[bess] following-up discussions on draft-liu-bess-srv6-evpn-validation

liu.yao71@zte.com.cn Fri, 02 August 2024 13:47 UTC

Return-Path: <liu.yao71@zte.com.cn>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29BACC14F6A0; Fri, 2 Aug 2024 06:47:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fFP0mhD5UM_M; Fri, 2 Aug 2024 06:47:23 -0700 (PDT)
Received: from mxhk.zte.com.cn (mxhk.zte.com.cn [63.216.63.40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DEE8CC14F699; Fri, 2 Aug 2024 06:47:20 -0700 (PDT)
Received: from mxct.zte.com.cn (unknown [192.168.251.13]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxhk.zte.com.cn (FangMail) with ESMTPS id 4Wb6Zp27FLz8XrXF; Fri, 2 Aug 2024 21:47:14 +0800 (CST)
Received: from mse-fl2.zte.com.cn (unknown [10.5.228.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mxct.zte.com.cn (FangMail) with ESMTPS id 4Wb6ZD2ghdz501bL; Fri, 2 Aug 2024 21:46:44 +0800 (CST)
Received: from njy2app04.zte.com.cn ([10.40.12.64]) by mse-fl2.zte.com.cn with SMTP id 472DkeBk080993; Fri, 2 Aug 2024 21:46:40 +0800 (+08) (envelope-from liu.yao71@zte.com.cn)
Received: from mapi (njy2app02[null]) by mapi (Zmail) with MAPI id mid203; Fri, 2 Aug 2024 21:46:43 +0800 (CST)
Date: Fri, 02 Aug 2024 21:46:43 +0800
X-Zmail-TransId: 2afa66ace343ffffffffe24-eac68
X-Mailer: Zmail v1.0
Message-ID: <20240802214643791FTeJWbh-i8Bdrrb1NRjuz@zte.com.cn>
Mime-Version: 1.0
From: liu.yao71@zte.com.cn
To: sajassi@cisco.com, zali@cisco.com, jorge.rabadan@nokia.com, bess-chairs@ietf.org
Content-Type: multipart/mixed; boundary="=====_001_next====="
X-MAIL: mse-fl2.zte.com.cn 472DkeBk080993
X-Fangmail-Anti-Spam-Filtered: true
X-Fangmail-MID-QID: 66ACE362.002/4Wb6Zp27FLz8XrXF
Message-ID-Hash: 4FQ2VZDWMSY67NRB6UODLAHMMMNWMVEG
X-Message-ID-Hash: 4FQ2VZDWMSY67NRB6UODLAHMMMNWMVEG
X-MailFrom: liu.yao71@zte.com.cn
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-bess.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: bess@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [bess] following-up discussions on draft-liu-bess-srv6-evpn-validation
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/lRLR8WTKfli3H52BDAqViwYx1gI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Owner: <mailto:bess-owner@ietf.org>
List-Post: <mailto:bess@ietf.org>
List-Subscribe: <mailto:bess-join@ietf.org>
List-Unsubscribe: <mailto:bess-leave@ietf.org>

Dear All,
Thank you for the interest and comments on draft-liu-spring-aggregate-header-limit-problem during the presentation on last week's BESS meeting.
Below are the following-up responses to the comments and discussions around this work.

a) [Comments from Zafar & Ali]    There're two aspects about this work, one is the the base request and reply mechanism(the container) which should be done in 6man/intarea, another is the specific encoding for SRv6 EVPN(the contents) which belongs to BESS.

 [Yao]     Yes, it's better to do this separately. Actually, about the container part, we've already written a separate draft in 6MAN before, draft-liu-6man-icmp-verification, which is more focused on the validation mechanism itself. 
If there's a rough consensus in BESS that a validation request/reply mechanism is needed in IPv6 at least for SRv6 EVPN connectivity check, we can take this work to 6man and intarea. And this is also the initial reason why we presented in BESS. 

To the chairs, I'm not sure if I can say we have a  rough consensus on the requirement now, or some more discussion or work in BESS is required before we go to 6man/intarea to work on the validation message itself.

b) [Comments from Ali]     About the content part, it's better to keep the encoding for different transport (MPLS/SRv6/VXLAN) in one place. RFC9489 already defines all types of sub-TLVs for MPLS EVPN, and the encoding is applicable for SRv6 and VXLAN. One possible way is writing an errata to claim that RFC9489 needs to cover other transport and to update RFC9489 for these transport. 

[Yao] I think this would work, haven't seen any new encoding/format required especially for SRv6 EVPN yet. 
Maybe it's better and faster if the authors of RFC9489 would like to do the errata and update work for RFC9489, so we can use it directly for SRv6 EVPN connectivity check.  

c) [Yao]     This point is related with comments a) and b). 
From my point of view, there might be three parts of the work. Besides the container and the encoding, the third part is mainly about the usecase-specified operation.
Assume that we already have the icmpv6 mechanism and the encoding of the contents from the updated RFC9489, but for a few cases, we still need to know, how this request message should be sent.
For example, RFC9489 specifies the procedure for MPLS inclusive multicast data plane connectivity check in section 4.2, and how to encapsulate and send the request for the ingress replication and P2MP P-Tree scenario for MPLS. But if SRv6 P2MP Trees is used as P-Tunnels for SRv6 EVPN as specified in draft-ietf-bess-mvpn-evpn-sr-p2mp, some description on how the validation request for SRv6 inclusive multicast connectivity check is encapsulated and sent may help the implementation.
Such descriptions may be small paragraphs related with usecases, but there should be a place to put them in.

d) [Comments from Jorge&Ali]     There's no PBB EVPN for SRv6.
[Yao]     Regardless of how this work should be continued, a new version of the draft-liu-bess-srv6-evpn-validation has been uploaded to remove the PBB-EVPN part.

Thanks,
Yao