Re: [bess] AD Review of draft-ietf-bess-mvpn-extranet-03

Eric C Rosen <erosen@juniper.net> Tue, 17 November 2015 21:33 UTC

Return-Path: <erosen@juniper.net>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C52231B2E93; Tue, 17 Nov 2015 13:33:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.003
X-Spam-Level:
X-Spam-Status: No, score=-0.003 tagged_above=-999 required=5 tests=[BAYES_40=-0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uX1UJI-1ONEj; Tue, 17 Nov 2015 13:33:32 -0800 (PST)
Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0115.outbound.protection.outlook.com [207.46.100.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ADC5A1B2BEE; Tue, 17 Nov 2015 13:33:32 -0800 (PST)
Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=erosen@juniper.net;
Received: from [172.29.33.141] (66.129.241.10) by CY1PR0501MB2012.namprd05.prod.outlook.com (10.164.2.30) with Microsoft SMTP Server (TLS) id 15.1.331.20; Tue, 17 Nov 2015 21:33:29 +0000
To: "Alvaro Retana (aretana)" <aretana@cisco.com>, "draft-ietf-bess-mvpn-extranet@ietf.org" <draft-ietf-bess-mvpn-extranet@ietf.org>
References: <D2688C8A.E97D0%aretana@cisco.com>
From: Eric C Rosen <erosen@juniper.net>
Message-ID: <564B9D24.6030000@juniper.net>
Date: Tue, 17 Nov 2015 16:33:24 -0500
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <D2688C8A.E97D0%aretana@cisco.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Originating-IP: [66.129.241.10]
X-ClientProxiedBy: BY1PR10CA0038.namprd10.prod.outlook.com (25.160.197.48) To CY1PR0501MB2012.namprd05.prod.outlook.com (25.164.2.30)
X-Microsoft-Exchange-Diagnostics: 1; CY1PR0501MB2012; 2:uZyHzVeVPZ5GDuWM+Feg7FJwO/WrXgXC7wKmvUKKNGIalP+hQxZt9mmUQC+IZt5yn5KyDlQbq7f9OiicfOe8qBY/OM5TxDgCSYZ0IkqkHCwY8s0+crJZfdEwjLbJF0KcARojeciDvReTdvB2JNEJsg==; 3:7NT+1XsegpnlSbCzGth3HinkiMhxR5qCeuxltGy1uXP7Kof1so9Dq3apJl0yBJrhhV0mdxKTAAbjbIQHATkenX4ZSMy2ZAP4cQMu8qF9WQSlc5at3m9rrHEBc52wXEIy; 25:c2FH+PnRXUh3BWBR6fY5CLD4pBgfYIOvBYtqAyKmE/P9aS1o0lHbjFR9J7Ibsk7IsjOnB9oZE00B7Z7mt0CNzzEeEEEeoV3K8M5O7sTRsf13ZDzn/WxWXEd1hfNh15R26x5hGmb7jFIhVEQ62YhAGnbbJd5SxN3B5mfKPh43YSLm39IjygkwEP+CWjj4EWPUFIHeVsSWySgHZmN8sxepmi93B9eP1cruhi11IyCHtOqKimMq7KACajhGqJIROTgLYlz+ehwK/+FqJMx/ECUxmg==
X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR0501MB2012;
X-Microsoft-Exchange-Diagnostics: 1; CY1PR0501MB2012; 20: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; 4:H+onIF62dJhrk6sN7T2ic4kAlOM2JdHDip7sEZY/xm/eWlrPYl0hQHWFdJo8yzAoYqwweuA+ifpy0bmL/mx+wdSDkWH/RRG1rqfgTTjROMaDd7Pkvdt+QAlbfo0+Ly02GWoCJEeyqVc0NM0xdqVVEsJYHj5XS7BK+Mj+QXo3PrhJKw4Tapb1f4XvZZpf8ddJW8u8wEM42olXp4jWORIyv8uDIfvtRnOhZ/9m9RUiqQCb6eUP9n0UOd9YQseGIyLsNpzXC1FzxQGsprh7GqfgeIXeT+5hmzPfgFvPpFxh8+pI7KAAOdXDPcoNyDOPlgyEA+nh3v38n+Lsngm23lTNFI1efzvTUSf3NabMfjWA1NwfIRLKI7uR/7ShOxh5lY3f
X-Microsoft-Antispam-PRVS: <CY1PR0501MB201217A97B874767A0718A68D41D0@CY1PR0501MB2012.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:;
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(601004)(2401047)(8121501046)(5005006)(520078)(10201501046)(3002001); SRVR:CY1PR0501MB2012; BCL:0; PCL:0; RULEID:; SRVR:CY1PR0501MB2012;
X-Forefront-PRVS: 07630F72AD
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(6049001)(6009001)(479174004)(199003)(377454003)(24454002)(52544003)(51444003)(189002)(15374003)(2501003)(76176999)(87266999)(54356999)(586003)(65816999)(77096005)(4001350100001)(92566002)(50986999)(86362001)(23746002)(97736004)(105586002)(5001770100001)(80316001)(5008740100001)(40100003)(2950100001)(189998001)(81156007)(122386002)(47776003)(106356001)(87976001)(64126003)(65806001)(65956001)(66066001)(5007970100001)(59896002)(230783001)(5001960100002)(42186005)(83506001)(50466002)(5001920100001)(33656002)(36756003)(5004730100002)(101416001); DIR:OUT; SFP:1102; SCL:1; SRVR:CY1PR0501MB2012; H:[172.29.33.141]; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
Received-SPF: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: 1; CY1PR0501MB2012; 23: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
X-Microsoft-Exchange-Diagnostics: 1; CY1PR0501MB2012; 5:vDDAyuNDxi1b2HeHYVoZPtgUGUxR05nAlzfEw5J56E60opfkZegXQBSL6AYiwjEO0a4wJhvsidVj6M52Pj3C1z3w2vPb4Mtdr99+AKBjiJodz0iY+ZdjPvWVb07OQecRFDbqviK2RhoXbPT2fJZzAw==; 24:wWlmhXB+GikIH9OIPVetdbAW73uhjxd/n7EKqfi5a3XL20nz374bOty3rIHPWtMRaw4kw1bhRkWAX1ScXuNMMrlQ6Jo3LboD4Awr5Il4ask=
SpamDiagnosticOutput: 1:23
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Nov 2015 21:33:29.7747 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR0501MB2012
Archived-At: <http://mailarchive.ietf.org/arch/msg/bess/cDG9mX0wtAAi6GyF-RmOb1M0z9o>
Cc: "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "VIGOUREUX, MARTIN (MARTIN)" <martin.vigoureux@alcatel-lucent.com>, "bess@ietf.org" <bess@ietf.org>
Subject: Re: [bess] AD Review of draft-ietf-bess-mvpn-extranet-03
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2015 21:33:36 -0000

