Re: [bess] Shepherd's review of draft-ietf-bess-mvpn-fast-failover

<slitkows.ietf@gmail.com> Fri, 31 January 2020 19:49 UTC

Return-Path: <slitkows.ietf@gmail.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20037120043; Fri, 31 Jan 2020 11:49:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sbZhwTWOiQze; Fri, 31 Jan 2020 11:49:34 -0800 (PST)
Received: from mail-wm1-x32f.google.com (mail-wm1-x32f.google.com [IPv6:2a00:1450:4864:20::32f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83F14120020; Fri, 31 Jan 2020 11:49:33 -0800 (PST)
Received: by mail-wm1-x32f.google.com with SMTP id s10so9264582wmh.3; Fri, 31 Jan 2020 11:49:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:thread-index:content-language; bh=UOl5uT//iAenh2d61Nnr2WYiRBNtKc7CMTYZ4mbks9g=; b=D/GYtXvJvXc7Ow/Ut44geMOiQWYy6FrQGecSAVYS7mSoonvTDETitREFGaqjENLUWB wxsxVLfjH4oymDWdDXsWLY1NoGOdK8mWmdbDSQcHeqrKxj09GDKflq2lJzRg8pv6buxc Sp5p9fLd+hKDUu9dWwUj/gkvLk+900+2sfZKIl0BJxUO3XHxBSRuBOTebztm4p7M3MLc JvueHTvI7UiHT6GbBTktii06it3Yf+R8dCoaqpK66GmOpuUZOcajHmZXWZ/03nFb4d8S Kpu1NNDjoS+D9pu8LOdGcb2VhaGfX+GetdSvjoP0z9FCM75+lBe5mSWW/oXm1SDsZtP0 8k7A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:references:in-reply-to:subject:date :message-id:mime-version:thread-index:content-language; bh=UOl5uT//iAenh2d61Nnr2WYiRBNtKc7CMTYZ4mbks9g=; b=psum9rTp/Rgh8dKNRUfWOgYtdOFuSCSeS7lN0YbZWJxmvl/WFev2czhbd5rhynhD1E RFwALHiOK4ddN6RszDgIcN+J8If/cY3HgEI9PDvmZsOjIvRyxBjWI6QpGGxkp7oUgfD+ yDwoXlFmjbeyLa0aSu9WQKMjxjgC5LWaO2zkAMRusOglAcyxCBvRqdA6F9c2cwJfTKWN mq9+pKKYVkamPAC0QZrW7hZb2PRbe8/gbTqHApHHzYf0FBTZxj20EX4ZLfsWbwOocK7J +Vwx5414lxrs+23NjkCjicE8sxiE5QWzc1jxJbWS4fknJdNDEQ2TJfo0DGtvMJtwNZlG Xk+w==
X-Gm-Message-State: APjAAAWtaNlosRqmHhjQw4VyDoc/sGHxbWcoBe170X+yCJzz+dgsKMK5 Z+XVrS9+377mm3V+56gnumsZpIrneg==
X-Google-Smtp-Source: APXvYqzpWUa0cVNJHs9r9GZvcK13hs/C+wQXMKehbu+qQZPepuw5YJB513MIclJAhAeuuCphBPhR2Q==
X-Received: by 2002:a7b:c651:: with SMTP id q17mr14343372wmk.5.1580500171709; Fri, 31 Jan 2020 11:49:31 -0800 (PST)
Received: from SLITKOWS3YYU6 ([2001:420:c0c0:1008::d9]) by smtp.gmail.com with ESMTPSA id y185sm12755364wmg.2.2020.01.31.11.49.30 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 31 Jan 2020 11:49:31 -0800 (PST)
From: slitkows.ietf@gmail.com
To: "'Jeffrey (Zhaohui) Zhang'" <zzhang@juniper.net>, 'Greg Mirsky' <gregimirsky@gmail.com>
Cc: 'BESS' <bess@ietf.org>, bess-chairs@ietf.org
References: <CA+RyBmWOYUnrzrb=M=dvHpn-huh_WFJURF0spOzX_752V0gkVg@mail.gmail.com> <04f301d5c4a0$6cd81690$468843b0$@gmail.com> <CA+RyBmVsFVz42sbPRF=oJ=wH-dVrZRaMgf+Kqr6ne5SO3HC0+Q@mail.gmail.com> <068e01d5c562$ad9cf7f0$08d6e7d0$@gmail.com> <CA+RyBmUQpVoGQkBcSuXOyf0YQx4PY2oi0z9Z05xtZjZUE-x5BA@mail.gmail.com> <MN2PR05MB5981F2CF3BB66DFD060C6EA2D4070@MN2PR05MB5981.namprd05.prod.outlook.com>
In-Reply-To: <MN2PR05MB5981F2CF3BB66DFD060C6EA2D4070@MN2PR05MB5981.namprd05.prod.outlook.com>
Date: Fri, 31 Jan 2020 20:49:29 +0100
Message-ID: <00c901d5d86f$8dd69f00$a983dd00$@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00CA_01D5D877.EF9D9F10"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQITf8rm7BVfQAwI1oQ62g9CZIXWDgLbFqY8AhKUgq4CLe0tbAH4ilyuAWPiw7CnNh9LEA==
Content-Language: fr
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/Yd8WGJS5yiQzBwfoQitoeJyiZ3I>
Subject: Re: [bess] Shepherd's review of draft-ietf-bess-mvpn-fast-failover
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 Jan 2020 19:49:37 -0000

