Re: [bess] AD Review of draft-ietf-bess-evpn-vpws-07

Sami Boutros <sboutros@vmware.com> Fri, 03 February 2017 21:41 UTC

Return-Path: <sboutros@vmware.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 63D4A129571; Fri, 3 Feb 2017 13:41:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.92
X-Spam-Level:
X-Spam-Status: No, score=-1.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=onevmw.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1FScsLmT0Iz7; Fri, 3 Feb 2017 13:41:46 -0800 (PST)
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-co1nam03on0075.outbound.protection.outlook.com [104.47.40.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D2330129573; Fri, 3 Feb 2017 13:41:45 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=onevmw.onmicrosoft.com; s=selector1-vmware-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=oQWygX3G/WGfYt/VTIFkzgBdjbzpm4FC2DMpc/N7YlE=; b=l9RAz1NxA4E4iy0E4LKxEoedWM1ViIQiE9JKaFrD4Fpb+gZkq7ZlM9CDm6ldEKzlUlzQL6ktKFIR2C7pkW1InTjDrG5KhjAklaZ9iT7FJ1MmZlJSdiejypeb2CrTgoYeDhnwUKE7lgZdTixgTfX5zHu3nchO/eS0tvtVOq42yOM=
Received: from BN6PR05MB3009.namprd05.prod.outlook.com (10.173.19.15) by BN6PR05MB3009.namprd05.prod.outlook.com (10.173.19.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.888.5; Fri, 3 Feb 2017 21:41:43 +0000
Received: from BN6PR05MB3009.namprd05.prod.outlook.com ([10.173.19.15]) by BN6PR05MB3009.namprd05.prod.outlook.com ([10.173.19.15]) with mapi id 15.01.0888.015; Fri, 3 Feb 2017 21:41:42 +0000
From: Sami Boutros <sboutros@vmware.com>
To: "Alvaro Retana (aretana)" <aretana@cisco.com>, "draft-ietf-bess-evpn-vpws@ietf.org" <draft-ietf-bess-evpn-vpws@ietf.org>
Thread-Topic: AD Review of draft-ietf-bess-evpn-vpws-07
Thread-Index: AQHSd44kA2pNPLQMm0qn/KFCiMDXR6FXV1sA
Date: Fri, 03 Feb 2017 21:41:42 +0000
Message-ID: <88C160DC-F644-43D4-B538-B4568E6A0C16@vmware.com>
References: <71E62DB5-32E4-441D-9D22-290CFFC5BAD1@cisco.com>
In-Reply-To: <71E62DB5-32E4-441D-9D22-290CFFC5BAD1@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=sboutros@vmware.com;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [2601:642:4400:5082:2047:54bc:9ffc:52de]
x-ms-office365-filtering-correlation-id: 6fbb36b4-aba4-4095-9990-08d44c7d71b8
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:BN6PR05MB3009;
x-microsoft-exchange-diagnostics: 1; BN6PR05MB3009; 7:eRLP3qWx12omWKcHSHguyFrHfiM4WZE4eSqlc5aNkrO/zbVV1poRrhicLTCYNGNJra1okruQJy7YVsbhV6xw+X6ifRUHC8gfLCQx0yvAItu/iypRmBTmFTbMAE85qpGjYf489AGnukIQwqsIFcNt2pG0CK2WjC5JD7UmGzjpZqrrhLYNW0eosuswAZyj54dY/szm8EIOKGLYhyMI76Jt1QgV44GjGn54ajF6AePrP+PPXcKe9ZTTC8kRw2hrah2ICfrnAO8VNZsKPt+82KQM0oISN4JRa6YnmC0Y7bW4GlUlHC4vdArOe8m9QYMYSaFtGBebtIuvy5WthgMF04WxNAqopNBrzv/21y/m+DX693dOpvy1XD0y9yiRLArDExmCg6N2JOyyOblv+KT3h0/u8h8hhXKg+qMU+kRxrBvPmOOpHcCAo2NgFHgdWedXS0kEAwVvct0odNyxz76PzM8xqF+72aVfdDGqzjb4wkxihGk3sCM6PuQPV735GUKpznt/jhZxsaSz3QSblnnXYHdr+KBqRFE8wVsF8naPh0BIc7/uGJ/Vowf9ayHZYtqlq+Um; 20:VRpfSZOyYxdxZAk4o1OUsxjshB1poN29wUDllasDwql+yTkWFK6zBobu9vf/XWIyBRX574wIhlDOmUVZecskxcrwBYz5Kqcgi/o4/7sq9PUfodEX8xLr2+ixUkMlCDXAi5g4951zDMhchga9pm9Msc6P2P7C6sDrp8QEruLHBjI=
x-microsoft-antispam-prvs: <BN6PR05MB30098BC356660F90D038DFD4BE4F0@BN6PR05MB3009.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(61668805478150)(192374486261705)(138986009662008)(82608151540597)(95692535739014)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(102415395)(6040375)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6041248)(20161123564025)(20161123555025)(20161123560025)(20161123562025)(20161123558025)(6072148); SRVR:BN6PR05MB3009; BCL:0; PCL:0; RULEID:; SRVR:BN6PR05MB3009;
x-forefront-prvs: 02070414A1
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(7916002)(39450400003)(45904002)(199003)(377454003)(189002)(57704003)(25786008)(81156014)(50986999)(36756003)(2950100002)(68736007)(3660700001)(6436002)(189998001)(83716003)(38730400001)(99286003)(6246003)(122556002)(6306002)(229853002)(81166006)(6506006)(8666007)(54906002)(97736004)(2501003)(6486002)(6512007)(54896002)(33656002)(8936002)(5890100001)(82746002)(5660300001)(53936002)(77096006)(3280700002)(8676002)(54356999)(99936001)(5001770100001)(76176999)(2906002)(101416001)(53946003)(106116001)(105586002)(86362001)(6116002)(7736002)(92566002)(2900100001)(4326007)(102836003)(230783001)(236005)(106356001)(104396002); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR05MB3009; H:BN6PR05MB3009.namprd05.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: vmware.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/mixed; boundary="_004_88C160DCF64443D4B538B4568E6A0C16vmwarecom_"
MIME-Version: 1.0
X-OriginatorOrg: vmware.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Feb 2017 21:41:42.7157 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: b39138ca-3cee-4b4a-a4d6-cd83d9dd62f0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR05MB3009
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/iaUVIkQgpxtCLrU-FF31C-2grEM>
Cc: Jeffrey Zhang <zzhang@juniper.net>, "bess-chairs@ietf.org" <bess-chairs@ietf.org>, "bess@ietf.org" <bess@ietf.org>
Subject: Re: [bess] AD Review of draft-ietf-bess-evpn-vpws-07
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Feb 2017 21:41:52 -0000