On 11/12/2015 2:50 PM, Alvaro Retana (aretana) wrote:
> Hi!
>
> I just finished reading this document.

[Eric]  Alvaro, thanks for your review.  I just posted revision -04, 
with a number of edits made in response to your comments.

> As mentioned by the WG chairs at the meeting in Yokohama, the technology
> in bess can be complex and hard to penetrate for the average (or novice)
> reader.  While the target of documents like this one is not always the
> average (or novice) reader, it is important that those readers
> (including the IESG and other review directorates) are able to at least
> understand what's going on.

[Eric] Often, reviewers from various directorates are assigned documents
that they are not qualified to review.  This is certainly a problem, but 
not a problem with the documents.  There is also a problem with certain 
ADs (NOT routing area ADs of course) who don't know nearly as much as 
they think they do.  Well, luckily for them, bidirectional multicast is 
not discussed in this document, as it really seems to freak them out!

> Because of the length of the document, it would be nice to include a
> "road map" to guide the reader (in general: "Section x talks about X,
> Section y covers Y, etc.").  It might be easier to include references to
> the specific sections in 1.4 (Overview).

[Eric]  I think the table of contents is as good a road map as we are 
going to get.  Adding additional pointers to the overview doesn't 
provide additional value, and most likely would just introduce errors.
>
> This is a long standards track document, so it is bound to have a lot of
> normative language.  On one hand I don't want to go overboard with
> explicitly mandating every little step..but at the same time we want to
> be clear as to what is "actually required for interoperation or to limit
> behavior which has potential for causing harm" [RFC2119].  Due to the
> potential of bad configurations resulting in incomplete/illdefined
> extranets, I can see why the behavior around RTs would require normative
> language.  However, there are some places where the use of rfc2119
> keywords may be lacking, not needed or inconsistent.  An example of
> inconsistency is this paragraph from Section 7.2.3.1. (When Inter-Site
> Shared Trees Are Used):
>
>     If VRF-S exports a Source Active A-D route that contains C-S in the
>     Multicast Source field of its NLRI, and if that VRF also exports a
>     UMH-eligible route matching C-S, the Source Active A-D route MUST
>     carry at least one RT in common with the UMH-eligible route.  The RT
>     must be chosen such that the following condition holds: if VRF-R
>     contains an extranet C-receiver allowed by policy to receive extranet
>     traffic from C-S, then VRF-R imports both the UMH-eligible route and
>     the Source Active A-D route.
>
> .. If the "route MUST carry at least one RT", why isn't the condition to
> be met also normative?  I don't want to belabor on this specific case,
> it is just an example.