I’m fine with the proposal

 

 

From: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net> 
Sent: vendredi 31 janvier 2020 20:44
To: Greg Mirsky <gregimirsky@gmail.com>; slitkows.ietf@gmail.com
Cc: BESS <bess@ietf.org>; bess-chairs@ietf.org
Subject: RE: Shepherd's review of draft-ietf-bess-mvpn-fast-failover

 

Hi Greg, Stephane,

 

The first MAY should actually be a SHOULD; for the second MAY, it actually can go back to “can”.

 

Then this will match the previous RSVP-TE section. The “in this case” sentence is more about the result, not the action to take. Perhaps also change “in this case” to “as a result” in both sections?

 

Jeffrey

 

From: Greg Mirsky <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com> > 
Sent: Wednesday, January 22, 2020 3:41 PM
To: slitkows.ietf@gmail.com <mailto:slitkows.ietf@gmail.com> ; Jeffrey (Zhaohui) Zhang <zzhang@juniper.net <mailto:zzhang@juniper.net> >
Cc: BESS <bess@ietf.org <mailto:bess@ietf.org> >; bess-chairs@ietf.org <mailto:bess-chairs@ietf.org> 
Subject: Re: Shepherd's review of draft-ietf-bess-mvpn-fast-failover

 

Hi Jeffrey,

happy New Years (the Spring Festival is just upon us) and best wishes.

Stephane suggested to ask you another, hopefully quick, review of the part of this draft. Please see our discussion copied below:

Section 3.1.4:

As the document is standard track, could you introduce normative language in the expected behavior description ?
GIM>> Updating to the normative language as follows:

OLD TEXT:

   A PE can be removed from the UMH candidate list for a given (C-S,
   C-G) if the P-tunnel (I or S, depending) for this (S, G) is leaf
   triggered (PIM, mLDP), but for some reason internal to the protocol
   the upstream one-hop branch of the tunnel from P to PE cannot be
   built.  In this case, the downstream PE can immediately update its
   UMH when the reachability condition changes.

NEW TEXT:

   A PE MAY be removed from the UMH candidate list for a given (C-S,
   C-G) if the P-tunnel (I-PMSI or S-PMSI) for this (S, G) is leaf-
   triggered (PIM, mLDP), but for some reason internal to the protocol
   the upstream one-hop branch of the tunnel from P to PE cannot be
   built.  In this case, the downstream PE MAY immediately update its
   UMH when the reachability condition changes.
 

[SLI] I understand the first “MAY” as optional feature, however the second “MAY” is more a “SHOULD” IMO. Thoughts?

GIM2>>  Thank you for the clarification. The UMH list will certainly be updated once the reachability of the downstream PE changes. In some scenarios, such an update may be immediate, i.e., ASAP, but in some, it might be better to delay it. Would you suggest adding a note about the option to delay the update?

 

[SLI] Could you check with Jeffrey Zhang on this point ? I’m not enough expert here to tell what may be the best option. On my side, I just want the text to be clear 😊

 

What do you think of the use of the normative language in the newly updated text?

 

Best regards,

Greg

 

On Tue, Jan 7, 2020 at 5:59 AM <slitkows.ietf@gmail.com <mailto:slitkows.ietf@gmail.com> > wrote:

Hi Greg,

 

More inline,

 

 

From: Greg Mirsky <gregimirsky@gmail.com <mailto:gregimirsky@gmail.com> > 
Sent: mercredi 4 décembre 2019 23:22
To: slitkows.ietf@gmail.com <mailto:slitkows.ietf@gmail.com> ; BESS <bess@ietf.org <mailto:bess@ietf.org> >; bess-chairs@ietf.org <mailto:bess-chairs@ietf.org> 
Subject: RE: Shepherd's review of draft-ietf-bess-mvpn-fast-failover

 

Hi Stephane,

thank you for the review and your thoughtful comments. Please find my answers and notes in-lined under GIM>> tag.

Attached, please find the diff and copy of the working version.

 

Regards,

Greg

 

Hi,

 

Please find below my review of the document.

 

Nits:

 


Section 3.1.1: 

As the document is standard track, could you introduce normative language in the expected behavior description ?

