Re: [bess] [EXTERNAL] Re: [nvo3] Problematic text in RFC 9469

Alexander Vainshtein <Alexander.Vainshtein@rbbn.com> Tue, 02 January 2024 07:43 UTC

Return-Path: <alexander.vainshtein@rbbn.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 710EFC14F5E8 for <bess@ietfa.amsl.com>; Mon, 1 Jan 2024 23:43:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.103
X-Spam-Level:
X-Spam-Status: No, score=-2.103 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rbbn.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ouktwTKaVGHn for <bess@ietfa.amsl.com>; Mon, 1 Jan 2024 23:43:37 -0800 (PST)
Received: from usb-smtp-delivery-110.mimecast.com (usb-smtp-delivery-110.mimecast.com [170.10.151.110]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A005C14E515 for <bess@ietf.org>; Mon, 1 Jan 2024 23:43:36 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rbbn.com; s=mimecast20230413; t=1704181415; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=eq4QzMPlUmChwiDMn8wWma01/2rk89wIWecDt+mRsoE=; b=Q/+G2korbmaVsgoP+eArWTKOQmx5//13n5Q4ZfhjnfmyQy1TZeeZoEvTu/sl5NrGDggKel KsHQ+/BLvdqaQFSGcgme4LoPrafhfunj7B8PkiU24seEK9/syszoOkaWlQu2KbsjGg20eM ewU6iqDxemn0524INIVyh0RfseFnq1s=
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (mail-bn8nam04lp2041.outbound.protection.outlook.com [104.47.74.41]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id usb-mta-27-2usTLHNLPVqfr97Ld1z06Q-1; Mon, 01 Jan 2024 23:43:28 -0800
X-MC-Unique: 2usTLHNLPVqfr97Ld1z06Q-1
Received: from PH0PR03MB6300.namprd03.prod.outlook.com (2603:10b6:510:e2::5) by SJ0PR03MB7052.namprd03.prod.outlook.com (2603:10b6:a03:4e1::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7113.27; Tue, 2 Jan 2024 07:43:24 +0000
Received: from PH0PR03MB6300.namprd03.prod.outlook.com ([fe80::2038:bab5:ca01:f755]) by PH0PR03MB6300.namprd03.prod.outlook.com ([fe80::2038:bab5:ca01:f755%7]) with mapi id 15.20.7135.023; Tue, 2 Jan 2024 07:43:23 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>
To: Aldrin Isaac <aldrin.isaac@gmail.com>
CC: "Jorge Rabadan (Nokia)" <jorge.rabadan@nokia.com>, "nvo3@ietf.org" <nvo3@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "draft-ietf-nvo3-evpn-applicability@ietf.org" <draft-ietf-nvo3-evpn-applicability@ietf.org>
Thread-Topic: [EXTERNAL] Re: [nvo3] Problematic text in RFC 9469
Thread-Index: AdnsbeT2RIhmTQe0Q/SL02FBo/hjOAZNWtdoACqSbcALrm+lBABOsHagALNzFQABD0+ZAA==
Date: Tue, 02 Jan 2024 07:43:23 +0000
Message-ID: <PH0PR03MB63006DBEFA58E5BAB533D0DCF661A@PH0PR03MB6300.namprd03.prod.outlook.com>
References: <PH0PR03MB6300D854E338B2DCC6141829F6F8A@PH0PR03MB6300.namprd03.prod.outlook.com> <DS0PR08MB94455B26682FF26C6C06876DF7D8A@DS0PR08MB9445.namprd08.prod.outlook.com> <PH0PR03MB630013DAFB4ACAEA709F2BEAF6DFA@PH0PR03MB6300.namprd03.prod.outlook.com> <LV8PR08MB9584A7D497AB558A2ABBFC5DF794A@LV8PR08MB9584.namprd08.prod.outlook.com> <PH0PR03MB6300D59197B53DAADA2EA354F69AA@PH0PR03MB6300.namprd03.prod.outlook.com> <CAOA2mbxBSo=87StFr-=LjZo2y_49TUH-NuKGYhu0Op6HiU7uoA@mail.gmail.com>
In-Reply-To: <CAOA2mbxBSo=87StFr-=LjZo2y_49TUH-NuKGYhu0Op6HiU7uoA@mail.gmail.com>
Accept-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR03MB6300:EE_|SJ0PR03MB7052:EE_
x-ms-office365-filtering-correlation-id: 4c52faa2-98e8-4025-c2fc-08dc0b667fcd
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR03MB6300.namprd03.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376002)(366004)(396003)(136003)(346002)(39860400002)(230273577357003)(230473577357003)(230173577357003)(230373577357003)(230922051799003)(64100799003)(1800799012)(186009)(451199024)(2906002)(166002)(30864003)(5660300002)(38100700002)(86362001)(55016003)(52536014)(4326008)(84970400001)(99936003)(8676002)(122000001)(8936002)(41300700001)(316002)(64756008)(66899024)(33656002)(66446008)(66556008)(66946007)(76116006)(66476007)(6916009)(54906003)(7696005)(26005)(83380400001)(38070700009)(53546011)(478600001)(9686003)(6506007)(966005)(71200400001)(579004); DIR:OUT; SFP:1101
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
MIME-Version: 1.0
X-OriginatorOrg: rbbn.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6300.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4c52faa2-98e8-4025-c2fc-08dc0b667fcd
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Jan 2024 07:43:23.8113 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 29a671dc-ed7e-4a54-b1e5-8da1eb495dc3
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vWU4z2NxDOF0diJtlWEe8QRY+/cqn0HOpqOjaBDMyF18DRdovlfvg/oQ86qqPNXwzueR8dcB2VuQuQoCNoqs5w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR03MB7052
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: rbbn.com
Content-Language: en-US
Content-Type: multipart/related; boundary="_004_PH0PR03MB63006DBEFA58E5BAB533D0DCF661APH0PR03MB6300namp_"; type="multipart/alternative"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/M7XtiSOm_g_hJAj3EiZOPlVNFzM>
Subject: Re: [bess] [EXTERNAL] Re: [nvo3] Problematic text in RFC 9469
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jan 2024 07:43:42 -0000