[Eric] I think you are right about this case; I've fixed the text.

> However, I would appreciate it if the authors
> would scan the document for required or unneeded normative language.  I
> pointed at some cases in my comments below.

[Eric] I looked at each of the 200 or so occurrences of "must", 
"should", etc., and made some changes.  I think it's more consistent 
now, but the criteria for when to say "MUST" and when to say "must" have 
never been very clear.

> I do have a couple of items that I think are Major (see below) that I
> would like to see addressed before starting the IETF Last Call.

> Major:
>
>  1. Section 1.3. (Clarification on Use of Route Distinguishers) uses the
>     word "REQUIREs" in a couple of places.  In a strict manner, the
>     rfc2119 key words is "REQUIRED".  While I think that the meaning of
>     using "REQUIREs" should be obvious, please rephrase the text to
>     strictly use the rfc2119 language.

[Eric]  I changed "this document REQUIREs" to "it is REQUIRED by this
document".  Hopefully, the RFC editor won't ding me for unnecessary use
of the passive voice ;-)

>  2. Section 10 (Security Considerations)
>       * What is a "VPN security violation"?  It is mentioned in several
>         places, but it is not explicitly defined.  Please either add a
>         reference or be clear in what it is.

[Eric] A "VPN security violation" is just any situation in which a
packet gets delivered to a VPN where it isn't supposed to go.  I added a
definition in the terminology section, and also in the Security
Considerations section.

>       * Misconfiguration is a significant risk, for example assigning
>         the wrong RTs to the wrong routes.  I think that risk should be
>         mentioned.

[Eric] This is generally true of any technology based upon RFC4364.  I
added a sentence about this to the Security Considerations.

> Minor:
>
>  1. Section 1.1. (Terminology): "We will sometimes say that a route
>     "matches" a particular host if the route matches an IP address of
>     the host."  Given the previous definition (in the same paragraph) of
>     "match" ("the address prefix of the given route is the longest match
>     in that VRF for the given IP address") and the use of match there
>     makes it unclear whether you're talking about a host route or just
>     the longest match.

[Eric] I don't see the ambiguity here.  A given IP address matches a 
given route in the context of a given VRF if the route's address prefix 
is the longest match in that VRF for that address.  A host matches a 
route if the host's IP address matches the route.

>  2. Section 1.3. (Clarification on Use of Route Distinguishers)
>       * This section explains the "unique VRF per RD" condition a couple
>         of times — even though the explanation seems to be the same, it
>         would be nice if it was explained only once.

[Eric]  I think it is explained only once.  There is also an explanation
of the "unique RD per VRF" condition, which is different than the 
"unique VRF per RD" condition.

>       * ""default RD" (discussed above)"  Where this text appears is in
>         fact the first time that a "default RD" is mentioned.  I'm
>         guessing that this refers to the RD in the "unique VRF per RD"
>         condition, but please don't make the reader guess.

[Eric] You're right, the term "default RD" should not have been
introduced without explanation.  When a VRF is configured with only one
RD, we call that the "default RD" for that VRF.  When a VRF is
configured with two RDs, one is configured to be the "default RD", and
one is configured to be the "extranet RD".  I've tried to clear this up
in the text.

>  3. Section 4.1. (UMH-Eligible Routes)  The "MAY" in the second
>     paragraph appears to be part of the example.  Suggested new text:
>       * The UMH-eligible extranet C-source routes do not necessarily
>         have to be unicast routes, they MAY be SAFI-129 routes (see
>         Section 5.1.1 of   [RFC6513]).  If one wants, e.g., a VPN-R
>         C-receiver to be able to receive extranet C-flows from
>         C-sources in VPN-S, but one does not want any VPN-R system to
>         be able to send unicast traffic to those C-sources, then the
>         UMH-eligible routes exported from VPN-S and imported by VPN-R
>         may be SAFI-129 routes.  The SAFI-129 routes are used only
>         for UMH determination, but not for unicast routing.

[Eric] I've modified the text in Section 4.1 to fix this problem.  (The
new text is based on your suggestion, but is slightly different.)

>  4. Section 4.2. (Distribution of Unicast Routes Matching C-RPs and
>     DRs)  "It follows that if a VRF contains C-S, but does not contain a
>     C-RP for C-G, then the VRF must import a unicast route matching a
>     C-RP for C-G." and "Similarly, if a VRF contains a C-RP for C-G, but
>     does not contain C-S, the VRF must import a unicast route matching
>     the DR for C-S."  Should those "must" be a "MUST"?

