Re: [bess] Shepherd's review of draft-ietf-bess-nsh-bgp-control-plane-06
John E Drake <jdrake@juniper.net> Thu, 06 June 2019 13:04 UTC
Return-Path: <jdrake@juniper.net>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38E8E1200B5; Thu, 6 Jun 2019 06:04:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.71
X-Spam-Level:
X-Spam-Status: No, score=-2.71 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aVI2l9axXOte; Thu, 6 Jun 2019 06:04:35 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7973612006D; Thu, 6 Jun 2019 06:04:35 -0700 (PDT)
Received: from pps.filterd (m0108160.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x56D4XHU004416; Thu, 6 Jun 2019 06:04:33 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=PPS1017; bh=wEJ/hgD0gHVYwxEZXENhz2XjSkok8naYN2udMpHW9qY=; b=WW7WMkuzFtrFMtofHYS2X8p5WhW3DM21M41FjndZ7EQLQ2RPmaaaPsuhXehvnEmVg6KW oTMV242QGbSKxhoBnZNi3qMu6Aa7lVokUx127XKELIlS5IzfUv8r89jU2BNqTJ69Hitp SZEV2TG30hBrUQiEHXyGCiK8X0bwuMn9viWKrRmBAaYNXI4VrQtYDn0fQm2kOcYucmRS vtsSnGskJ8xMDufxjSUiRjIbiIEaBmkuzcoz55pyxVr5aztfzjzLoQG4XqNHb1NOm5W5 5TmytXVSCiLXH41c4E+lQa60RNWVvdGhdsN4fX7uADRtrbbtcLulLAjTvKzcM7C4KR0z Uw==
Received: from nam01-by2-obe.outbound.protection.outlook.com (mail-by2nam01lp2057.outbound.protection.outlook.com [104.47.34.57]) by mx0b-00273201.pphosted.com with ESMTP id 2sxy82rc5d-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 06 Jun 2019 06:04:33 -0700
Received: from BYAPR05MB5029.namprd05.prod.outlook.com (20.177.230.211) by BYAPR05MB5926.namprd05.prod.outlook.com (20.178.50.219) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1965.12; Thu, 6 Jun 2019 13:04:29 +0000
Received: from BYAPR05MB5029.namprd05.prod.outlook.com ([fe80::64da:93d7:da74:1e2a]) by BYAPR05MB5029.namprd05.prod.outlook.com ([fe80::64da:93d7:da74:1e2a%7]) with mapi id 15.20.1987.004; Thu, 6 Jun 2019 13:04:29 +0000
From: John E Drake <jdrake@juniper.net>
To: "stephane.litkowski@orange.com" <stephane.litkowski@orange.com>, "adrian@olddog.co.uk" <adrian@olddog.co.uk>, "draft-ietf-bess-nsh-bgp-control-plane@ietf.org" <draft-ietf-bess-nsh-bgp-control-plane@ietf.org>
CC: "bess@ietf.org" <bess@ietf.org>
Thread-Topic: Shepherd's review of draft-ietf-bess-nsh-bgp-control-plane-06
Thread-Index: AdTN15CohDC0LG//QgG1ys5nLdIbiQCi+QcAAL+AE4AAMyY/gAAlc7WACYApsoAA597sAAYifA8AAVvYvgAAAicqcA==
Content-Class:
Date: Thu, 06 Jun 2019 13:04:28 +0000
Message-ID: <BYAPR05MB50299694EC64977A714F53C4C7170@BYAPR05MB5029.namprd05.prod.outlook.com>
References: <6687_1551262912_5C7664C0_6687_242_18_9E32478DFA9976438E7A22F69B08FF924C199D40@OPEXCAUBMA3.corporate.adroot.infra.ftgroup> <090901d4d063$75aa6cf0$60ff46d0$@olddog.co.uk> <30790_1551796864_5C7E8A80_30790_14_1_9E32478DFA9976438E7A22F69B08FF924C19B882@OPEXCAUBMA3.corporate.adroot.infra.ftgroup> <036f01d4d42e$0ec01340$2c4039c0$@olddog.co.uk> <2409_1551949080_5C80DD18_2409_404_24_9E32478DFA9976438E7A22F69B08FF924C1A4AF2@OPEXCAUBMA3.corporate.adroot.infra.ftgroup> <070e01d4fac4$8478a4a0$8d69ede0$@olddog.co.uk> <6812_1556525855_5CC6B31F_6812_378_8_9E32478DFA9976438E7A22F69B08FF924C1F0D2D@OPEXCAUBMA3.corporate.adroot.infra.ftgroup> <038b01d516ed$f0a0fc00$d1e2f400$@olddog.co.uk> <24734_1559821523_5CF8FCD3_24734_7_1_9E32478DFA9976438E7A22F69B08FF924C249E6F@OPEXCAUBMA3.corporate.adroot.infra.ftgroup>
In-Reply-To: <24734_1559821523_5CF8FCD3_24734_7_1_9E32478DFA9976438E7A22F69B08FF924C249E6F@OPEXCAUBMA3.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.2.0.14
dlp-reaction: no-action
x-mcafeedlp-tagged: True
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=True; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Owner=jdrake@juniper.net; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2019-06-06T13:04:26.8898375Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=Juniper Internal; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Application=Microsoft Azure Information Protection; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=4ed7b14c-a777-47ee-b242-cd7e79ae191e; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Extended_MSFT_Method=Automatic
x-originating-ip: [66.129.241.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 52ae4749-2da1-4a38-c229-08d6ea7f8286
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:BYAPR05MB5926;
x-ms-traffictypediagnostic: BYAPR05MB5926:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <BYAPR05MB5926DA2B82091F3664F31550C7170@BYAPR05MB5926.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:813;