 

GIM2>> My apologies, I've pasted the same text twice. I propose to remove "may be omitted" altogether. Hence the updated text:

   If BGP next-hop tracking is done for VPN routes and the root address
   of a given tunnel happens to be the same as the next-hop address in
   the BGP auto-discovery route advertising the tunnel, then the use of this

   mechanism for the tunnel will not bring any specific benefit. 

Do you see this version without any normative language as acceptable?

 

[SLI] Looks good thanks

 

 


Section 3.1.2:

As the document is standard track, could you introduce normative language in the expected behavior description ?

 

“This method should not be used”. Wouldn’t this be a normative statement ?

GIM>> Would the following modification of the text be acceptable:

OLD TEXT:

   This method should not be used when there is a fast restoration
   mechanism (such as MPLS FRR [RFC4090]) in place for the link.

NEW TEXT:
    Using this method when a fast restoration mechanism (such as MPLS FRR
   [RFC4090]) is in place for the link requires careful consideration
   and coordination of defect detection intervals for the link and the
   tunnel.  In many cases, it is not practical to use both methods at
   the same time.

 

[SLI] Are we strongly disencouraging the practice ? if yes, “it is not practical” is a bit too soft. I’m wondering if “is NOT RECOMMENDED” could be a good wording. But it is up to you.

GIM2>> The use of OAM in multi-layer fashion is a question I'd be interested to discuss. But I feel that it deserves a separate document and would prefer to leave the text as a note of caution for now.

 

[SLI] Ok

 



Section 3.1.4:

As the document is standard track, could you introduce normative language in the expected behavior description ?
GIM>> Updating to the normative language as follows:

OLD TEXT:

   A PE can be removed from the UMH candidate list for a given (C-S,
   C-G) if the P-tunnel (I or S, depending) for this (S, G) is leaf
   triggered (PIM, mLDP), but for some reason internal to the protocol
   the upstream one-hop branch of the tunnel from P to PE cannot be
   built.  In this case, the downstream PE can immediately update its
   UMH when the reachability condition changes.

NEW TEXT:

   A PE MAY be removed from the UMH candidate list for a given (C-S,
   C-G) if the P-tunnel (I-PMSI or S-PMSI) for this (S, G) is leaf-
   triggered (PIM, mLDP), but for some reason internal to the protocol
   the upstream one-hop branch of the tunnel from P to PE cannot be
   built.  In this case, the downstream PE MAY immediately update its
   UMH when the reachability condition changes.
 

[SLI] I understand the first “MAY” as optional feature, however the second “MAY” is more a “SHOULD” IMO. Thoughts?

GIM2>>  Thank you for the clarification. The UMH list will certainly be updated once the reachability of the downstream PE changes. In some scenarios, such an update may be immediate, i.e., ASAP, but in some, it might be better to delay it. Would you suggest adding a note about the option to delay the update?

 

[SLI] Could you check with Jeffrey Zhang on this point ? I’m not enough expert here to tell what may be the best option. On my side, I just want the text to be clear 😊

 

 

 

 


 
Section 3.1.6:

As the document is standard track, could you introduce normative language in the expected behavior description ?

GIM>> Sub-sections of 3.1.6 define the use of RFC 8562 and the new attribute. In the introduction to these sub-sections, I propose s/can/MAY/


>From a wider perspective, do you foresee other use case of signaling BFD information in BGP ? I’m just wondering if we may need something extensible for future use or not.

GIM>> Great question. BGP, and I'm speculating here, may be used to for other BFD-related scenarios. I think that we may use the Flags field.
[SLI] Is it enough or should you add some optional TLVs behind the discriminator ? (with nothing defined yet).

GIM2>> Great idea, thank you! Please see the updated figure and the text:

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |    BFD Mode   |                  Reserved                     |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                       BFD Discriminator                       |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                         Reserved  TLV                         |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+



                 Format of the BFD Discriminator Attribute

   Where:

      BFD Mode is the one octet long field.  This specification defines
      the P2MP value (TBA3) Section 7.1.

      Reserved field is three octets long and the value MUST be zeroed
      on transmission and ignored on receipt.

      BFD Discriminator is four octets long field.

      Reserved TLV field is four octets long.  It MAY be used for future
      extensions of the BFD Discriminator Attribute using Type-Length-
      Value format.  This specification defines that the value in
      Reserved TLV field MUST be zeroed on transmission and ignored on

      receipt.

 

[SLI] If your field is 4-bytes long, it is not extensible, I was thinking of options encoded as TLVs.

If there is no TLV, the attribute ends on BFD discriminator, the attribute length should tell if there are TLVs or not.

 

       0                   1                   2                   3
       0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |    BFD Mode   |                  Reserved                     |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                       BFD Discriminator                       |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
      |                         optional TLVs                         |
      +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

Another point I have missed, you should define error handling procedures for your attribute as per RFC7606.