Re: [bess] Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Mon, 26 July 2021 20:24 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 769883A003E; Mon, 26 Jul 2021 13:24:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.595
X-Spam-Level:
X-Spam-Status: No, score=-9.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=IyxP5+L5; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=EZn9GY1Q
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PdJ_uZseIMEs; Mon, 26 Jul 2021 13:24:11 -0700 (PDT)
Received: from alln-iport-1.cisco.com (alln-iport-1.cisco.com [173.37.142.88]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D6FAC3A003B; Mon, 26 Jul 2021 13:24:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=106227; q=dns/txt; s=iport; t=1627331051; x=1628540651; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=19Cz/QuXe9NSDhDCVJfeYICqEK4LmklwVKqCcrh5GpE=; b=IyxP5+L55mGxeKNzC1Mlq3a7UpgiiU9HH6VAY2NIjt6HTEXW5UFWJDJz u1lERjkabvLY/MxptU7vTKdEr7kfhLvGUFtLh3kLmR6C4+rEl2RzAuOIQ HarlwX0dVjq0wpFi0nym3lxPTZ8HrwQx3TKQFTKbBfmZlivT6KgGVsUTO Y=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:3BsgchXUSSFHwpPGQaznvVI3I5/V8K3gAWYlg6HPw5pIdaei9tLpO 0mMrflujVqcW4Ld5roEjufNqKnvVCQG5orJq3ENdpFAFnpnwcUblgAtGoiJXEv8KvO5aSs5H c0EX1hgrDm3NEFPE5P4YFvf6nS58T8VHED5Mgx4buT4E4LflYK5zee3rpbSeA5PwjG6ZOAaE Q==
IronPort-HdrOrdr: A9a23:zf3ZlaFI3SEIP+uDpLqFSpHXdLJyesId70hD6qkvc31om52j+f xGws516fatskdsZJhSo6H+BEDgewKcyXcR2+ks1NiZLXHbUQeTXeRfBM7ZskDd8k7Fh65gPM VbAtND4bTLZDAQ56uXkWrIcerIguP3ipxA7t2uqEuFODsaEp2ImD0JbDpzfHcGIDVuNN4cLt 6x98BHrz2vdTA8dcKgHEQIWODFupniiI/mSQRuPW9l1CC+yReTrJLqGRmR2RkTFxlVx605zG TDmwvloo2+rvCAzAPG3WO71eUVpDKh8KoHOCW/sLlTFtzesHfvWG2nYczagNkBmpDq1L/tqq iVn/5vBbUp15qbRBDKnfKk4XiQ7N9p0Q659bdd6kGT/fAQg1kBepd8bMtiA2jkAwBLhqAN7I tbm22erJZZFhXGgWD04MXJTQhjkg6urWMlivN7tQ0TbWIyUs4bkWUkxjIeLH7AJlOM1Kk3VO 11SM3M7vdfdl2XK3jfo2l02dSpGnA+BA2PTEQOstGcl2E+pgE382IIgMgE2nsQ/pM0TJdJo+ zCL6RzjblLCssbd7h0CusNSda+TmbNXRXPOmSPJkmPLtBKB1vd75rspLkl7uCjf5IFiJM0hZ TaSVtd8XU/fkr/YPf+lKGjMiq9CVlVeA6dhP22y6IJz4EUdYCbRxFrEmpe4fdIi89vdvHmZw ==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.84,270,1620691200"; d="scan'208,217";a="726588428"
Received: from alln-core-2.cisco.com ([173.36.13.135]) by alln-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 26 Jul 2021 20:24:08 +0000
Received: from mail.cisco.com (xbe-aln-007.cisco.com [173.36.7.22]) by alln-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id 16QKO8cl016360 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 26 Jul 2021 20:24:08 GMT
Received: from xfe-aln-003.cisco.com (173.37.135.123) by xbe-aln-007.cisco.com (173.36.7.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Mon, 26 Jul 2021 15:24:08 -0500
Received: from xfe-aln-004.cisco.com (173.37.135.124) by xfe-aln-003.cisco.com (173.37.135.123) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Mon, 26 Jul 2021 15:24:07 -0500
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-004.cisco.com (173.37.135.124) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Mon, 26 Jul 2021 15:24:07 