI instead of ESI.

[minor]
textual readability rewrite:
"In the EVPN solution, the overall procedures remain consistent, with the primary difference being the handling of physical port failures that can affect multiple vESes. Sections 5.1 and 5.3 describe the procedures for managing physical port or link failures in the context of EVPN. In a typical multi-homed setup, MAC addresses learned behind a vES are advertised using the ESI associated with the vES, referred to as the vESI. EVPN aliasing and mass-withdraw operations are conducted with respect to the vES identifier. Specifically, the Ethernet Auto-Discovery (A-D) routes for these operations are advertised using the vESI instead of the ESI.
"
Ali> Done

575        The difference between coloring mechanism for EVPN and PBB-EVPN is
576        that for EVPN, the extended community is advertised with the Ethernet
577        A-D per ES route whereas for PBB-EVPN, the extended community may be
578        advertised with the B-MAC route.

[minor]
Is there with PBB-EVPN any other means to advertise the color as with the proposed B-MAC route? if not, then maybe s/may/is/ in the phrase?

Ali> Thanks for catching this. I made the substitute.

580        The following sections describe Grouping Ethernet A-D per ES and
581        Grouping B-MAC, will become crucial for port failure handling as seen
582        in Section 5.3, Section 5.4, and Section 5.5 below.

[minor]
this was reading confusing for me. Was this text intended to say:

"The subsequent sections detailing Grouping of Ethernet Auto-Discovery (A-D) per ES and Grouping of B-MAC addresses will be essential for addressing port failure handling, as discussed in Sections 5.3, 5.4, and 5.5.

Ali> Done. Thanks for the enhanced text!

"
606        The ESI label extended community (Section 7.5 of [RFC7432]) is not
607        relevant to Grouping Ethernet A-D per ES route.  The label value is
608        not used for encapsulating BUM (Broadcast, Unknown-unicast,
609        Multicast) packets for any split-horizon function.  The ESI label
610        extended community SHOULD NOT be added to Grouping Ethernet A-D per
611        ES route and SHOULD be ignored on receiving PE.

[minor]
Why is SHOULD NOT be used? Would it not be better to say MUST NOT be added and MUST be ignored. The implemenation seems broken if it would be added or if it would be processed

Ali> Done.

613        This Grouping Ethernet A-D per ES route is advertised with a list of
614        Route Targets corresponding to the impacted service instances.  If
615        the number of attached Route Targets exceeds the limit than can fit
616        into a single route, then a set of Grouping Ethernet A-D per ES
617        routes are advertised.

[minor]
This paragraph was reading a odd, and i propose a small rewrite:

"The Grouping Ethernet Auto-Discovery (A-D) per ES route is advertised with a list of Route Targets corresponding to the affected service instances. If the number of associated Route Targets exceeds the capacity of a single route, multiple Grouping Ethernet A-D per ES routes are advertised accordingly.
"
Ali> Done.


621        For PBB-EVPN, especially where there are large number of service
622        instances (i.e., I-SIDs) associated with each EVC the PE MAY color
623        each vES B-MAC route with an attribute representing their association
624        to a physical port (e.g.  ENNI).

[minor]
fixing some gramatical issues, hoping that the original intent of the text was kept correct.

"In PBB-EVPN, particularly when there are a large number of service instances (i.e., I-SIDs) associated with each EVC, the PE device MAY assign a color attribute to each vES B-MAC route, indicating their association with a physical port (e.g., an ENNI).
"
Ali> Done.

648        [RFC7432], [RFC7623], and [RFC8214] solutions provide protection
649        against such failures as described in the corresponding references.
650        In the presence of virtual Ethernet Segments (vESes) in these
651        solutions, besides the above failure scenarios, individual EVC
652        failure is an additional scenario to consider.  Handling vES failure
653        scenarios implies that individual EVCs or PWs need to be monitored
654        and upon detection of failure or restoration of services, appropriate
655        DF election and failure recovery mechanisms are executed.

[minor]
gramatical rewrite for readability purpose and fixing grammar

"The solutions outlined in [RFC 7432], [RFC 7623], and [RFC 8214] provide protection against failures as described in these respective references. In the context of these solutions, the presence of vESes introduces an additional failure scenario beyond those already considered, specifically the failure of individual EVCs. Addressing vES failure scenarios necessitates the independent monitoring of EVCs or PWs. Upon detection of failure or service restoration, appropriate DF election and failure recovery mechanisms must be executed.
"
Ali> Done.

894        1.  When a vES is configured, the PE SHOULD advertise the Ethernet
895            Segment route for this vES with a color corresponding to the
896            physical port.
898        2.  All receiving PEs (in the redundancy group) SHOULD take note of
899            this color and create a list of vESes for this color.
901        3.  Recall, that the PE SHOULD also advertise a Grouping Ethernet A-D
902            per ES (for EVPN) and a Grouping B-MAC (for PBB-EVPN)
903            representing this color and vES grouping.
905        4.  Upon a port failure (e.g., ENNI failure), the PE SHOULD withdraw
906            this previously advertised Grouping Ethernet A-D per ES or
907            Grouping B-MAC associated with the failed port.  The PE SHOULD
908            prioritize sending these Grouping routes withdraw message over
909            individual vES route withdrawal messages of impacted vESes.  For
910            example, in Figure 5, when the physical port associated with
911            ENNI3 fails on PE2, it withdraws the previously advertised
912            Grouping Ethernet A-D per ES route.  When other multi-homing
913            PEs(i.e., PE1 and PE3) receives this withdrawal message, they
914            know that the vESes associated with CE1 and CE3 are impacted
915            (because of the associated color), and thus to initiate DF
916            election procedure for these vESes.  Furthermore, the remote PEs
917            (i.e., PE4) upon receiving this withdrawal message, it intiates
918            failover procedure for vESes associated with CE1, CE3, and
919            switches over to the other PE for each vES redundancy group.

[minor]
grammatical rewrite for readability and fixing grammar. I hope i kept the original text intent:

"1) When a vES is configured, the PE SHOULD advertise the Ethernet Segment route for this vES with a color that corresponds to the associated physical port.

2) All receiving PEs within the redundancy group SHOULD record this color and compile a list of vESes associated with it.

3) Additionally, the PE SHOULD advertise a Grouping Ethernet A-D per ES for EVPN, and a Grouping B-MAC for PBB-EVPN, which corresponds to the color and vES grouping.

4) In the event of a port failure, such as an ENNI failure, the PE SHOULD withdraw the previously advertised Grouping Ethernet A-D per ES or Grouping B-MAC associated with the failed port. The PE SHOULD prioritize sending these Grouping route withdrawal messages over the withdrawal of individual vES routes affected by the failure. For instance, as depicted in Figure 5, when the physical port associated with ENNI3 fails on PE2, it withdraws the previously advertised Grouping Ethernet A-D per ES route. Upon receiving this withdrawal message, other multi-homing PEs (such as PE1 and PE3) recognize that the vESes associated with CE1 and CE3 are impacted, based on the associated color, and thus initiate the DF election procedure for these vESes. Furthermore, remote PEs (such as PE4), upon receiving this withdrawal message, initiate the failover procedure for the vESes associated with CE1 and CE3, and switch to the other PE for each vES redundancy group.
"
Ali> Done.
_______________________________________________
BESS mailing list -- bess@ietf.org
To unsubscribe send an email to bess-leave@ietf.org