Re: [bess] draft-mohanty-bess-evpn-bum-opt-00 - clarification on problem description

Sandy Breeze <sandy.breeze@eu.clara.net> Sat, 24 March 2018 11:39 UTC

Return-Path: <sandy.breeze@eu.clara.net>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B0D7126C2F for <bess@ietfa.amsl.com>; Sat, 24 Mar 2018 04:39:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.011
X-Spam-Level:
X-Spam-Status: No, score=-0.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=eu.clara.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b9pwuJjjUoIf for <bess@ietfa.amsl.com>; Sat, 24 Mar 2018 04:39:53 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0631.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe1f::631]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 588E7126C19 for <bess@ietf.org>; Sat, 24 Mar 2018 04:39:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=eu.clara.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=mJWNmoVhG6UlRWr9SscTe12kP+O/neIM+13ctaWmOJc=; b=WVGv0pCLdlFrUERSSfaUEqenkbB0gOJ8GQylwWmY+gWEggPuTMqHkpOEDvkVyqud8FbQxGrnVL1HMvaTwaTsxvZ98SKnidvjKSsrGZLG23zCoZtiPx0OMkbsIf0nK6UtQvc+/zlsKwZHP+TnUsp68CmPlmHnqJa3PyR3C71ANFs=
Received: from AM5PR0202MB2692.eurprd02.prod.outlook.com (10.173.90.12) by AM5PR0202MB2676.eurprd02.prod.outlook.com (10.173.90.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.609.10; Sat, 24 Mar 2018 11:39:48 +0000
Received: from AM5PR0202MB2692.eurprd02.prod.outlook.com ([fe80::b549:3438:e0b2:5497]) by AM5PR0202MB2692.eurprd02.prod.outlook.com ([fe80::b549:3438:e0b2:5497%8]) with mapi id 15.20.0609.012; Sat, 24 Mar 2018 11:39:48 +0000
From: Sandy Breeze <sandy.breeze@eu.clara.net>
To: "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>, Eric C Rosen <erosen@juniper.net>, "bess@ietf.org" <bess@ietf.org>
Thread-Topic: [bess] draft-mohanty-bess-evpn-bum-opt-00 - clarification on problem description
Thread-Index: AQHTwTLSpKI1nWgbp0ukIa0wdFUT3aPcSQuAgAAhzICAAaOpAIABPcQA///684A=
Date: Sat, 24 Mar 2018 11:39:48 +0000
Message-ID: <478DF0AF-AEB7-4ADF-93BF-B33B68875676@eu.clara.net>
References: <53C24F41-B86F-4FE1-8041-721C95C7E7F0@nokia.com> <b4272e23-0b57-bc23-0840-4a4eb0991966@juniper.net> <373D0F59-2947-4370-9BDC-081E03867B2E@nokia.com> <493dc791-599b-b36c-5855-87059b12fb16@juniper.net> <52EFFC0D-0948-44CC-BBC5-AD9E1A2E45AD@nokia.com>
In-Reply-To: <52EFFC0D-0948-44CC-BBC5-AD9E1A2E45AD@nokia.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.c.0.180318
authentication-results: spf=none (sender IP is ) smtp.mailfrom=sandy.breeze@eu.clara.net;
x-originating-ip: [2001:a88:d510:700:adab:9cc3:15da:38cd]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM5PR0202MB2676; 7:Wo7ZHj1mD3Wj+FwB4reZPWcKLj5ziPTBZKjzmgAOHY4RU5S65JJBj3+l0cE/043Bgtp8jHCCre6ifQbLbNMVjMyhRvw+S2L7Qz6l9DjGvG5/AjGtQqHVcxO3WgHQLGXKO1baA8qIF7Fa/VV9wQRZoFFOrPBilFifIuwwVnAJBzrqAZms+7NunNfzNZ9sl9BREueevpdQXL5e0Xg7xfR8/x+7tL+Uv+e12UlFNFbpzvHwVztTxXbawPby2Y2CvyYy
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 92b2c9a6-0da8-4798-d0a2-08d5917bf2d9
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:AM5PR0202MB2676;
x-ms-traffictypediagnostic: AM5PR0202MB2676:
x-microsoft-antispam-prvs: <AM5PR0202MB26769D1EB5684E8B77AF77B4A8AF0@AM5PR0202MB2676.eurprd02.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(10436049006162)(138986009662008)(82608151540597)(100405760836317)(21748063052155)(21532816269658);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(3231221)(944501327)(52105095)(6041310)(20161123562045)(20161123560045)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:AM5PR0202MB2676; BCL:0; PCL:0; RULEID:; SRVR:AM5PR0202MB2676;
x-forefront-prvs: 0621E7E436
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(396003)(376002)(346002)(39860400002)(39380400002)(189003)(199004)(86362001)(6506007)(14454004)(2906002)(81166006)(8676002)(81156014)(82746002)(58126008)(93886005)(3280700002)(110136005)(3660700001)(561944003)(53546011)(33656002)(2616005)(236005)(6116002)(59450400001)(446003)(478600001)(68736007)(6436002)(8936002)(1941001)(316002)(76176011)(5890100001)(6486002)(8656006)(2501003)(186003)(54896002)(2900100001)(7736002)(102836004)(5660300001)(46003)(6306002)(6512007)(966005)(53936002)(25786009)(5250100002)(606006)(8666007)(105586002)(97736004)(229853002)(83716003)(106356001)(6246003)(99286004)(11346002); DIR:OUT; SFP:1101; SCL:1; SRVR:AM5PR0202MB2676; H:AM5PR0202MB2692.eurprd02.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:0; LANG:en;
received-spf: None (protection.outlook.com: eu.clara.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: lgSQDXSh4ppUj74hXM6NAHjU51OFKRMBPgJtMzZqaTRyy1X1Lv58EYSeZ/Una6zYlcvAxpgNCGJl169ZXn1IsvHJK8bIr+wxS9Zm0JNGlKQ0d+P7CpQrl4haLilwRArA7AkNFnxUmizdvN5KmWJLgNcjaRFSlHqIGPxJNpfzYCLHGuPh54wyAny5t+AQe6D2hVxl5DbmJ9phenOlJ48cVax58gseE2lwgFi/MbYP04Ko2wOgGuUyXHT1CbejjyWPRDVKakaG/rGRmAgPZvk0j0TcULjDacAGXCjyUHn+PXY+6WwU/vo3b5DNNd1CwOtodc9ttcVIrDG6m8qMXpOe/A==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_478DF0AFAEB74ADF93BFB33B68875676euclaranet_"
MIME-Version: 1.0
X-OriginatorOrg: eu.clara.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 92b2c9a6-0da8-4798-d0a2-08d5917bf2d9
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Mar 2018 11:39:48.3608 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f87a7640-3b94-4bbd-b5fa-b4c15947cf56
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0202MB2676
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/pCEWc0_Nj1hDUn-3LshZr6Kb-m0>
Subject: Re: [bess] draft-mohanty-bess-evpn-bum-opt-00 - clarification on problem description
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Mar 2018 11:39:59 -0000