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=njvxORy1bpsuCD8SMloJ3h5nLPbY1uo/g4w3ZKCNnQXYYqeYKtp4caV0Uv0DWwjeHY8cPpseFJ0paSSGz5AlZHHSNykfd7KuFvUM5htMEMMSXBCi+AAycGRCR8Hath41vu72R4Zn2EthR6lDtBl4GBddOXdUCSBy5La7cmNA4U8dWgGbWAkgwdv7nkALsWBfwSs5TGn5Ar7GpAJbqdnYjNFK/w1mHFVNDCQgxu54qybCJWRP4ApeL52Y2zXOSZFAe9ujBoJ/qPs1abVMt/IZVc/lD4Qy+8yItaJCRlGUty2KV458L5R/wpiIQvJNKA57hRP0s4yEQIrUmcQ3LK+GWw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=19Cz/QuXe9NSDhDCVJfeYICqEK4LmklwVKqCcrh5GpE=; b=GHuWtUxB3NL1SmqsOCKYok1kOdkgdhNM/lANuMXcKAhuU2kul4lPsJh0Bsqa4jDSCDARoiCHWOsDiK7nWfeN2Q5400PEvYdSE8ahpxtyq/OZn7WJWqoiu7aElVUi5oQkbaiCGHDvHgc55zC+fTkhloyvT/8CxKYph6Rip4qk265D8qIkd9aCXMDQDwKo6mx/xfTD505Hb1r/E0rFP/sabxMJb7dKhcktCeAF7DiBYNcuvD2+UR5pZJTLgQ0OIIwwAoSsf6N8IR5v4twlvTaVNz199tGHzM6aulw8+4otsIzHCgwlSrbOaI+Ghq8KcnPBF/bD9PpsKjRlqBUtvGNxcg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=19Cz/QuXe9NSDhDCVJfeYICqEK4LmklwVKqCcrh5GpE=; b=EZn9GY1QkgENUsoE2fwAD1Ng9TfbZ8FXgRqVzFQrTqj7geUOxF5JZM0oI1KCIzl1CsFNdXqw0iieiRffIYLrtsnc80jnTIoYEYBwU7iMqONBLQsW2Ke13Dfkw0te6Uf6qr2WY8V2KfC2dsxY3clgnrivSib/YZqBOfDwWS7zhFA=
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by PH0PR11MB4902.namprd11.prod.outlook.com (2603:10b6:510:37::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4352.26; Mon, 26 Jul 2021 20:24:05 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::6d61:c160:def1:bc64]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::6d61:c160:def1:bc64%3]) with mapi id 15.20.4352.031; Mon, 26 Jul 2021 20:24:05 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>, The IESG <iesg@ietf.org>, "draft-ietf-bess-evpn-proxy-arp-nd@ietf.org" <draft-ietf-bess-evpn-proxy-arp-nd@ietf.org>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "Bocci, Matthew (Nokia - GB)" <matthew.bocci@nokia.com>, "jeanmichel.combes@orange.com" <jeanmichel.combes@orange.com>
Thread-Topic: Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)
Thread-Index: AQHW7/+kojHR0jJxH0WfhBI9FWDqyKqI7LLQgEmobYCAArauf4CBrhUA
Date: Mon, 26 Jul 2021 20:24:05 +0000
Message-ID: <1AA5592A-72B2-4522-B144-675237C2F0FC@cisco.com>
References: <161123842361.25230.14225434357147230236@ietfa.amsl.com> <MWHPR08MB3520DEA4E1426AF839CBF079F76A9@MWHPR08MB3520.namprd08.prod.outlook.com> <980E5BB9-CA75-479A-8448-7C4AD76EC1CE@cisco.com> <BY3PR08MB70609B01671FCCC5837786DDF7599@BY3PR08MB7060.namprd08.prod.outlook.com>
In-Reply-To: <BY3PR08MB70609B01671FCCC5837786DDF7599@BY3PR08MB7060.namprd08.prod.outlook.com>
Accept-Language: fr-BE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.51.21071101
authentication-results: nokia.com; dkim=none (message not signed) header.d=none;nokia.com; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: eace998c-bc94-463a-5c5a-08d9507350bc
x-ms-traffictypediagnostic: PH0PR11MB4902:
x-microsoft-antispam-prvs: <PH0PR11MB4902E61320403497EF988F30A9E89@PH0PR11MB4902.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(136003)(39860400002)(366004)(396003)(346002)(376002)(8936002)(224303003)(186003)(86362001)(966005)(5660300002)(21615005)(2616005)(36756003)(296002)(110136005)(53546011)(6506007)(6486002)(316002)(91956017)(122000001)(76116006)(478600001)(2906002)(38100700002)(64756008)(66556008)(33656002)(83380400001)(66476007)(66946007)(166002)(30864003)(6512007)(66574015)(71200400001)(66446008)(38070700004)(45980500001)(579004)(559001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_1AA5592A72B24522B144675237C2F0FCciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: eace998c-bc94-463a-5c5a-08d9507350bc
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Jul 2021 20:24:05.4005 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: M0hlxq7IeDGDDI2w/BGUbHZFnRJl0FTtkDCNVgxm8uFhtBYDVqJLYWfhD3LD2qfDnkYmxbue1QXoBjkWccghAw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR11MB4902
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.22, xbe-aln-007.cisco.com
X-Outbound-Node: alln-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/PzFAH6UBnTOaMP9hiW-m_3YcToM>
Subject: Re: [bess] Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jul 2021 20:24:17 -0000