Hi Alvaro,

Thanks for your review. Please have a look at attached draft w/ most of the comments addressed.

Please see comments inline Sami:

Thanks,

Sami
From: "Alvaro Retana (aretana)" <aretana@cisco.com<mailto:aretana@cisco.com>>
Date: Wednesday, January 25, 2017 at 8:39 PM
To: "draft-ietf-bess-evpn-vpws@ietf.org<mailto:draft-ietf-bess-evpn-vpws@ietf.org>" <draft-ietf-bess-evpn-vpws@ietf.org<mailto:draft-ietf-bess-evpn-vpws@ietf.org>>
Cc: "bess-chairs@ietf.org<mailto:bess-chairs@ietf.org>" <bess-chairs@ietf.org<mailto:bess-chairs@ietf.org>>, Jeffrey Zhang <zzhang@juniper.net<mailto:zzhang@juniper.net>>, "bess@ietf.org<mailto:bess@ietf.org>" <bess@ietf.org<mailto:bess@ietf.org>>
Subject: AD Review of draft-ietf-bess-evpn-vpws-07
Resent-From: <alias-bounces@ietf.org<mailto:alias-bounces@ietf.org>>
Resent-To: <sajassi@cisco.com<mailto:sajassi@cisco.com>>, <ssalam@cisco.com<mailto:ssalam@cisco.com>>, <jdrake@juniper.net<mailto:jdrake@juniper.net>>, <dws@steinbergnet.net<mailto:dws@steinbergnet.net>>, <thomas.beckhaus@telekom.de<mailto:thomas.beckhaus@telekom.de>>, Sami Boutros <sboutros@vmware.com<mailto:sboutros@vmware.com>>, <jefftant@gmail.com<mailto:jefftant@gmail.com>>, <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>>
Resent-Date: Wednesday, January 25, 2017 at 8:39 PM

Dear authors:

Hi!

I just finished reading this document.  Please take a look at my comments below – I think they should be easy to resolve.  I will start the IETF Last Call when the comments have been addressed and a new revision has been published.

Thanks!

Alvaro.


Major:

M1. There are 8 authors listed on the front page.  Following the guidelines in the RFC Style Guide [RFC7322], we want the list to be at most 5.  Please work among yourselves to reduce the number of authors.  Alternatively, you can just list an Editor or two.


M2. From the Introduction: “Unlike EVPN where Ethernet Tag ID in EVPN routes are set to zero…in EVPN-VPWS, Ethernet tag ID in the Ethernet A-D route MUST be set to a valid value in all the service interface types.”  Zero is a valid value for the Ethernet Tag ID.

Sami: I will change the text from “a valid value” —> “non zero value”.