Aldrin,
Lots of thanks for your email and apologies for a delayed response.

From my POV neither 9135 nor 9136 say anything about “access-facing” vs. “core-facing” IRB.

And in any case Section 4.4.2 of 9136 deals with both “core-facing” IRBs that connect IP-VRFs to the SBD and “access-facing” IRBs that connect the same IP-VRF to a BD with “regular” Attachment Circuits as shown in the copied diagram below.

                 NVE1
        +------------+                       DGW1
IP10+---+(BD-1)      | +---------------+ +------------+
        |  \         | |               | |            |
        |(IP-VRF)-(SBD)|               |(SBD)-(IP-VRF)|-----+
        |  /    IRB(M1/IP1)           IRB(M3/IP3)     |     |
    +---+(BD-2)      | |               | +------------+    _+_
    |   +------------+ |               |                  (   )
SN1|                  |     VXLAN/    |                 ( WAN )--H1
    |            NVE2  |     GENEVE/   |                  (___)
    |   +------------+ |     MPLS      |     DGW2           +
    +---+(BD-2)      | |               | +------------+     |
        |  \         | |               | |            |     |
        |(IP-VRF)-(SBD)|               |(SBD)-(IP-VRF)|-----+
        |  /    IRB(M2/IP2)           IRB(M4/IP4)     |
SN2+----+(BD-3)      | +---------------+ +------------+
        +------------+

As explained in my original email, the IRBs that connect IP-VRFs to SBD look as Asymmetric IRBs to me, while IRBs that connect IP-VRF “normal” BDs may be either Symmetric or Asymmetric.
In the former case, traffic to IP10 would cross the core as IP-VPN traffic based on RT-2 advertised for the IP --> MAC pair learned by BD-1 in NVE1, while in the latter case RT-5 advertised by NVE1 for the subnet of the IRB that connects IP-VRF to BD-1 with the IP1 as the GW IP address of this route, and RT-2 for the IP1 --> M1 pair associated with the SBD IRB would be used to send this traffic in EVPN encapsulation.