Jorge,

Another sorry for the belated reply…

See below for EV2> based on your reply and on the -14. I have also removed everything where we are in agreement.

As my review/ballot is dated January, I will review it again and update my ballot accordingly.

Regards

-éric

From: "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>
Date: Tuesday, 8 June 2021 at 12:50
To: Eric Vyncke <evyncke@cisco.com>, The IESG <iesg@ietf.org>, "draft-ietf-bess-evpn-proxy-arp-nd@ietf.org" <draft-ietf-bess-evpn-proxy-arp-nd@ietf.org>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "Bocci, Matthew (Nokia - GB)" <matthew.bocci@nokia.com>, "jeanmichel.combes@orange.com" <jeanmichel.combes@orange.com>
Subject: Re: Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)

Hi Eric,

Sorry for my belated reply to yours too!

Thanks again for taking the time to review our response. We just published revision 14.
See my comments in-line with [jorge2] to the outstanding points (I believe I addressed all pending points), and please let me know if that is enough to clear your DISCUSS.

Thanks!
Jorge


From: Eric Vyncke (evyncke) <evyncke@cisco.com>
Date: Monday, May 3, 2021 at 4:37 PM
To: Rabadan, Jorge (Nokia - US/Mountain View) <jorge.rabadan@nokia.com>, The IESG <iesg@ietf.org>
Cc: draft-ietf-bess-evpn-proxy-arp-nd@ietf.org <draft-ietf-bess-evpn-proxy-arp-nd@ietf.org>, bess-chairs@ietf.org <bess-chairs@ietf.org>, bess@ietf.org <bess@ietf.org>, Bocci, Matthew (Nokia - GB) <matthew.bocci@nokia.com>, jeanmichel.combes@orange.com <jeanmichel.combes@orange.com>
Subject: Re: Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)
Hello Jorge,

Sorry for belated reply… Your email was kind of lost in my post-IETF-110 filled in-tray...

See below for EV> (for the many comments, as you have addressed them, I replied nothing).

Once I am clear about how normal DAD (i.e., non optimized by your document) continues to work, then I am clearing my DISCUSS. So, more explanations by email or in the I-D are welcome.

