Re: [bess] Questions about draft-ietf-bess-evpn-bfd
Donald Eastlake <d3e3e3@gmail.com> Fri, 03 May 2024 01:04 UTC
Return-Path: <d3e3e3@gmail.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 402B2C14F69F; Thu, 2 May 2024 18:04:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.845
X-Spam-Level:
X-Spam-Status: No, score=-1.845 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KHL4GYp-W9Wl; Thu, 2 May 2024 18:04:13 -0700 (PDT)
Received: from mail-yb1-xb34.google.com (mail-yb1-xb34.google.com [IPv6:2607:f8b0:4864:20::b34]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5796C14F5F1; Thu, 2 May 2024 18:03:44 -0700 (PDT)
Received: by mail-yb1-xb34.google.com with SMTP id 3f1490d57ef6-db4364ecd6aso9442034276.2; Thu, 02 May 2024 18:03:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714698224; x=1715303024; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=kCLYgtQr1vOx1DUVW3wA3hS7ntgyD6U/6wzOSl+uj0Y=; b=EXFwl8i/x2wSCODa4J3egrGZ78zWKUXqOvM9/R/i4d+xnBOBl/aYFcbHTwrcehUrdr h51ob2Z7ia9Uq/jKfoX0/dMRQIKnyjNR+0hzW4y+gRLcsURnE8cRaMrGMfCN5IH3cHgw O5z2EQC4puvkl6Ig9zsnENeY/m4ZZJIEilHuYZ9Ei8Ny3SOCb+LGcu9VXoF/jXISY0mQ yyH+ApxxzmLOOOofLnekcjv2/sPNpdkahjRjkr6NA03eot6z3L34HfOBNVG4j2j4bc1n PXBQF4FuRKyIoKLaYvNNw2mYp7oXZbL7Of/j6o7YRU9pxD6IiBLsGB5J1DsZ3WhTNcGs 0iSA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714698224; x=1715303024; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=kCLYgtQr1vOx1DUVW3wA3hS7ntgyD6U/6wzOSl+uj0Y=; b=JliQyfDeGLQrcIUwuxIDDod3VrWScqW+026M4hJYMnTbChZsjDSBT+NI1XHwP/1N4O o+wZKuLmig0JZHMOy19ikOq7u6RSdtfb7RkQ/nbmR2BP24fFmCqDoy2fw7LkiZ8zmFi7 cGxVtU1WXrgT+ufghr5hpAvoPqd3v8kqqb3VBM+uXqPGyBBb0T01BPWy2A4jdjhxO3Tv i5ywjsbjhI7O0ULq4oIKnUMuXnVFvlRzT1IXnWfgKM5F1gNa8RQIAGI8d8+y1ons1ulp zShv7zt5edVx7qsz0qBM8dBU9cPCIDQxp49Rbg6ojAAcmQkDGdYADnK/obAPt3Lz9yqO I84w==
X-Forwarded-Encrypted: i=1; AJvYcCWaFRFey93oiMBUt8/lyud1vxvSon1J0rMLp3h3YIcmyvkd/5tGeIghsMr+ts9klfWF8D7nPX/FocCX7+qolt+2
X-Gm-Message-State: AOJu0Yy4I8lnFcJ5IrUJ8WSFZwRoXlyOG7BLMN+ctl4JkAGv3Ap+oVlP 3FRsjQbQbCUuJlTm2YpoRb6MxtrPhT79ax/AuOLIjlOXQFyW06CI0i1Bfy0Jb+k/lUl/IvmeEg0 /RCir2eVt+grjxNmj/UPdb8Ny6QXkaStF
X-Google-Smtp-Source: AGHT+IEVLxT1HHoCLTR95b98Wa8fFk2xHtdmVg6tVYooZs1C9A4VXqI0VOv34N+ujVKUx5Y6KEC3G6aRXw2HSUl8Iz4=
X-Received: by 2002:a25:8402:0:b0:de0:de50:d6d4 with SMTP id u2-20020a258402000000b00de0de50d6d4mr1606099ybk.8.1714698223651; Thu, 02 May 2024 18:03:43 -0700 (PDT)
MIME-Version: 1.0
References: <PH0PR03MB6300096817865D7A1935B4CCF6382@PH0PR03MB6300.namprd03.prod.outlook.com>
In-Reply-To: <PH0PR03MB6300096817865D7A1935B4CCF6382@PH0PR03MB6300.namprd03.prod.outlook.com>
From: Donald Eastlake <d3e3e3@gmail.com>
Date: Thu, 02 May 2024 21:03:31 -0400
Message-ID: <CAF4+nEF4LL8VLyocWSWztk_QqBgRn9noYn-u5Pci9SpyBrY-VA@mail.gmail.com>
To: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>
Cc: "bess@ietf.org" <bess@ietf.org>, BFD WG <rtg-bfd@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000008493910617824a4d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/VfGN6fLORF9dylzoFjCmKLINjDM>
Subject: Re: [bess] Questions about draft-ietf-bess-evpn-bfd
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 May 2024 01:04:17 -0000
Hi Sasha, My apologies for the slow reply. Thanks for your questions. See below at <de>. On Sun, Mar 31, 2024 at 11:30 AM Alexander Vainshtein < Alexander.Vainshtein@rbbn.com> wrote: > Hi, > > I am reading the latest available version of the draft > <https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-bfd-06>, and > I have several questions to the authors. > > > > 1. RFC 5882 suggest that BFD sessions in general are coupled with > their clients which: > 1. Initiate establishment of these sessions > 2. React to state transitions of these sessions in some way > > The well-known clients can be routing protocols, redundancy mechanisms > etc. > > Can the authors please clarify which entities are expected to act as the > clients of the EVPN BFD sessions, and which actions can these clients take > upon, say, exit of an established session from its UP state? > <de> I would say that EVPN restoration mechanisms (redundancy and recovery/convergence) are the most logical clients for BFD sessions. > > 2. Section 4 “*Fault Detection for Unicast