Hope this clarifies my question.

Regards,
Sasha

From: Aldrin Isaac <aldrin.isaac@gmail.com>
Sent: Wednesday, December 27, 2023 11:59 PM
To: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>
Cc: Jorge Rabadan (Nokia) <jorge.rabadan@nokia.com>; nvo3@ietf.org; bess@ietf.org; draft-ietf-nvo3-evpn-applicability@ietf.org
Subject: [EXTERNAL] Re: [nvo3] Problematic text in RFC 9469

Maybe the distinction here is that RFC9135 describes access facing functions and RFC9136 describes core facing?

On Sun, Dec 24, 2023 at 12:41 AM Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>> wrote:
Jorge,
Again, Lots of thanks for your email!

I have looked up Section 4.4 of RFC 9136 and I have noticed (missed this point before☹) that it indeed defines all IP-VRF-to-IP-VRF use cases as Symmetric.

At the same time, Section 4.4.2 of RFC 9136<https://datatracker.ietf.org/doc/html/rfc9136#section-4.4.2> describes advertisement of RT-5 and RT-2 for the SBD IRB and their installation as following:


1.       RT-5 for the tenant’s subnet is advertised with Route Target that identifies the tenant (IP-VRF)

2.       RT-2 for the IP-MAC pair of the SBD IRB is advertised with the Route Target that identifies SBD

a.       The text clarifies that this Route Target may be the same as the Route Target used in RT-5

b.       Label2 field of this route is not mentioned

This is in direct contradiction with Section 5.1 of RFC 9135 that says that RT-2 associated with a Symmetric IRB

1.   The MPLS Label2 field of this route MUST be set to a value that identifies IP-VRF

2.   “MUST be advertised with two Route Targets, one corresponding to the MAC-VRF of the tenant's subnet and another corresponding to the tenant's IP-VRF”.

To me this means that SBD IRBs are Asymmetric. What, if anything do I miss?

Regards, and best holiday wishes,
Sasha

From: Jorge Rabadan (Nokia) <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>
Sent: Friday, December 22, 2023 9:19 PM
To: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>; draft-ietf-nvo3-evpn-applicability@ietf.org<mailto:draft-ietf-nvo3-evpn-applicability@ietf.org>
Cc: nvo3@ietf.org<mailto:nvo3@ietf.org>; bess@ietf.org<mailto:bess@ietf.org>
Subject: [EXTERNAL] Re: Problematic text in RFC 9469

Hi Sasha,

I realized I never replied to your email.

My first comment is that this document was an ask from the NVO3 WG, as one of the pending points in the charter. It is mostly addressing the NVO3 audience, rather than being a generic primer (it is mostly focused on NVO3 networks and leaves many other aspects out). Thanks for the feedback though!

About whether the SBD follows the asymmetric IRB model, I still disagree, sorry about that 😊

The authority in the definition of symmetric vs asymmetric is RFC9135, and the lookup sequence explained in RFC9135 for asymmetric does not match what the section 4.4.2 says.
Furthermore, RFC9136 provides its summary of the symmetric vs asymmetric IRB model, and declares the entire section 4.4 as a symmetric model from the perspective of the lookups required.

Hope it helps.