Regards

-éric


From: "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>
Date: Thursday, 18 March 2021 at 09:04
To: Eric Vyncke <evyncke@cisco.com>, The IESG <iesg@ietf.org>
Cc: "draft-ietf-bess-evpn-proxy-arp-nd@ietf.org" <draft-ietf-bess-evpn-proxy-arp-nd@ietf.org>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "bess@ietf.org" <bess@ietf.org>, "Bocci, Matthew (Nokia - GB)" <matthew.bocci@nokia.com>, "jeanmichel.combes@orange.com" <jeanmichel.combes@orange.com>
Subject: Re: Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)

Hi Éric,

Thanks for this, it is very useful. Please see my comments in-line with [jorge].
We just published a revision, addressing yours and all the comments received in all the reviews.

Thanks again!
Jorge

From: Éric Vyncke via Datatracker <noreply@ietf.org>
Date: Thursday, January 21, 2021 at 3:13 PM
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-bess-evpn-proxy-arp-nd@ietf.org <draft-ietf-bess-evpn-proxy-arp-nd@ietf.org>, bess-chairs@ietf.org <bess-chairs@ietf.org>, bess@ietf.org <bess@ietf.org>, Bocci, Matthew (Nokia - GB) <matthew.bocci@nokia.com>, Bocci, Matthew (Nokia - GB) <matthew.bocci@nokia.com>, jeanmichel.combes@orange.com <jeanmichel.combes@orange.com>
Subject: Éric Vyncke's Discuss on draft-ietf-bess-evpn-proxy-arp-nd-11: (with DISCUSS and COMMENT)
Éric Vyncke has entered the following ballot position for
draft-ietf-bess-evpn-proxy-arp-nd-11: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-bess-evpn-proxy-arp-nd/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Thank you for the work put into this document. This system could indeed be very
useful but I am afraid that this is a very complex system especially for IPv6
NDP.

Minor regret in the shepherd write-up as the WG summary did not include any
comment on the WG consensus.

Thanks to Jean-Michel Combes for its Internet directorate review at:
https://datatracker.ietf.org/doc/review-ietf-bess-evpn-proxy-arp-nd-11-intdir-telechat-combes-2021-01-20/
as Jean-Michel added some important comments, please review them as well as I
support them especially those around DAD that should be a blocking DISCUSS
point.

I also second Erik Kline's DISCUSS points.

Question to the authors and BESS WG chairs: was this document submitted to a
6MAN/V6OPS WGs review ? This is where all IPv6 experts live :-)
EV2> Still waiting for a reply on this (mainly to update the processes for similar documents), nothing is blocking for this one.


Please find below some blocking DISCUSS points, some non-blocking COMMENT
points (but replies would be appreciated), and some nits.

I hope that this helps to improve the document,

Regards,

-éric

== DISCUSS ==

Would RFC 8929 be enough to solve the problem ?
[jorge] I found RFC8929 an interesting reading, thanks for the reference. However, unless I’m missing something the use-case is very different.
It seems RFC8929 tries to reduce broadcast domains by using MLSNs where each link is its own broadcast domain. In EVPN BDs, the idea is reduce the control plane Broadcast/Multicast flooding among PEs of the same BD by replacing them with BGP EVPN routes. For ARP/ND, this basically means we learn at the ingress PE by snooping ARP/NAs and advertise the entries in EVPN MAC/IP routes so that the egress PE learns ARP/ND entries, and can reply to its local ARP-Requests/NS. Also in RFC8929, even for the bridging proxy, it seems that the proxy appears as an IPv6 host on the backbone, which is not the case in this document. Another difference is that the proxy in RFC8929 uses only ND messages to register bindings and in our document, we also use static entries and EVPN messages (in addition to snooped ARP and NA messages).
Please let me know if you see it otherwise.

EV> the use case is indeed different but the handling of new ND code should be the same or similar even if the ‘transport/sharing’ of information is different. Moreover RFC 8929 has been published by an IPv6-heavy WG.
[jorge2] are you suggesting to add a reference to RFC8929 in the introduction, for ND only? Let me know if you think that would help.