x-forefront-prvs: 00603B7EEF
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(136003)(376002)(346002)(39860400002)(396003)(13464003)(189003)(199004)(81156014)(7696005)(446003)(66574012)(229853002)(2906002)(66066001)(8676002)(476003)(53546011)(25786009)(74316002)(26005)(186003)(53946003)(30864003)(966005)(110136005)(11346002)(81166006)(68736007)(14454004)(2201001)(4326008)(5660300002)(486006)(2501003)(8936002)(86362001)(478600001)(99286004)(55016002)(52536014)(71190400001)(6116002)(6246003)(3846002)(33656002)(19627235002)(6436002)(7736002)(305945005)(66946007)(256004)(53936002)(73956011)(5024004)(66476007)(66446008)(66556008)(102836004)(64756008)(6506007)(6306002)(316002)(14444005)(9686003)(76176011)(76116006)(71200400001); DIR:OUT; SFP:1102; SCL:1; SRVR:BYAPR05MB5926; H:BYAPR05MB5029.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: avXJ74P/9LmMD2n8qrhird//33uRCwpJjnShojJDz9kzQpyS5gBjaKlyG28cYsbBKBVmSqu2H3CEdGY3rLFj0XhTfkwREi+a25vw6F4CHl5/aq0NGLVt+54cs/5ZETAnC3XfmwHu+EqwOsIIMpNUcMlganQXI3m0efnkDlLLPzAqQeInyZ5PwHxHC/XYtwlms439FCp6BAg2433exqGIjP/gnVYJbBW7eAUO3S130NK4yQGK6/MhtO4K4+uxOnWIREUYbvzR00EW+nA6dyeUnBBQQAF1yLcWjlIXdCQ1+mxZpgubYhPoSWAGC3YXjRGQifo3QeOSCY/b0zqwsEW8TYKS5j+Y5tBCp9GNqv6SYHGGXugKtCtMbIWNhgbHJdFy0wNwiwrQS9rEnpHDkQDPWD+Onnob8D7a9MlfNmsk4Gg=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 52ae4749-2da1-4a38-c229-08d6ea7f8286
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jun 2019 13:04:29.0140 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: jdrake@juniper.net
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR05MB5926
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-06-06_10:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1906060093
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/9rq2-aL1FVELqDKfbEI3cnLUz1c>
Subject: Re: [bess] Shepherd's review of draft-ietf-bess-nsh-bgp-control-plane-06
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Jun 2019 13:04:38 -0000
Hi, We can't time-out an attribute, we would have to time-out the SFPR w/ which it is associated. However, I don't think we should do that. Rather, I think what we should do is indicate that at any point in time an SFF selects its next hop from the intersection of the set of next hop RDs contained in the SFPR and the RDs contained in its local set of SFIRs. If the intersection is null the SFPR is unusable. Similarly, when this condition obtains the originator of the SFPR should either withdraw the SFPR or re-advertise it w/ a new set of RDs for the affected hop. As an aside, the use of Pool Identifier extended community effectively mitigates this issue. Yours Irrespectively, John Juniper Internal > -----Original Message----- > From: stephane.litkowski@orange.com <stephane.litkowski@orange.com> > Sent: Thursday, June 6, 2019 7:45 AM > To: adrian@olddog.co.uk; draft-ietf-bess-nsh-bgp-control-plane@ietf.org > Cc: bess@ietf.org > Subject: RE: Shepherd's review of draft-ietf-bess-nsh-bgp-control-plane-06 > > Hi Adrian, > > I'm not comfortable with the time-out of controlplane informations. > How do you handle a situation where there is an unknown SFIR-RD in a hop TLV > for a valid reason (the SF is down for a while !), so you are timing out the SFPR, > and eventually the SF is restored and comes back online ? You should, in this > case, readvertise the SFPR from the source. I think overloading could be > managed as usual by limiting the number of routes that a device could import > (per VRF context or globally). If there is unnecessary controlplane information, > that's the role of the operator to do the housekeeping, not the role of the > protocol/implementation. > > For the flowspec part, I'm fine, but we need to have the agreement from IDR > guys who master the topic. > > Brgds, > > Stephane > > > -----Original Message----- > From: Adrian Farrel [mailto:adrian@olddog.co.uk] > Sent: Thursday, May 30, 2019 15:45 > To: LITKOWSKI Stephane OBS/OINIS; draft-ietf-bess-nsh-bgp-control- > plane@ietf.org > Cc: bess@ietf.org > Subject: RE: Shepherd's review of draft-ietf-bess-nsh-bgp-control-plane-06 > > Hi Stephane, > > Thanks again for the thoroughness of your review and the time it has taken to > herd the necessary cats. > > * BGP ERROR HANDLING: > >>>> I don’t see the “error handling” behavior associated with