Re: [bess] Alvaro Retana's Discuss on draft-ietf-bess-srv6-services-10: (with DISCUSS and COMMENT)

Ketan Talaulikar <ketant.ietf@gmail.com> Fri, 18 February 2022 15:53 UTC

Return-Path: <ketant.ietf@gmail.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7136F3A118C; Fri, 18 Feb 2022 07:53:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kgKKv0hHmS5u; Fri, 18 Feb 2022 07:53:22 -0800 (PST)
Received: from mail-vk1-xa35.google.com (mail-vk1-xa35.google.com [IPv6:2607:f8b0:4864:20::a35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B330E3A0659; Fri, 18 Feb 2022 07:53:22 -0800 (PST)
Received: by mail-vk1-xa35.google.com with SMTP id f12so5048176vkl.2; Fri, 18 Feb 2022 07:53:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=1g5xAEYxQhujYZcNrkkxvbtOgfrxxOIeDFqsXuTaXoA=; b=bg81WuM4jn53j2wGBTQ34jez3jtzn+1qtRloDwbbYCDfpMh+HFzAQ3cTdvBfchjJIu dm76nvqeCCpnQ+9Tm3cZTPDxGx51oC23pjPqOuyH/kRpp83QNJGsQIQ8q9w+AXjmaJSU Yl+yia2SdrJNjcxfEmR4AhFTi93X00O1KG+4rP8Vrwcyp0kPAqtgHoGP4+dMoyXcoGxG gxhcunmw49XlE+EDqCROcWB/sYas2tZReG+7WI+dS7oTn9hHhdbFYILhB0mtEtpkUK+o /dduDkzGfrJ3GD0vS7yq7F6pGHz+EWcsWlzp18fa+qjVvkkNxxDHl60EefgerXKoESc2 IRuQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=1g5xAEYxQhujYZcNrkkxvbtOgfrxxOIeDFqsXuTaXoA=; b=PZ9w2pLtdOYv65FU5lM9L5i4O0wF8RrLBTsxbf3piRPM2s9RSpzZAgXbvieLF6B3HO VsAlxAdgvAlNIsl/+qHriEluDYS/qm03DTghCMlafRfRwXc9kvj561MNhUvlFTA+a9ER IkhvjE5puQDTqOhcwV1tjCW7TWwuYVL16ckALYuf1vPIpSvzMQoo+lBRdVsgWlwFw2jd lOu/diwNFxkpho4MyIrozuFVHeWJWRSWFRzKgGLH7M1zAQnNjrkXSREySeN+xRFhlI+r 8hd3BOVsPIKcTTp7OAS0ggS7JgJC6qHFFF0xaceGIW5t9u/OENAUI8If4tzH8MPw55YK cXjQ==
X-Gm-Message-State: AOAM532jvG12tNcR/G4W2GDte49CuYwwF7Xd2Uk09mDZUfDRAxo4wBj9 MDoo2INZkFYtIwkr3w1632HLqtMouIJuH4US8L0=
X-Google-Smtp-Source: ABdhPJxkRDOOBIGiXxXUorwFgKU6WLOyVmv/4XwMKWEbosCLkSMLfCpucsH52HpSpLhfxMGss9Zg3cUxZ5NVPEcQpa0=
X-Received: by 2002:a05:6122:a1f:b0:32d:a4a4:6c27 with SMTP id 31-20020a0561220a1f00b0032da4a46c27mr3593846vkn.14.1645199600169; Fri, 18 Feb 2022 07:53:20 -0800 (PST)
MIME-Version: 1.0
References: <164494796487.31930.7636138656008278664@ietfa.amsl.com> <CAH6gdPzvdae5sGOS982OLdQbYv-qGBnC9BwF_LePhTjaUW+Ghg@mail.gmail.com> <CAMMESsw+28voyO-4prcNVh+d4y6r7wANQV8Qw0RVCrdcRHqOyQ@mail.gmail.com> <CAH6gdPzEm_xw8D0Dcs4wk15o38FSXgGBxj5DXTmfj0V7BUoX_Q@mail.gmail.com> <CAMMESsxi9mgnsNDd_bd1bEzQDpEDH913H5djRCFWzWx4A2gW4g@mail.gmail.com>
In-Reply-To: <CAMMESsxi9mgnsNDd_bd1bEzQDpEDH913H5djRCFWzWx4A2gW4g@mail.gmail.com>
From: Ketan Talaulikar <ketant.ietf@gmail.com>
Date: Fri, 18 Feb 2022 21:23:08 +0530
Message-ID: <CAH6gdPxe41GfJWiX8FgVY7HyXKR27Jh205N_ntx+kBy3dq6==A@mail.gmail.com>
To: Alvaro Retana <aretana.ietf@gmail.com>
Cc: bess-chairs@ietf.org, draft-ietf-bess-srv6-services@ietf.org, The IESG <iesg@ietf.org>, BESS <bess@ietf.org>, "Bocci, Matthew (Nokia - GB)" <matthew.bocci@nokia.com>
Content-Type: multipart/alternative; boundary="000000000000c0b4bb05d84ce144"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/hzlyAEoWyTNSO-1llyqOE9dFhfQ>
Subject: Re: [bess] Alvaro Retana's Discuss on draft-ietf-bess-srv6-services-10: (with DISCUSS and COMMENT)
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Feb 2022 15:53:26 -0000

Hi Alvaro,

Please check inline below for a few responses.