EV2> Indeed, at the bare minimum a reference to RFC 8929 should appear in the introduction with some explanations on why it is not applicable (the use case is very similar in my mind if you see the multi-link subnet (MLSN) as the broadcast domain attached to a PE). The major difference is how the control plane is implemented: either with BGP or with ND.
EV2> RFC 8929 also goes deep into the complex items of ND. So, re-using part of the RFC 8929 techniques would be useful.


-- Section 3 --
"A Proxy-ARP/ND implementation MAY support all those sub-functions or only a
subset of them.", I am afraid that it is mandatory that the reply and
duplicate-ip must be coupled: either both of them are active or none of them
are active else the system allows for duplicate IP addresses.
[jorge] the new text is as follows, let me know if it is okay. Note that the duplicate ip detection on the PEs is new in this document, and we didn’t want to make it mandatory we allow backwards compatibility with RFC7432 EVPN PEs that do proxy-ARP/ND.

   A Proxy-ARP/ND implementation MUST at least support the Learning,
   Reply and Maintenance sub-functions.  The following sections describe
   each individual sub-function.

EV> this is a progress of course but I am still puzzled how duplicate address detection can work then ? Failing to do DAD can cause very critical operational issues. Or do you rely on other mechanisms ?
[jorge2] ok, I see your point, changed the text in rev 14.
“A Proxy-ARP/ND implementation MUST at least support the Learning, Reply, Maintenance and Duplicate IP detection sub-functions”

EV2> Do not forget the Oxford coma after ‘maintenance’

----%<-----%<------x

-- Section 3.2 --
Why not flooding to all other PEs the ARP/NS with unknown options ? It would be
safer.
[jorge] yes, the new text is as follows, let me know please:

   f.  A PE MUST only reply to ARP-Request and NS messages with the

       format specified in [RFC0826] and [RFC4861] respectively.

       Received ARP-Requests and NS messages with unknown options SHOULD

       be either forwarded (as unicast packets) to the owner of the

       requested IP (assuming the MAC is known in the Proxy-ARP/ND table

       and BD) or discarded.  An option to flood ARP-Requests/NS

       messages with unknown options MAY be used.  The operator should

       assess if flooding those unknown options may be a security risk

       for the EVPN BD.  An administrative option to control this

       behavior ('unicast-forward', 'discard' or 'forward') SHOULD be

       supported.  The 'unicast-forward' option is described in

       Section 3.4.

EV> please note that the ‘forward’ behavior does not seem to be listed as a sub-function
[jorge2] Not listed as a specific sub-function but ‘forward’ is the flooding behavior when the ARP-Request/NS is received and  the lookup in the proxy-ARP/ND table is unsuccessful, as described in section 3. I changed the bullet f) a bit for clarity:
   f.  For Proxy-ARP, a PE MUST only reply to ARP-Request with the
       format specified in [RFC0826].  For Proxy-ND, a PE MUST reply to
       NS messages with the format and options specified in [RFC4861],
       and MAY reply to NS messages containing other options.  Received
       NS messages with unknown options MAY be forwarded (as unicast
       packets) to the owner of the requested IP (assuming the MAC is
       known in the Proxy-ARP/ND table and BD).  An administrative
       choice to control the behavior for received NS messages with
       unknown options ('unicast-forward', 'discard' or 'forward') MAY
       be supported.  The 'forward' option implies flooding the NS message
       based on the MAC DA.  The 'unicast-forward' option is described
       in Section 3.4.  If 'discard' is available, the operator should
       assess if flooding NS unknown options may be a security risk for
       the EVPN BD (and is so, enable 'discard'), or if, on the
       contrary, not forwarding NS unknown options may disrupt
       connectivity.

