[bess] Questions about draft-ietf-bess-evpn-bfd

Alexander Vainshtein <Alexander.Vainshtein@rbbn.com> Sun, 31 March 2024 15:30 UTC

Return-Path: <alexander.vainshtein@rbbn.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33E20C14F5F6 for <bess@ietfa.amsl.com>; Sun, 31 Mar 2024 08:30:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.095
X-Spam-Level:
X-Spam-Status: No, score=-2.095 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=rbbn.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2L73E9f2h_-b for <bess@ietfa.amsl.com>; Sun, 31 Mar 2024 08:30:26 -0700 (PDT)
Received: from usb-smtp-delivery-110.mimecast.com (usb-smtp-delivery-110.mimecast.com [170.10.153.110]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2012EC14F5E0 for <bess@ietf.org>; Sun, 31 Mar 2024 08:30:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rbbn.com; s=mimecast20230413; t=1711899019; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type; bh=1szQoo/sYr8eGBk4twfLM1edcJ0Lg9GNAvlpJqRADhI=; b=STQdKxGO0KC+sxrWlofebBEjAHdW9uqHlzcO2gD5ukob77uGGu3hTtKvuntXGWiPfB7q/m GkUZpug0V+0J/nRfbDvp9a6Ox4cm3GGzQPUAcnBx0PGwi143xViVHL4O0KWj1VX5ciM+39 Nek/8zSBeAfNZQ76iVV5VVwHts7uq8E=
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (mail-bn8nam04lp2041.outbound.protection.outlook.com [104.47.74.41]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id usb-mta-24-shDrKMIVOq2V-hzcJScHLg-2; Sun, 31 Mar 2024 08:30:10 -0700
X-MC-Unique: shDrKMIVOq2V-hzcJScHLg-2
Received: from PH0PR03MB6300.namprd03.prod.outlook.com (2603:10b6:510:e2::5) by BLAPR03MB5409.namprd03.prod.outlook.com (2603:10b6:208:290::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7409.46; Sun, 31 Mar 2024 15:30:02 +0000
Received: from PH0PR03MB6300.namprd03.prod.outlook.com ([fe80::37e8:7f43:4659:358d]) by PH0PR03MB6300.namprd03.prod.outlook.com ([fe80::37e8:7f43:4659:358d%6]) with mapi id 15.20.7409.042; Sun, 31 Mar 2024 15:30:02 +0000
From: Alexander Vainshtein <Alexander.Vainshtein@rbbn.com>
To: "draft-ietf-bess-evpn-bfd@ietf.org" <draft-ietf-bess-evpn-bfd@ietf.org>
CC: "bess@ietf.org" <bess@ietf.org>, BFD WG <rtg-bfd@ietf.org>
Thread-Topic: Questions about draft-ietf-bess-evpn-bfd
Thread-Index: AdqDgEq6xltAVbPXQQ2/8Cx8g7bIYA==
Importance: high
X-Priority: 1
Date: Sun, 31 Mar 2024 15:30:02 +0000
Message-ID: <PH0PR03MB6300096817865D7A1935B4CCF6382@PH0PR03MB6300.namprd03.prod.outlook.com>
Accept-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR03MB6300:EE_|BLAPR03MB5409:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR03MB6300.namprd03.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(366007)(1800799015)(376005); DIR:OUT; SFP:1102
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
MIME-Version: 1.0
X-OriginatorOrg: rbbn.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR03MB6300.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b7d135e5-fcd5-4049-fd41-08dc51976f03
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Mar 2024 15:30:02.3642 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 29a671dc-ed7e-4a54-b1e5-8da1eb495dc3
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 49m3Qy0FsfyCn0Vvno0HN7pMFZxSxDFGo1yZkK8A90ppBaaiArm+6wB7yI3TFYWWl3vpL9RaRm/RHgG/+v6fuQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLAPR03MB5409
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: rbbn.com
Content-Language: en-US
Content-Type: multipart/alternative; boundary="_000_PH0PR03MB6300096817865D7A1935B4CCF6382PH0PR03MB6300namp_"
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/qpCQgnPzN93raM6eDjP60q3QwrM>
Subject: [bess] Questions about draft-ietf-bess-evpn-bfd
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 31 Mar 2024 15:30:30 -0000

Hi,
I am reading the latest available version of the draft<https://datatracker.ietf.org/doc/html/draft-ietf-bess-evpn-bfd-06>,  and I have several questions to the authors.


  1.  RFC 5882 suggest that BFD sessions in general are coupled with their clients which:
     *   Initiate establishment of these sessions
     *   React to state transitions of these sessions in some way
The well-known clients can be routing protocols, redundancy mechanisms etc.
Can the authors please clarify which entities are expected to act as the clients of the EVPN BFD sessions, and which actions can these clients take upon, say, exist of an established session from its UP state?

  1.  Section 4 "Fault Detection for Unicast Traffic" suggests advertisement of "My" discriminator values in the BGP Discriminator attribute in MAC/IP Advertisement (EVPN Type 2, a.k.a. RT-2) routes.
     *   Can the authors please clarify whether a different My discriminator value is expected to be assigned for each MAC address that have been locally learned by the given PE?
     *   Suppose that:

                                                              i.      PE-1 and PE-2 participate in the same EVI and the same BD in this EVI

                                                             ii.      PE-1 has locally learned MAC-1, assigned My Discriminaror D1 to it and advertised D1 in the corresponding RT-2

                                                           iii.      PE-2 has locally learned MAC-2, assigned My Discriminaror D2 to it and advertised D2 in the corresponding RT-2
Does the draft imply that a BFD session between PE-1 and PE-2 using D1 and D2 as the cross-matching pairs of <My Discriminator, You Discriminator) should be established? If not, how is the decision to establish - or not to establish - such a BFD session is taken?

     *   In the assumptions of (b) above, what should happen if PE-1 withdraws RT-2 it has advertised for MAC-1 (e.g., because this MAC address has been aged out, or because it has moved to another PE)?
     *   Suppose that:

                                                              i.      PE-1, PE-2 and PE-3 participate in the same EVI and the same BD in this EVI

                                                             ii.      PE-1 and PE-2 are attached to the same multi-homed Ethernet segment in All-Active load-balancing mode

                                                           iii.      A certain MAC address, MAC-1 has been locally learned by PE-1, but not by PE-2

                                                           iv.      PE-3 sends traffic with Destination MAC address MAC-1 to both PE-1 based on RT-2 advertised for this MAC address and to PE-2 based on the per-EVI Ethernet A-D (EVPN Type 1, a.k.a. RT-1) route
Does the draft imply that PE-3 can verify its connectivity for MAC-1 to PE-1 but not to PE-2?
Does the draft imply that PE-2, upon receiving RT-2 for MAC-1 from PE-1 allocates a "local" discriminator" for this MAC address? If yes, how is this discriminator advertised?

  1.  Can the authors please clarify whether each PE where a certain EVI/BD is instantiated, is expected to establish BFD session with all the PEs from which it has received an IMET Route? If not, how is the decision to establish - or not to establish - such a BFD session is taken?
  2.  Can the authors please clarify why the UDP port that is allocated for 1-hop IP BFD (RFC 5881) is reused for EVPN BFD?

Your timely feedback will be highly appreciated.

Regards, and lots of thanks,
Sasha

Disclaimer

This e-mail together with any attachments may contain information of Ribbon Communications Inc. and its Affiliates that is confidential and/or proprietary for the sole use of the intended recipient. Any review, disclosure, reliance or distribution by others or forwarding without express permission is strictly prohibited. If you are not the intended recipient, please notify the sender immediately and then delete all copies, including any attachments.