this > >>>> attribute (discard, treat-as-withdraw…) > >>> > >>> I think the errors are covered by section 6 of RFC 4271, but we need > >>> to point to it. > >>> > >>> [SLI] You have added " Malformed SFP attributes, or those that in > >>> error in some way, MUST be handled as described in Section 6 of > [RFC4271]" > >>> This is not enough ad RFC7606 allows for a more "graceful" process > >>> of errors and it's up to each new attribute to have its own behavior > >>> in term of error processing. RFC7606 has some guidelines. > >> > >> This one will take a little more time to work up some text. > >> We'll get back to you. > >> > >> [SLI2] This is an important thing to address, and the IESG or Routing > >> Directorate may catch that as well. > > > > OK, a chunk more text. Does this work for you? > > > > Section 6 of [RFC4271] describes the handling of malformed BGP > > attributes, or those that are in error in some way. [RFC7606] > > revises BGP error handling specifically for the for UPDATE message, > > provides guidelines for the authors of documents defining new > > attributes, and revises the error handling procedures for a number of > > existing attributes. This document introduces the SFP attribute and > > so defines error handling as follows: > > > > o When parsing a message, an unknown Attribute Type code or a length > > that suggests that the attribute is longer than the remaining > > message is treated as a malformed message and the "treat-as- > > withdraw" approach used as per [RFC7606]. > > > > o When parsing a message that contains an SFP attribute, the > > following cases constitute errors: > > > > 1. Optional bit is set to 0 in SFP attribute. > > > > 2. Transitive bit is set to 0 in SFP attribute. > > > > 3. Unknown TLV type field found in SFP attribute. > > > > 4. TLV length that suggests the TLV extends beyond the end of the > > SFP attribute. > > > > 5. Association TLV contains an unknown SFPR-RD. > > > >[SLI] That's a bit weird to find this here as the Association TLV hasn't been > introduced. > > Wouldn't it be better to add a dedicated Error Handling section (e.g. 3.2.3) > after all the encodings ? > > I think we introduced it in the text at the top of the page (i.e. a few paragraphs > earlier). It reads OK to me and it is better to group together the format handling > issues in one place and with the text that describes the presence rules. > > > 6. No Hop TLV found in the SFP attribute. > > > > 7. No SFT TLV found in a Hop TLV. > > > > [SLI] That's strange, as section 3.2.1.3 says that the SFT TLV MAY be included, > so optional... > > Ah, this should read "No sub-TLV found in a Hop TLV". > Per 3.2.1.2 "At least one sub-TLV MUST be present." > > > 8. Unknown SFIR-RD found in a Hop TLV. > > > > o The errors listed above are treated as follows: > > > > 1., 2., 6., 7.: The attribute MUST be treated as malformed and > > the "treat-as-withdraw" approach used as per [RFC7606]. > > > > 3.: Unknown TLVs SHOULD be ignored, and message processing SHOULD > > continue. > > > > 4.: Treated as a malformed message and the "treat-as-withdraw" > > approach used as per [RFC7606] > > > > 5., 8.: The absence of an RD with which to corollate is nothing > > more than a soft error. The receiver SHOULD store the > > information from the SFP attribute until a corresponding > > advertisement is received. An implementation MAY time-out such > > stored SFP attributes to avoid becoming over-loaded. > > > > [SLI] That's not really an error, there may be a lot of transient > > situations where some routes haven't been learned yet leading to such > situation. > > I don't think that we need to time-out (even optionally) as timing out > > may create inconsistencies in the controlplane. What you could suggest > > is alarming to let the user know that something wrong is happening. > > Timing this out is a housekeeping thing. Without it there can be a bleed of router > resources. Might not be large, but over time (and with a bugged implementation > somewhere else in the network) it could add up. > > But: > 1. We should give guidance on the time-out. A largish time-out of the order of > 30 minutes would be fine. > 2. Yes, there should be a user notification when this happens. > > So... > > 5., 8.: The absence of an RD with which to corollate is nothing > more than a soft error. The receiver SHOULD store the > information from