John, Eric, Jorge,

[Sandy] Comments inline


On 24/03/2018, 10:57, "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com<mailto:jorge.rabadan@nokia.com>> wrote:

Eric, as discussed and you point out, one can easily interpret that IMET is not mandatory in some cases where multi-destination traffic is not needed. In any case, whether this document is Informational or Standards Track is probably not that important.

If this had to be done, out of the options you list, I think omitting the PTA would not be backwards compatible since the use of PTA is a MUST in RFC7432, so RRs wouldn’t like it. Maybe label zero could cause issues too. So maybe a flag is the least disruptive one if the document has to modify something.
[Sandy] I agree, and detailed reasoning on those points in line below

I still think it may be better to proceed with the IMET withdraw procedure and clarify that it is only valid for:
a) BUM traffic in IR cases
b) BDs with no igmp/mld/pim proxy
c) BDs with no OISM or IRBs
d) BDs with I-ES associated to overlay tunnels and no other ACs
[Sandy] We’re happy to call out those restrictions under a definition of what we mean in connecting EVPN domains at DCI for L2 only scenarios


And any other restrictions/caveats we may need to add.

My 2 cents.
Jorge

On 23/03/2018, 17:00, "Eric C Rosen" <erosen@juniper.net<mailto:erosen@juniper.net>> wrote:

[Jorge] my interpretation of RFC7432 is that IMET routes are mandatory to enable the handling of multi-destination traffic in a BD. But in a non-DF PE for a given ES and with no other ACs in the BD, assuming Ingress Replication, there is no such multi-destination traffic (Tx or Rx). So one could interpret that RFC7432 is ok with withdrawing the IMET route in that case.

If we consider the case of all-active multi-homing, then there may well be Tx multi-destination traffic in the scenario under discussion, as multicast traffic from a given ES could arrive at any PE attached to the ES, whether or not that PE is the DF.

[Sandy] In the specific scenario with all-active multi-homing, EVPN GW / DCI routers connect an EVPN VXLAN fabric and an EVPN MPLS core.  Therefore, for all NDF PE’s (read EVPN GW’s) there will be no IMET sent to neither RR’s in the EVPN MPLS core, nor to ToR in the EVPN VXLAN fabric – so neither side of the EVPN GW would attract BUM.



The relevant section from RFC 7432 is:

11.  Handling of Multi-destination Traffic

   Procedures are required for a given PE to send broadcast or multicast
   traffic received from a CE encapsulated in a given Ethernet tag
   (VLAN) in an EVPN instance to all the other PEs that span that
   Ethernet tag (VLAN) in that EVPN instance.  In certain scenarios, as
   described in Section 12 ("Processing of Unknown Unicast Packets"), a
   given PE may also need to flood unknown unicast traffic to other PEs.

   The PEs in a particular EVPN instance may use ingress replication,
   P2MP LSPs, or MP2MP LSPs to send unknown unicast, broadcast, or
   multicast traffic to other PEs.

   Each PE MUST advertise an "Inclusive Multicast Ethernet Tag route" to
   enable the above.  The following subsection provides the procedures
   to construct the Inclusive Multicast Ethernet Tag route.  Subsequent
   subsections describe its usage in further detail.