Thanks!
Jorge

From: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>
Date: Tuesday, October 24, 2023 at 1:22 AM
To: Jorge Rabadan (Nokia) <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>, draft-ietf-nvo3-evpn-applicability@ietf.org<mailto:draft-ietf-nvo3-evpn-applicability@ietf.org> <draft-ietf-nvo3-evpn-applicability@ietf.org<mailto:draft-ietf-nvo3-evpn-applicability@ietf.org>>
Cc: nvo3@ietf.org<mailto:nvo3@ietf.org> <nvo3@ietf.org<mailto:nvo3@ietf.org>>, bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>
Subject: RE: Problematic text in RFC 9469

CAUTION: This is an external email. Please be very careful when clicking links or opening attachments. See the URL nok.it/ext<http://nok.it/ext> for additional information.


Jorge,
Lots of thanks for your response.

I think that RFC 9469 is very important (in spite of being purely Informational), because it provides a very good ”EVPN primer”.
Personally, I would highly recommend it as mandatory reading for the “EVPN beginners”. Of course, this is my personal understanding, I do not know whether this was one of your objectives in writing it.

This is also why I am worried about minor inaccuracies in the text – from my POV the beginners should be given an accurate view on the technology from Day 1.
In particular, based on my personal experience (an I have to do lots of EVPN-related mentoring in my organization)  I assure you that EVPN beginners quite frequently think that the term “Ethernet Segment” refers just to multi-homed ES☹; part of my job is to convince them that they are mistaken.

Regarding your statement on SBD:

I agree that Section 4.4.2 of RFC 9136<https://datatracker.ietf.org/doc/html/rfc9136#section-4.4.2> does not mention specifically Symmetric or Asymmetric IRBs.

However, the quoted text from this section (below) de-facto implies Asymmetric IRBs connecting each IP-VRF to the SBD (the relevant fragments are highlighted):


NVE1 advertises the following BGP routes:

Route type 5 (IP Prefix route) containing:

IPL = 24, IP = SN1, Label = SHOULD be set to 0.

GW IP = IP1 (SBD IRB's IP).

Route Target identifying the tenant (IP-VRF).

Route type 2 (MAC/IP Advertisement route for the SBD IRB) containing:

ML = 48, M = M1, IPL = 32, IP = IP1, Label = 10.

A BGP Encapsulation Extended Community [RFC9012<https://datatracker.ietf.org/doc/html/rfc9012>].

Route Target identifying the SBD. This Route Target may be the same as the one used with the RT-5.
If the IRB in question were Symmetric, Route type 2, in accordance with Section 5.1 of RFC 9135<https://datatracker.ietf.org/doc/html/rfc9135#section-5.1>, would include the Label2 field identifying local IP-VRF and would also carry Route Target(s) identifying IP-VRF. None of these are mentioned.

Of course, this is just an example. But:

•       Section 4.4.2 of RFC 9136 in its description of the SBD model states: “However, the NVE/DGWs are now connected through Ethernet NVO tunnels terminated in the SBD instance”,

•       Section 4. of RFC 9469<https://datatracker.ietf.org/doc/html/rfc9469#section-4.3> says “In the Symmetric model, the inter-subnet connectivity between NVEs is done based on tunnels between the IP-VRFs”.

This brings me to a conclusion that SBD is intended to be used with Asymmetric IRBs. What, if anything, did I miss?

Regards,
Sasha

From: Jorge Rabadan (Nokia) <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>
Sent: Tuesday, October 24, 2023 3:23 AM
To: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>; draft-ietf-nvo3-evpn-applicability@ietf.org<mailto:draft-ietf-nvo3-evpn-applicability@ietf.org>
Cc: nvo3@ietf.org<mailto:nvo3@ietf.org>; bess@ietf.org<mailto:bess@ietf.org>
Subject: [EXTERNAL] Re: Problematic text in RFC 9469

Hi Sasha,

Thanks for reading it!
As a co-author and editor of the RFC, in my humble opinion those points do not deserve to file an errata.

The RFC is purely informational and only focuses on describing how the existing specs can be applied to NVO3 networks, without specifying any new procedures or changes in the definition of those terms.


For the ES, while I see your point, I don’t think this term in the glossary section will confuse the reader about what an ES is.

IP-VRF – again I don’t think it is confusing the reader, given that it is such a common term.