the SFP attribute until a corresponding > advertisement is received. An implementation MAY time-out such > stored SFP attributes to avoid becoming over-loaded. The time-out > value should be configurable and measured in minutes; a default > value of 30 minutes is suggested. Whenever an implementation > removes a stored SFP attribute, it SHOULD generate a notification > to the network operator. > > > * FLOWSPEC traffic steering: > >>>> NEW COMMENT: > >>>> Section 5: > >>>> "Note that each FlowSpec update MUST be tagged with the route > >>>> target of the overlay or VPN network for which it is intended." > >>> [SLI] You should be more clear that VPN-IPv4 and VPN-IPv6 Flowspec > >>> families must be used, it's not just a matter of RTs. > >> > >> A couple of the authors have discussed this a bit and we are puzzled. > >> > >> RFC 5575 section 8 discusses the applicability of Flowspecs to VPNs. > >> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.iana.org_ass > >> ignments_flow-2Dspec_flow-2Dspec.xhtml-23flow-2Dspec- > 2D2&d=DwIGaQ&c=H > >> AkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=CRB2tJiQePk0cT- > h5LGhEWH- > >> s_xXXup3HzvBSMRj5VE&m=glkXGEc4NSkB- > hCMWUdBqJXH99wj5ZoNOxWVONpiDA4&s=b > >> HwG2fvAY39OrCgk8UW871dLs6WSSNLSGfmHp7tB4lM&e= > >> does not list any VPN Flowspecs. > >> draft-ietf-pce-pcep-flowspec makes observations about VPN > >> identification and applicability to Flowspecs. > >> draft-ietf-idr-flowspec-l2vpn has a redefinition of SAFI 134 to apply > >> to Flowspecs to an L2VPN environment. > >> > >> [SLI2] I see various cases: > >> - traffic is coming from an IPVPNv4 and should be steered on an SFC, in such > >> a case RFC5575 Section 8 (AFI/SAFI 1/134) must be used, an RT is attached. > >> - traffic is coming from the global routing table and should be steered on an > >> SFC, in such a case the base RFC5575 using AFI/SAFI 1/133 must be used > >> and there is no RT attached. The trick here is that you need to set in the > >> action: - the SFC you want the traffic to be steered on as well as the VPN > >> to look the SFC for (Like a redirect RT + SFC steering). If there is no VPN > >> redirection, the SFC is considered to be available in the global routing table. > >> - traffic is coming from an L2VPN, this is similar to the L3VPN case. > >> - same considerations applies to IPv6 and VPNv6. > > > > OK, I think we need to separate two things. > > Section 5 is concerned with how to select among possible next hops on > > an SFP. That is, the packet is already classified and assigned to an > > SFP, but some load-balancing choices have to be made. So I don't think > > Section 5 is the place for this discussion. > > > > However, Section 7.4 is about classifying traffic onto SFPs. > > Specifically, it is about how to indicate, using BGP, which traffic > > flows should be assigned to which SPF at the Classifier component of > > the SFC system. This section seems to be relevant to the question you are > asking. > > > > But this second section seems to have it all covered by modelling > > exactly the flowspec function used in BGP flow specification and > > adding an extended community for SFC. > > > > [SLI] The comment was for section 7.4 (not section 5, sorry for the bad > pointer). > > Only the last sentence is raising a concern on my side. It makes me > > think that it only applies to FlowSpec VPN (1/134) while it could be > > used in many use cases. As you are just adding a new action extended > > community, maybe you can just remove the last sentence. Adding RTs or > > not will depend on the context the action will be used in. We may need > > a review from the IDR guys on this section. > > There are two separate things: > a) Place traffic from a VPN onto a specific SFC (use 1/134) > b) Place traffic onto an SFC that flows through a specific overlay or VPN > (use RT) > > We can do... > OLD > Note that each FlowSpec update MUST be tagged with the route target > of the overlay or VPN network for which it is intended to put the > indicated SPI into context. > NEW > One of the filters that the Flow Spec may describe is the VPN to > which the traffic belongs. Additionally, note that to put the > indicated SPI into context when multiple SFC overlays are present in > one network, each FlowSpec update MUST be tagged with the route > target of the overlay or VPN network for which it is