Section 3. (BGP Extensions) says that “the Ethernet Tag ID 32-bit field is set to the 24-bit VPWS service instance identifier”, but I couldn’t find a place where the document told me what a valid value is.  IOW, how can the “MUST” be enforced if there’s no clear indication of what is valid?  OTOH, any specification wants the fields to contain valid values, obviously!  What happens if the value is not valid?    BTW, all this is to say that without a proper explanation (which probably doesn’t belong in the Introduction), the whole paragraph is superfluous.

Sami: A valid value will be non-zero 24-bit, I will change the text to "non-zero 24-bit VPWS service instance identifier"


M3. The Introduction says that “For EVPL service, the Ethernet frames transported over an MPLS/IP network SHOULD remain tagged with the originating VID and any VID translation is performed at the disposition PE.”, later the same (or at least something similar) is mentioned in Section 2.1. (VLAN-Based Service Interface): “the Ethernet frames transported over an MPLS/IP network SHOULD remain tagged with the originating VID, and a VID translation MUST be supported in the data path and MUST be performed on the disposition PE.”  Please keep the normative language in one place – I am not fond of normative language in the Introduction; note that even though the result should be the same, the text is different (the “MUSTs” are used in 2.1).

Sami: Will change the introduction to say MUST be

M3.1. [minor] It is not clear in the text that EVPL service corresponds to VLAN-based service.  Please clarify that.  In fact, some of the flow of the document feel disjoint because slightly different terminology is used and no hint of how it all ties together is presented; mapping EPL/EVPL to the Service Interfaces, which are only mentioned in Section 2 (and very briefly in the Introduction – see M2).

Sami: In the introduction we have this text "[MEF] defines Ethernet Virtual Private Line (EVPL) service as p2p service between a pair of ACs (designated by VLANs) and Ethernet Private Line (EPL) service …” So, isn’t that sufficient?


M4. Section 1.2 is titled Requirements.  However, the list seems to include a combination of statements of fact (“EPL service access circuit maps to the whole Ethernet port”: this is pretty much the definition of EPL), solution-sounding lines (“Each VLAN individually (or <S-VLAN,C-VLAN> combination) will be considered to be an endpoint for an EVPL service”: not only does it sound like what the solution will do, but it is also the definition of EVPL), and statements that talk to the configuration and not what the technical solution described later can do (“A given PE could have thousands of EVPLs configured. It must be possible to configure multiple EVPL services within the same EVI.”: is there an actual scalability requirement?).     I would have expected actual requirements (for example: “EPL service access circuits MUST map to the whole Ethernet port”; normative language is not required) that I can then check against the solution – but it all sounds like a rehash of what was explained before.  ☹

Sami: Please have a look at the attached draft to see if you are OK with the section now, we can consider removing the section too.

M5. Section 3. (BGP Extensions) says that “This document proposes the use of the per EVI Ethernet A-D route to signal VPWS services. The Ethernet Segment Identifier field is set to the customer ES and the Ethernet Tag ID 32-bit field is set to the 24-bit VPWS service instance identifier.”  First of all [this is minor/a nit], if this document intends to be in the Standards Track then it is past the “proposing” phase, it is *specifying*.  As a specification, it is rather weak in some places; for example, RFC7432 says (as an example) that the “Ethernet Tag ID in all EVPN routes MUST be set to 0”: that is a strong statement of what is expected.  On the other hand, this document is modifying the behavior, but no Normative language is used.  [In general I don’t advocate for the use of Normative language everywhere, but in cases like this where the behavior is being changed from the base spec when using this extension, it seems necessary.]

M5.1. Section 3: “Ethernet Tag ID 32-bit field is set to the 24-bit VPWS service instance identifier” How should this be aligned into the larger field?

Sami: Changed the text to "This document specifies the use of the per EVI Ethernet A-D route to signal VPWS services. The Ethernet Segment Identifier field is set to the customer ES and the Ethernet Tag ID 32-bit field MUST be set to the 24-bit VPWS service instance identifier value."


M6. Section 3.1 (EVPN Layer 2 attributes extended community).

M6.1. For the P flag – “SHOULD be set to 1 for multihoming all-active scenarios”: in a multihoming all-active scenario, when would this flag not be set?  IOW, why is the “SHOULD” not a “MUST”.  A couple of paragraphs later: “…the PEs in the ES that are active and ready to forward traffic to/from the CE will set the P bit to 1”.  In the all-active scenario, is there a case where a PE would not be “active and ready”?  What does that mean?  Clarifying may justify the “SHOULD”.

Sami: changed the text to "MUST be set to 1 for multihoming all-active scenarios by  all active PE(s)."

M6.2. How should the other flags in the Control Flags field be assigned?  Please define a new registry and include the details in the IANA Considerations section.