SBD – I don’t agree with you.. RFC9136 defines the SBD concept and it does not mention “asymmetric” models..


Thanks.
Jorge


From: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com<mailto:Alexander.Vainshtein@rbbn.com>>
Date: Thursday, September 21, 2023 at 3:03 AM
To: draft-ietf-nvo3-evpn-applicability@ietf.org<mailto:draft-ietf-nvo3-evpn-applicability@ietf.org> <draft-ietf-nvo3-evpn-applicability@ietf.org<mailto:draft-ietf-nvo3-evpn-applicability@ietf.org>>
Cc: nvo3@ietf.org<mailto:nvo3@ietf.org> <nvo3@ietf.org<mailto:nvo3@ietf.org>>, bess@ietf.org<mailto:bess@ietf.org> <bess@ietf.org<mailto:bess@ietf.org>>
Subject: Problematic text in RFC 9469

CAUTION: This is an external email. Please be very careful when clicking links or opening attachments. See the URL nok.it/ext<http://nok.it/ext> for additional information.


Dear authors of RFC 9469<https://datatracker.ietf.org/doc/html/rfc9469>,
I have just started reading this Information RFC, and I see a few problematic statements in the Terminology section.

Here is what I have noticed so far:

ES:
Ethernet Segment. When a Tenant System (TS) is connected to one or more NVEs via a set of Ethernet links, that set of links is referred to as an "Ethernet Segment". Each ES is represented by a unique Ethernet Segment Identifier (ESI) in the NVO3 network, and the ESI is used in EVPN routes that are specific to that ES.

This text seems inaccurate because, while the ES definition above equally applies to single-homed and multi-homed ES, but unique ESI values used in EVPN routes that are specific to this ES are only assigned to multi-homed ES. MAC/IP Advertisement (EVPN Type 2) routes that are specific to any single-homed ES always carry all zeroes in the ESI field of their NLRI.

IP-VRF:
IP Virtual Routing and Forwarding table, as defined in [RFC4364<https://datatracker.ietf.org/doc/html/rfc4364>]. It stores IP Prefixes that are part of the tenant's IP space and are distributed among NVEs of the same tenant by EVPN. A Route Distinguisher (RD) and one or more Route Targets (RTs) are required properties of an IP-VRF. An IP-VRF is instantiated in an NVE for a given tenant if the NVE is attached to multiple subnets of the tenant and local inter-subnet forwarding is required across those subnets.

This text seems inaccurate because, with Symmetric EVPN IRB, an IP-VRF that stores IP prefixes that are part of the tenant’s IP space may be instantiated in a PE that does not participate in any EVI and/or does not perform any local inter-subnet forwarding – please see embedded diagram below.

[cid:image001.png@01DA3D5E.844D0070]


SBD:
Supplementary Broadcast Domain, as defined in [RFC9136<https://datatracker.ietf.org/doc/html/rfc9136>]. It is a Broadcast Domain that does not have any Attachment Circuits, only has IRB interfaces, and provides connectivity among all the IP-VRFs of a tenant in the Interface-ful IP-VRF-to-IP-VRF models.

To the best of my understanding, all IRB interfaces that use an SBD MUST be Asymmetric, but this is not mentioned.

Do you think that these issues deserve posting some Errata?

Regards, and lots of thanks in advance,
Sasha



Disclaimer

This e-mail together with any attachments may contain information of Ribbon Communications Inc. and its Affiliates that is confidential and/or proprietary for the sole use of the intended recipient. Any review, disclosure, reliance or distribution by others or forwarding without express permission is strictly prohibited. If you are not the intended recipient, please notify the sender immediately and then delete all copies, including any attachments.
_______________________________________________
nvo3 mailing list
nvo3@ietf.org<mailto:nvo3@ietf.org>
https://www.ietf.org/mailman/listinfo/nvo3<https://www.ietf.org/mailman/listinfo/nvo3>