[Eric] Yes, fixed.

>  5. Section 4.4.1. (The Extranet Source Extended Community)  "…only
>     useful when all the extranet routes from a given VRF are exported
>     with exactly the same set of RTs.  (Cf.  Section 4.3.1 of [RFC4364],
>     which does provide a mechanism…"   Is there any inference that
>     should be made from this text?  Should the Extranet Source Extended
>     Community not be used when the mechanism in rfc4364 is used?  Any
>     downsides if both are used?

[Eric] The CE puts the Extranet Source EC on a given IP route in order
to tell the PE that when the route is propagated as a VPN-IP route, it
should carry the set of RTs that have been provisioned for extranet
sources.  If the CE is using a different mechanism (such as described in
section 4.3.1 of RFC4364) to tell the PE exactly which RTs the route
should carry, there is no point in using the Extranet Source EC.  So it
doesn't make sense to use both mechanisms.  I've put in some explanatory
text saying characterizing the circumstances under which the CE SHOULD
NOT put on the EC, and saying that the PE SHOULD ignore the EC in those
circumstances.

>  6. Section 5.2. (Considerations for Particular Inclusive Tunnel Types)
>       * Please include a reference (or definition) for "inclusive
>         tunnel" (maybe in the Terminology).  I couldn't find one in
>         rfc6513, but did in rfc7582.

[Eric] I put in some text defining "Inclusive Tunnel", and making it 
clear that it is the same thing that is called "Inclusive Tree" in 
RFC6513. (Unfortunately, terminology is not entirely consistent across 
the entire set of MVPN documents.  RFC6625, e.g., uses "Inclusive 
P-tunnel".)

>       * The third paragraph ("In order for VRF-S to set up the P2MP…")
>         seems to explain what is needed for the setup, which is
>         something that I assume is standardized in a different
>         document.  If so, then the "MUST" shouldn't be normative in this
>         document.  s/MUST/must

[Eric] Okay, fixed.

>  7. Section 7.2.1. (Intra-AS I-PMSI A-D Routes)  "As specified in
>     [RFC6514]…the RTs carried by that route MUST be chosen…"  That
>     "MUST" is really in reference to rfc6514, so it shouldn't be
>     normative in this document.  If you want to stress the "MUST", then
>     one solution could be to quote the relevant text; otherwise s/MUST/must

[Eric] Okay, fixed.

>  8. It would be nice if section names were used in addition to section
>     numbers when referring to them in the text — that would make it
>     easier to recall (or look forward to) the text w/out having to go
>     look at the TOC over and over.

[Eric] The section numbers are inserted by means of the <xref
target="whatever"/> mechanism.  I experimented with adding the section
names by adding &quot;<xref target="whatever" format="title">&quot;
However, I found that xml2rfc often did not render the section names
properly, so I had to back this out.  I don't think it's a good practice 
to put the section names in by hand.

> [This point may be able to be addressed by the RFC Editor.]  It looks like you started doing this
> in some places in Section 7, but it is not consistent.

[Eric] Just an accident.

>  9. In several places the text reads: "This document provides
>     procedures…"  Please include a reference to the section where those
>     procedures are.

[Eric] I'd like to be able to say "this document covers X but does not 
cover Y" without having to stop and  give a complete set of references 
to every place in the document where something relevant to X is 
mentioned.  Leaving out a reference would just introduce an error, and 
in any event the proper sections can be found in the ToC.

> 10. Please expand on first use:
>       * s/S-PMSI/Selective Provider Multicast Service Interface (S-PMSI)
>       *   s/SSM/source-specific multicast (SSM)
>       *   s/I-PMSI/Inclusive-PMSI (I-PMSI)
>       *   s/MI-PMSI/Multidirectional I-PMSI (MI-PMSI)

[Eric] Done.

> 11. References: Update the reference to rfc4601 to
>     draft-ietf-pim-rfc4601bis.

[Eric] The last time I included a normative reference to an 
internet-draft, my document got stuck on the RFC Editor's queue for 
about 5 years!  If 4601bis becomes an RFC before the extranet draft does 
(which I admit does seem likely), this change can be made during the 
AUTH48 period (probably the RFC Editor will do it automatically).

> Nits:
>
>  1. Some replacements:
>       * s/misdelivery of data in those scenarios are outlined in those
>         Section 2.3/misdelivery of data in those scenarios are outlined
>         in Section 2.3
>       * (6.3.1) s/and Each such/and each such
>       * (7.1) s/"corresponds to" to/"corresponds" to

[Eric] Fixed.