Interestingly, this says that the IMET route is mandatory to enable "the above", where "the above" is "send broadcast or multicast traffic received from a CE".  Note it says "send", not "receive".

[Sandy] This is a very good point Eric.  Its my understanding the reasons for ‘sending’ IMET is because you want to signal eligibility to receive BUM traffic.  ‘send’ vs ‘receive’ wording aside, I agree with the RFC7432 in that as per my first comment above, those PE’s would not attract BUM from the EVPN VXLAN fabric side, because they also wouldn’t be sending the IMET to ToR, if they’re NDF…



If P2MP tunnels are used for the BUM traffic, the IMET route is certainly required to support all-active multi-homing.
[Sandy] I concur

If IR is used, or if single-active multi-homing is used, one could argue that RFC 7432 didn't really need to require the IMET route.  However, it does.
[Sandy] I do not concur, as per my previous point, and noting that 7432 wording asserts that sending IMET enables a PE to forward BUM received from CE… but in this scenario it will never receive BUM from the EVPN VXLAN fabric side, because we wont send IMET to ToR



[John] Wouldn’t it be better to have this draft define a bit in the Multicast Flags extended community (https://tools.ietf.org/html/draft-ietf-bess-evpn-igmp-mld-proxy-01<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Dbess-2Devpn-2Digmp-2Dmld-2Dproxy-2D01&d=DwMGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=-DXB84eU9m4cIlq2OOcCJCQQAwJXQQswyu3F0kG0VNo&m=rs8r_tXnIDIv9e5NNgiXOy5yYuE10r6x9al8H6FgK04&s=V42kiY3ngmDNxMKmk5GgHmy9LcMGdOXpcvbereFtUR8&e=>) indicating that that the originating PE is neither DF nor backup DF for this broadcast domain on any ES to which it is attached?  This allows us to always advertise the IMET route and makes the situation explicit.  I think the consensus is that this situation is rare so the number of IMET route updates shouldn’t be excessive and we could also say that this bit is only set by EVPN DC GWs.
[Sandy] We discussed the use of extended community to signal NDF, this is indeed a viable alternative approach and one we’re not against.  We didn’t choose it over not sending IMET because we don’t have a good reason why not sending IMET at an NDF is actually a bad idea, for our use case.  That said, if the consensus of this list is to use an extended community then a flag in EVPN extended community sub-types registry is a possible fit

If it's worth doing at all, this would be a better method.  Alternatives would be omitting the PMSI Tunnel attribute, or setting the MPLS label in the PMSI Tunnel attribute to 0.
[Sandy] Label field in PTA is used to carry VNI in overlay signalling (section 5.1.3 in draft-ietf-bess-evpn-overlay-11).  Setting this to 0 is also described in this section of bess-evpn-overlay draft, to mean single-VNI per MAC-VRF.  I suspect sending IMET but omitting PTA would likely just invalidate the RT3 completely in bess-evpn-overlay, hence achieving same result as not sending in the first place, given the language in section 9 is MUST send IMET to indicate what tunnel-type is to be used for multicast.  Also interestingly in section 9 support for multicast, I see wording such as;
   However, for globally-assigned VNIs, each PE MUST advertise IMET
  route to other PEs in an EVPN instance for ingress replication or
   PIM-SSM tunnel, and MAY advertise IMET route for PIM-SM or Bidir-PIM
   tunnel. In case of PIM-SM or Bidir-PIM tunnel, no information in the
   IMET route is needed by the PE to setup these tunnels.
in addition, in section 4.1 of https://tools.ietf.org/html/draft-ietf-bess-evpn-igmp-mld-proxy-00#section-4.1
   A PE advertises an SMET route for that (x, G) group in that
   [EVI, BD] when it has IGMP Join (x, G) state in that [EVI, BD] on at
   least one ES for which it is DF and it withdraws that SMET route when
   it does not have IGMP Join (x, G) state in that [EVI, BD] on any ES
   for which it is DF.
I’ve heard no objections on these drafts permitting the selective sending of [S|I]METand seems to be similar logic as we’re trying to apply

[Sandy] We’d considered alternative methods other than withdraw, such as extended community or something specific in PMSI Tunnel Attribute.  Withdraw/don’t advertise RT3 approach was chosen for the following reasons;
·         Requires no change to protocol
Since the proposal changes the conditions under which an IMET route is originated, it is certainly changing the protocol.  (It's obvious that the finite state machine is changed.)  Perhaps what is meant is that the protocol change is backwards compatible with systems that implement only RFC7432.
[Sandy] ACK
But it does not appear to be backwards compatible with systems that have IRB, and the draft has no analysis of the impact on all the various extensions and proposed extensions to RFC7432.
[Sandy] IRB was not our use case, and yes we acknowledge the -00 is missing written analysis of other drafts and standards, though I assure you they have been discussed.  IRB multicast draft was not taken into account however, as IRB is not our use case

·         Is computationally easier on all participating PE’s, to deal with a simple withdraw than to look for something in an update.  For instance, on transition from BDF to NDF for example
These are of course not the only considerations.

[Sandy] ACK