On Fri, Feb 18, 2022 at 5:52 PM Alvaro Retana <aretana.ietf@gmail.com>
wrote:

> On February 18, 2022 at 12:23:03 AM, Ketan Talaulikar wrote:
>
>
> Hi!
>
>
> > > > >
> ----------------------------------------------------------------------
> > > > > DISCUSS:
> > > > >
> ----------------------------------------------------------------------
> ...
> > > > > Clearly (from looking at rfc8986), not all endpoint behaviors
> apply to
> > > > > the services defined in this document. Should a receiver accept any
> > > > > endpoint behavior? What should a receiver do if a known but
> unrelated
> > > > > behavior (End, for example) is received?
> ...
> > > > > For any specific service (IPv4 VPN Over SRv6 Core, for example, to
> pick
> > > > > one), should the behaviors used "in practice" be enforced? What if
> > > > > different behavior is advertised? Can it safely be ignored?
>
> These two are related: Should only specific behaviors (per service) be
> accepted?
>
> If yes, I need you to specify which are those behaviors and what
> happens if a different (known) one is received.
>
> If no, what does it mean for the service if an unrelated behavior is
> advertised?
>

KT> So, this would be a result of a bug (?) on the egress PE that signals a
wrong behavior. Since the receiver is not validating, the service traffic
would still arrive at the egress PE but the handling might be erroneous due
to wrong behavior. The issue still manifests on the egress PE due to its
bug. Somewhat similar to what might happen if the egress PE were to signal
a label associated with a wrong context/service as a VPN label in MPLS VPNs.


>
>
>
>
> > > > > What should the receiver do if the endpoint behavior is known and
> > > > > applicable, but the attribute length is not set correctly?
> > > >
> > > > KT> Could you clarify which attribute length you are referring to?
> > >
> > > Sorry, I meant the argument... :-(
> >
> > KT> The behavior definition may or may not specify requirements of
> argument
> > lengths - the currently defined ones do not pose any limitation and so
> the
> > draft talks about zero or non-zero. We can clarify by saying something
> on the
> > lines that for behaviors where arguments apply, the argument length's
> > consistency must be verified against the behavior definition. Would that
> > address your comment?
>
> Yes, it would.
>

KT> Thanks.


>
> Also, if the verification fails then what?
>

KT> That is already covered by the existing text in sec 8 - such a route
would be considered ineligible during the selection of the best path by the
receiver.


>
>
>
> > > > >
> ----------------------------------------------------------------------
> > > > > COMMENT:
> > > > >
> ----------------------------------------------------------------------
> > > ...
> > >
> > > Just one comment:
> > >
> > >
> > > ...
> > > > > (8) §5:
> > > > >
> > > > > The SRv6 Service SID SHOULD be routable within the AS of the egress
> > > > > PE and serves the dual purpose of providing reachability between
> > > > > ingress PE and egress PE while also encoding the SRv6 Endpoint
> > > > > behavior.
> > > > >
> > > > > Is it ever ok for the SID to not be routable? If so, when? The
> > > > > "purpose of providing reachability" requires the SID to be
> routable.
> > > > > IOW, why is this behavior recommended and not required?
> > > >
> > > > KT> An SRv6 SID may not be routable across multiple IGP domains
> within a
> > > > provider network when routes are not leaked. There can be other
> > > > mechanisms like SR Policies (or other forms of tunneling) that
> provide
> > > > reachability. In other scenarios, due to local policy, the
> resolution may
> > > > be desired over an SR Policy instead of the best-effort reachability
> > > > provided by IGPs.
> > >
> > > If there's a route over a tunnel/SR Policy/whatever, I consider that
> > > routable. I am not just thinking about IGP-learned routes. The case
> > > that concerns me is when the ingress PE doesn't have a route at all
> > > (which is possible with the SHOULD). If a route should always exist
> > > (from any source) then it looks like the text should indicate a
> > > requirement and not a recommendation.
> >
> > KT> The should is to allow for use-cases such as the one specified in
> > https://datatracker.ietf.org/doc/html/draft-ietf-spring-segment-routing-
> > policy-18#section-8.5 - in this case, there may not be any reachability
> but
> > the local policy indicates triggering a request to a controller to
> compute SR
> > Policy path to the BGP NH on demand and then the resolution can happen
> once
> > such an SR Policy is successfully instantiated on the node.
>
> The end result is that the SID MUST be reachable before the ingress
> node can do anything with it.  As you say: "the resolution can happen
> once such an SR Policy is successfully instantiated on the node".  The
> mechanisms to provide that resolution (IGP, manual configuration,
> controller, etc.) is independent of the requirement for there to be
> reachability.
>

KT> I believe we were discussing the part of the "SID being routable" as in
via routing protocol (i.e. IGP/BGP transport). The next paragraph is one
that covers the base BGP "resolvability" part and does elaborate on the
various mechanisms like "alternate steering mechanisms" (e.g. any tunnel,
SR Policy, etc.).

Thanks,
Ketan



>
> Alvaro.
>