Sami: We are already describing how the other control flags be assigned in the doc, we have 2 other Flags B and C, not sure why do we need a new registry?

M6.3. What should a remote PE do if it receives both the P and B flags set (or both unset)?  I know that in a single-active scenario they should not be on at the same time…but what should the receiver do?

Sami:  Added "In multihoming scenarios, both B and P flags MUST not be both set or both unset by a sender PE, and a receiving PE that receives an update with both B and P flags set or unset MUST not forward any traffic to the sender PE.”  Need to review this with other authors too.

M6.4. What happens if the B flag is set in the all-active scenario?   I know there was some discussion about this on the list – the document needs to explicitly talk about it.

Sami: Added text "B flag SHOULD not be set in the multihoming all-active scenario and MUST be ignored by receiving PE(s)."

M6.5. What units is the MTU in?  How is it encoded?

Sami: Added "L2 MTU (Maximum Transmission Unit) is a 2-octet value indicating the MTU in octets”

M6.6. “non-zero MTU SHOULD be checked against local MTU”  When is it ok not to check?  I’m wondering why this “SHOULD” is not a “MUST”, specially because the result of that check is a “MUST NOT”.

Sami: Changed to MUST.

M6.7. “As per [RFC6790]…the control word (C bit set) SHOULD NOT be used…”  Where in RFC6790 does it say that?  I searched for “control word”, but found nothing?  Also, this “SHOULD NOT” is in conflict with the definition of the C flag: “If set to 1, a Control word [RFC4448] MUST be present…”

Sami: changed text to "If a network uses entropy labels per [RFC6790] then the C Bit MUST not be set to 1 and control word MUST NOT be used when sending EVPN-encapsulated packets over a P2P LSP.”

Minor:

P1. Please add a reference for VPWS.

Sami: You mean PWE3 reference?

P2. The [MEF] reference didn’t work for me; on all tries the connection timed out.  Is it possible to find a more stable reference?

Sami: No clue here!

P3. There are several acronyms that won’t be familiar to the average reader and that need to be expanded on first use: ES, AD (A-D), EVI, VID, VNI, EP-LAN, EVP-LAN. I know that some of these are expanded in the Terminology Section, but in some cases that comes later in the text.

Sami: Done for what happen before terminology.

P4. The EVPN-VPWS term is introduced for the first time in the text at the bottom of page 3.  I take it that it refers to the solution presented in this document.  Please include a sentence at the top of the introduction to clarify – note that this tag could be useful in other places as well.

Sami: Please look at doc.

P5. “Ethernet tag field” (and not “Ethernet Tag ID”, which I’m assuming is the same thing) is used in several parts of the text.  Please be consistent.

Sami: Done.

P6. “VxLAN encap” is mentioned in the Introduction, and potential things about handling it…but there are no references and no additional mention anywhere else in the document.

P7. “mass withdraw” is mentioned in the Introduction (“…can be used for flow-based load-balancing and mass withdraw functions”),  in Section 4 (“…can be used for mass withdraw”), and finally Section 6.2 (the last section in the draft!) has a reference…  Please move it earlier in the document.

Sami: Done.

P8. S-VLAN, C-VLAN: expand and put a reference for them.

Sami: Done added to terminology.

P9. There is no Reference to any of the Extended Communities RFCs: 4360, 7153, etc…

Sami: Done.

P10. Please add Figure numbers/names.

Sami: Done.

P11. Section 3.1 (EVPN Layer 2 attributes extended community) defines 3 control *flags*, but they are referred to later in the text as “bits”.  Please be consistent.

Sami: Please have a look.

P12. Section 4 (Operation): s/with Next Hop attribute set/with the NEXT_HOP attribute set   Also, include an Informative reference to RFC4271.

Sami: Done.

P13. Section 6 (Failure Scenarios): “…the PE must withdraw all the associated Ethernet AD routes…”  Should that be a “MUST”?

Sami: Done.
P14. A reference to “[ietf-evpn-overlay]” appears in the Security Considerations, but there’s no Reference later on.


Nits:

N1. “Both services are supported by using…I.e., for both EPL and EVPL services…”  The second part of that explanation is a lot clearer, you might want to simplify by just leaving that part in.

Sami: I don’t get this.

N2. The introduction reads like a rushed summary of the solution, which results in potentially confusing text.  Suggestion: focus the Introduction on setting the stage/background – if you want to provide a summary of the solution (good idea!), then do it after the requirements.

Sami: I prefer to leave it as is.

N3. s/Ethernet Segment on a PE refer to/Ethernet Segment on a PE refers to

Sami: Done

N4. s/multi home…single home/multi homed…single homed

Sami: Done

N5. The text in Section 9 is misaligned.

Sami: Done.