intended. > END > > > You also had a separate email exchange with me about FlowSpec actions. You > flagged this up with the IDR chairs and it was noted that rfc5575bis says: > Some traffic action communities may interfere with each other. > Section 7.6 of this specification provides general considerations on > such traffic action interference. Any additional definition of a > traffic actions specified by additional standards documents or vendor > documents MUST specify if the traffic action interacts with an > existing traffic actions, and provide error handling per [RFC7606]. > John Scudder sent a note to the IDR list highlighting section 7.4 and asking for > any input, but there was no comment raised. > > However, we have returned to the relevant text and discussed it with the co- > author who requested what was in earlier versions. We are not all in agreement > that the text should be: > > OLD > [RFC5575] defines a set of BGP routes that can be used to identify > the packets in a given flow using fields in the header of each > packet, and a set of actions, encoded as extended communities, that > can be used to disposition those packets. This document enables the > use of RFC 5575 mechanisms by SFC Classifiers by defining a new > action extended community called "Flow Spec for SFC classifiers" > identified by the value TBD4. Note that other action extended > communities may also be present. > NEW > [RFC5575] and [I-D.ietf-idr-rfc5575bis] define a set of BGP routes > that can be used to identify the packets in a given flow using fields > in the header of each packet, and a set of actions, encoded as > extended communities, that can be used to disposition those > packets. This document enables the use of these mechanisms by > SFC Classifiers by defining a new action extended community called > "Flow Spec for SFC Classifiers" identified by the value TBD4. Note > that other action extended communities MUST NOT be present at > the same time: the inclusion of the "Flow Spec for SFC Classifiers" > action extended community along with any other action MUST be > treated as an error which SHOULD result in the Flow Specification > UPDATE message being handled as Treat-as-withdraw according to > [RFC7606] Section 2. > END > > I am sending that specific change to IDR as well. > > The -11 version will be posted SOON. > > Best, > Adrian > > > > > > > > _________________________________________________________________ > ________________________________________________________ > > Ce message et ses pieces jointes peuvent contenir des informations > confidentielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou > copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le > signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages > electroniques etant susceptibles d'alteration, Orange decline toute > responsabilite si ce message a ete altere, deforme ou falsifie. Merci. > > This message and its attachments may contain confidential or privileged > information that may be protected by law; they should not be distributed, used > or copied without authorisation. > If you have received this email in error, please notify the sender and delete this > message and its attachments. > As emails may be altered, Orange is not liable for messages that have been > modified, changed or falsified. > Thank you.
- [bess] Shepherd's review of draft-ietf-bess-nsh-b… stephane.litkowski
- Re: [bess] Shepherd's review of draft-ietf-bess-n… Andrew G. Malis
- Re: [bess] Shepherd's review of draft-ietf-bess-n… stephane.litkowski
- Re: [bess] Shepherd's review of draft-ietf-bess-n… Adrian Farrel
- Re: [bess] Shepherd's review of draft-ietf-bess-n… stephane.litkowski
- Re: [bess] Shepherd's review of draft-ietf-bess-n… Adrian Farrel
- Re: [bess] Shepherd's review of draft-ietf-bess-n… Andrew G. Malis
- Re: [bess] Shepherd's review of draft-ietf-bess-n… stephane.litkowski
- Re: [bess] Shepherd's review of draft-ietf-bess-n… Adrian Farrel
- Re: [bess] Shepherd's review of draft-ietf-bess-n… Adrian Farrel
- Re: [bess] Shepherd's review of draft-ietf-bess-n… stephane.litkowski
- Re: [bess] Shepherd's review of draft-ietf-bess-n… Adrian Farrel
- Re: [bess] Shepherd's review of draft-ietf-bess-n… stephane.litkowski
- Re: [bess] Shepherd's review of draft-ietf-bess-n… John E Drake
- Re: [bess] Shepherd's review of draft-ietf-bess-n… stephane.litkowski