EV2> the text should also state that NS messages MAY be ‘discarded’ to be consistent with the administrative choice.
EV2> in the ‘MAY be forward’, the text is only about unicast while the administrative choice includes the ‘forward’ / flooding
EV2> the administrative choice should also include ‘reply’ (even if I really dislike this choice as it can break badly things)
EV2> strongly suggest to add a ‘SHOULD forward’ or ‘This document RECOMMEND to ‘forward’’
---%<-----%<-------

----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Consider adding a section about host not doing GARP or doing no DAD or
optimistic DAD.
[jorge] the document does not impose the use of GARP or DAD or ODAD, or its absence. Could you please elaborate what you would like to see in that section?

EV> what would be the impact of a CE moving ‘silently’ (no GARP/DAD/ODAD) from PE1 to PE2 ?
[jorge2] Added the following paragraph at the end of section 3:
In a network where CEs move between PEs, the Proxy-ARP/ND function
   relies on the CE signaling its new location via GARP or unsolicited
   NA messages so that tables are immediately updated.  If a CE moves
   "silently", that is, without issuing any GARP or NA message upon
   getting attached to the destination PE, the mechanisms described in
   Section 3.5 make sure that the Proxy-ARP/ND tables are eventually
   updated.

EV2> Good for the text, let’s hope though that the mechanism in section 3.5 does the job


---%<----%<--------

-- Section 2.1 --
I would have assumed that the multicast nature of IPv6 address resolution would
cause more problems than IPv4 ARP. The use of link-local multicast groups do
not usually help as MLD snooping is often disabled in switches for link-local.
Not to mention that there could be more IPv6 addresses per node than IPv4
address and IPv6 addresses keep changing. Do the authors have data to back this
section ?
[jorge] I added a sentence in that respect. As a side note, one of the references that we include claims that the use of SN-multicast addresses in NS messages is actually better than broadcast in ARP, given that SN-multicast IP Das can be easily identified and discarded at the receiving CEs (assuming that the PEs do not have MLD snooping enabled) https://delaat.net/rp/2008-2009/p23/report.pdf

EV> I failed to see the added sentence in -13
EV> the URL you wrote above does not work anymore... Also, quite an old reference
[jorge2] you’re right - I removed the reference since it no longer exists. Although illustrative, It is not important to understand the text anyway. The paragraph about mcast is this one:
The issue might be better in IPv6 routers if MLD-snooping was
   enabled, since ND uses SN-multicast address in NS messages; however,
   ARP uses broadcast and has to be processed by all the routers in the
   network.  Some routers may also be configured to broadcast periodic
   GARPs [RFC5227].  The amount of ARP/ND flooded traffic grows
   exponentially with the number of IXP participants, therefore the
   issue can only grow worse as new CEs are added.

EV2> The text does not address the fact that IPv6 nodes have more than 1 IPv6 address, which keeps changing.
EV2> The text does not justify the ‘exponentially’, I would have assumed linearly (or even perhaps squared but not exponential)

---%<-----%<-------

-- Section 3 --
An IPv6 example would also be useful as NS is not like ARP.
[jorge] added:

   In the same example, if we assume IP1, IP2, IP3 and IP4 are now IPv6

   addresses and Proxy-ARP/ND is enabled in BD1:



   1.  PEs will start adding entries in a similar way as for IPv4,

       however there are some differences:



       A.  IP1->M1 and IP2->M2 are learned as dynamic entries in PE1 and

           PE2 respectively, by snooping NA messages and not by snooping

           NS messages.  In the IPv4 case, any ARP frame can be snooped

           to learn the dynamic Proxy-ARP entry.  When learning the

           dynamic entries, the R and O Flags contained in the snooped

           NA messages will be added to the Proxy-ND entries too.



       B.  PE1 and PE2 will advertise those entries in EVPN MAC/IP

           Advertisement routes, including the corresponding learned R

           and O Flags in the ARP/ND Extended Community.



       C.  PE3 also adds IP4->M4 as dynamic, after snooping an NA

           message sent by CE4.



   2.  When CE3 sends an NS message asking for the MAC address of IP1,

       PE3 behaves as in the IPv4 example, by intercepting the NS, doing

       a lookup on the IP and replying with an NA if the lookup is

       successful.  If it is successful the NS is not flooded to the

       EVPN PEs or any other local CEs.