Traffic*” suggests > advertisement of “My” discriminator values in the BGP Discriminator > attribute in MAC/IP Advertisement (EVPN Type 2, a.k.a. RT-2) routes. > 1. Can the authors please clarify whether a different My > discriminator value is expected to be assigned for each MAC address that > have been locally learned by the given PE? > 2. Suppose that: > > i. PE-1 > and PE-2 participate in the same EVI and the same BD in this EVI > > ii. PE-1 > has locally learned MAC-1, assigned My Discriminaror D1 to it and > advertised D1 in the corresponding RT-2 > > iii. PE-2 > has locally learned MAC-2, assigned My Discriminaror D2 to it and > advertised D2 in the corresponding RT-2 > > Does the draft imply that a BFD session between PE-1 and PE-2 using D1 and > D2 as the cross-matching pairs of <My Discriminator, You Discriminator) > should be established? If not, how is the decision to establish – or not to > establish – such a BFD session is taken? > > 3. In the assumptions of (b) above, what should happen if PE-1 > withdraws RT-2 it has advertised for MAC-1 (e.g., because this MAC address > has been aged out, or because it has moved to another PE)? > 4. Suppose that: > > i. PE-1, > PE-2 and PE-3 participate in the same EVI and the same BD in this EVI > > ii. PE-1 > and PE-2 are attached to the same multi-homed Ethernet segment in > All-Active load-balancing mode > > iii. A > certain MAC address, MAC-1 has been locally learned by PE-1, but not by PE-2 > > iv. PE-3 > sends traffic with Destination MAC address MAC-1 to both PE-1 based on RT-2 > advertised for this MAC address and to PE-2 based on the per-EVI Ethernet > A-D (EVPN Type 1, a.k.a. RT-1) route > > Does the draft imply that PE-3 can verify its connectivity for MAC-1 to > PE-1 but not to PE-2? > > Does the draft imply that PE-2, upon receiving RT-2 for MAC-1 from PE-1 > allocates a “local” discriminator” for this MAC address? If yes, how is > this discriminator advertised? > <de> This document specifies BFD operating at the level of intra-PE tunnels, that is, part of the Network layer. So, I think the answer to 2a above is No. <de> On 2b, it would generally be a matter of local policy/configuration whether an attempt was made to start a BFD session. Such a session might be started when a label switched path is created. Or when the first data actually flows. Or whatever. And, on 2c, it is similarly a matter of local policy/configuration. The draft currently specifies a fake MAC address that can be used to advertise a discriminator if there is no learned MAC address available for this purpose but perhaps it should permit a discriminator to be advertised with an A-D Route. <de> On 2d, currently the draft indicates that PE-2 would advertise its discriminator by using an RT-2 for a fixed "fake" MAC address, TBD3, to be assigned. But, on reflection, PE-2 advertising this discriminator with an RT-1 may be a better technique. > > 3. Can the authors please clarify whether each PE where a certain > EVI/BD is instantiated, is expected to establish BFD session with all the > PEs from which it has received an IMET Route? If not, how is the decision > to establish – or not to establish – such a BFD session is taken? > > <de> I think the answer to this would commonly be Yes but, again, it is a matter of local policy/configuration. See 2b/2c above. The ingress PE, as I understand it, replicates packets based on IMET advertisements received. So, if this is to be monitored, an ingress PS if configured to use p2mp BFD is the head of a p2mp BFD session where each egress PE is a leaf. > > 3. Can the authors please clarify why the UDP port that is allocated > for 1-hop IP BFD (RFC 5881) is reused for EVPN BFD? > > <de> The BFD packets are encapsulated and sent through a tunnel so it seems to me that it should appear to BFD to be 1-hop. <de> Thanks, Donald =============================== Donald E. Eastlake 3rd +1-508-333-2270 (cell) 2386 Panoramic Circle, Apopka, FL 32703 USA d3e3e3@gmail.com > Your timely feedback will be highly appreciated. > > > > Regards, and lots of thanks, > > Sasha >
- [bess] Questions about draft-ietf-bess-evpn-bfd Alexander Vainshtein
- Re: [bess] Questions about draft-ietf-bess-evpn-b… Donald Eastlake