   3.  If the lookup is not successful, PE3 will flood the NS to remote

       EVPN PEs attached to the same BD and the other local CEs as in

       the IPv4 case.


EV> thank you

EV2> rereading it... and suggest to remove the comparison with IPv4 in the IPv6 example.

---%<-----%<------

-- Section 3.1.1 --

---%<-----%<----------

Is there a recommended setting for the O-flag?
[jorge] I modified the sentence as follows:
“These configured R and O Flags MAY be an administrative choice with a default value of 1.”
EV2> will need to think about the suggested value when I am reviewing the whole document


-- Section 3.2 --
Is "'anycast' is enabled in the BD" specified somewhere in this document ?
[jorge] good point. I added the following in the Learning sub-function section:
“This document specifies an "anycast" capability that can be configured for the proxy-ND function of the PE, and affects how dynamic Proxy-ND entries are learned based on the O Flag of the snooped NA messages. If the O Flag is zero in the received NA message, the IP->MAC SHOULD only be learned in case the IPv6 "anycast" capability is enabled in the BD. Irrespective, an NA message with O Flag = 0 will be normally forwarded by the PE based on a MAC DA lookup.”

EV2> Could also be in the terminology section (no hard feeling, just a suggestion)


...%<------%<----------



Why is there no IPv6 equivalent of e) ?
[jorge] we think the use of these ARP probes is not that common, whether IPv6 DAD procedures are performed by all CEs, and we want the PEs to reply to DAD messages if they can, to reduce the flooding among PEs. That’s how it has been implemented. Let me know if it is ok.

EV2> AFAIK, Windows does (at least did) ARP probe to do IPv4 DAD. So, it MUST either reply when there is a mapping or flood it.


In point f), "or discarded" can a packet with known IP->MAC mapping be
discarded as well ?
[jorge] do you mean with known options? I don’t think that needs to be specified but let me know if you think differently.

EV2> I meant with known mapping and unknown options. The new text is kind of strange as one sentence says “MAY be forwarded” and the next sentence says that there are 3 choices. A little ambiguous ?


---%<------%<--------


-- Section 3.6 --

---%<---------%<----------


I have re-read three times the "anti-spoofing MAC" part, and, I still do not
understand it... Is MAC-AS the black-hole address (then why not using a all 0
MAC address) or an alternative MAC address (but then who modifies the frame
header to the CE) ?
[jorge] this is about updating all the CE’s ARP/ND caches with the AS-MAC for the IP, to make sure the spoofer does not attract the traffic for the IP. Using an all 0s MAC would not be accepted by the CEs, and we wouldn’t know if there is traffic from the CEs to the ‘suspect’ IP. I re-worded it a bit, let me know if it is better:
“Optionally the PE MAY associate an "anti-spoofing-mac" (AS-MAC) to the duplicate IP in the Proxy-ARP/ND table. The PE will send a GARP/unsolicited-NA message with IP1->AS-MAC to the local CEs as well as an RT2 (with IP1->AS-MAC) to the remote PEs. This will update the ARP/ND caches on all the CEs in the BD, and hence all the CEs in the BD will use the AS-MAC as MAC DA when sending traffic to IP1. This procedure prevents the spoofer from attracting any traffic for IP1. Since the AS-MAC is a managed MAC address known by all the PEs in the BD, all the PEs MAY apply filters to drop and/or log any frame with MAC DA= AS-MAC. The advertisement of the AS-MAC as a "black-hole MAC" (by using an indication in the RT2) that can be used directly in the BD to drop frames is for further study.”

EV2> Humm re-re-reading this part of section 3.7. Isn’t this procedure also acting as a DoS against IP1 ? As all the traffic to IP1 will not reach the valid one ?
EV2> The terminology section is also a little unclear, it should at least use “MAC address” rather than “MAC”
EV2> more generally, this process is just piggy-backed on the proxy itself and does not bring a lot. I would suggest to remove this anti-spoofing part.


----%<---------%<----------