Re: [bess] draft-mohanty-bess-evpn-bum-opt-00 - clarification on problem description

"Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com> Sat, 24 March 2018 10:58 UTC

Return-Path: <jorge.rabadan@nokia.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29F531201FA for <bess@ietfa.amsl.com>; Sat, 24 Mar 2018 03:58:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.089
X-Spam-Level:
X-Spam-Status: No, score=0.089 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dApXF2su4b6o for <bess@ietfa.amsl.com>; Sat, 24 Mar 2018 03:58:03 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-am5eur02on070a.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe07::70a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2172E1250B8 for <bess@ietf.org>; Sat, 24 Mar 2018 03:57:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=mGLnTsCM5wTZ+vIjTnbbJe8oRX6wr/Cu4sDyDylJwxs=; b=Kj37TKelbP8KVCOIKEGiwfrQzHmUSeFKxqT3C4JAQJpDskB6IJks/LKxdkrkKBoqCFm0LLCVEeqxGmwaTpJXXPqgPfm6OiLKkMJVVyhGWLN0jHdS9MrriV0NCiY81gehATn5rDUUNokUfTYMYFCgDpw59/G6SUj4XWR5CkLhC/8=
Received: from AM4PR07MB3409.eurprd07.prod.outlook.com (10.171.189.158) by AM4PR07MB3364.eurprd07.prod.outlook.com (10.171.189.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.631.5; Sat, 24 Mar 2018 10:57:51 +0000
Received: from AM4PR07MB3409.eurprd07.prod.outlook.com ([fe80::c96c:c12b:921e:bc5d]) by AM4PR07MB3409.eurprd07.prod.outlook.com ([fe80::c96c:c12b:921e:bc5d%5]) with mapi id 15.20.0631.004; Sat, 24 Mar 2018 10:57:51 +0000
From: "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>
To: Eric C Rosen <erosen@juniper.net>, Sandy Breeze <sandy.breeze@eu.clara.net>, "bess@ietf.org" <bess@ietf.org>
Thread-Topic: [bess] draft-mohanty-bess-evpn-bum-opt-00 - clarification on problem description
Thread-Index: AQHTwTLSpKI1nWgbp0ukIa0wdFUT3aPcSQuAgAAhzICAAaOpAIABPcQA
Date: Sat, 24 Mar 2018 10:57:51 +0000
Message-ID: <52EFFC0D-0948-44CC-BBC5-AD9E1A2E45AD@nokia.com>
References: <53C24F41-B86F-4FE1-8041-721C95C7E7F0@nokia.com> <b4272e23-0b57-bc23-0840-4a4eb0991966@juniper.net> <373D0F59-2947-4370-9BDC-081E03867B2E@nokia.com> <493dc791-599b-b36c-5855-87059b12fb16@juniper.net>
In-Reply-To: <493dc791-599b-b36c-5855-87059b12fb16@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.b.0.180311
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jorge.rabadan@nokia.com;
x-originating-ip: [135.245.212.125]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM4PR07MB3364; 7:ifCrAE9HX+d4HiWTagbE2YKwUS0ksvabQHjJWQNg0+16V04Q36rDhwLhEt5mG7nXeCCt6o2KcJo6RzYYsucoNkJiToMvow16+qIl3gbbkAzz1ohAUpbw1RlOmfhVdrTrwgW6NfXV5LeLSkrAZJz05cRI49kz4EiHabZfAIJZ3puebz4Awz1Jvhb2Dr7jZ927LNIAU1pRTNCn8FAA5o9DSoR2XCLDMNlqeSYWyyXLaig0LJNyhSmufw8smwX7v1/l
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 83e1e7c6-33d3-4c09-8d87-08d5917616c3
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7193020); SRVR:AM4PR07MB3364;
x-ms-traffictypediagnostic: AM4PR07MB3364:
x-microsoft-antispam-prvs: <AM4PR07MB3364141EDD86E0148CA784F1F7AF0@AM4PR07MB3364.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(10436049006162)(138986009662008)(82608151540597)(100405760836317)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3002001)(3231221)(11241501184)(806099)(944501327)(52105095)(6055026)(6041310)(20161123558120)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(6072148)(201708071742011); SRVR:AM4PR07MB3364; BCL:0; PCL:0; RULEID:; SRVR:AM4PR07MB3364;
x-forefront-prvs: 0621E7E436
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39380400002)(396003)(376002)(39860400002)(366004)(346002)(189003)(199004)(8666007)(316002)(66066001)(6436002)(82746002)(58126008)(110136005)(53936002)(59450400001)(86362001)(186003)(606006)(236005)(54896002)(6306002)(102836004)(25786009)(14454004)(6512007)(8936002)(36756003)(99286004)(81156014)(8676002)(93886005)(106356001)(81166006)(6246003)(478600001)(76176011)(97736004)(53546011)(6506007)(2900100001)(26005)(33656002)(229853002)(68736007)(3846002)(6116002)(561944003)(6486002)(5890100001)(83716003)(5250100002)(7736002)(105586002)(446003)(2906002)(11346002)(2616005)(1941001)(2501003)(5660300001)(3660700001)(3280700002); DIR:OUT; SFP:1102; SCL:1; SRVR:AM4PR07MB3364; H:AM4PR07MB3409.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: myaUwE00SKE1k/BJh8Tfrf3Ghyf+xFSD/+51gKvaSCRxn4LylSEwvdeHUNjkgB2jZc4wTG5PPKtC+GqXMGS2dAXzMQ+Wv8cRiiEjyUt+1Gq8fEBHh98gOzjwcx0gFO++gs88bykCRTLtmQKf245bHENe4YAbZPV4o4FP7iDtw7FPzmNNxFbDO040vRrVMqtd/v1rGzqR8BmUbnT/wqHmlaboq32lc9y9dL2fSy+VLW/Pq8izp20JfrrTgk3yzQB+T3f2kDFFz54QfRhd5cU4LlfYVSVgUZ88GdYlTBzs4+vNV8Im93fp5wA88vn+cu0AqAPiDgwsedkNV7q9cyq+SHpLtJQDiI3NYyv6fUdvdVLuXn7znvuq+7HkqX+hzfKS
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_52EFFC0D094844CCBBC5AD9E1A2E45ADnokiacom_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 83e1e7c6-33d3-4c09-8d87-08d5917616c3
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Mar 2018 10:57:51.5825 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR07MB3364
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/rEdqlmhluL9AN_syiLcJIg3dzHo>
Subject: Re: [bess] draft-mohanty-bess-evpn-bum-opt-00 - clarification on problem description
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Mar 2018 10:58:07 -0000

Eric, as discussed and you point out, one can easily interpret that IMET is not mandatory in some cases where multi-destination traffic is not needed. In any case, whether this document is Informational or Standards Track is probably not that important.

If this had to be done, out of the options you list, I think omitting the PTA would not be backwards compatible since the use of PTA is a MUST in RFC7432, so RRs wouldn’t like it. Maybe label zero could cause issues too. So maybe a flag is the least disruptive one if the document has to modify something.

I still think it may be better to proceed with the IMET withdraw procedure and clarify that it is only valid for:
a) BUM traffic in IR cases
b) BDs with no igmp/mld/pim proxy
c) BDs with no OISM or IRBs
d) BDs with I-ES associated to overlay tunnels and no other ACs

And any other restrictions/caveats we may need to add.

My 2 cents.
Jorge


From: Eric C Rosen <erosen@juniper.net>
Date: Friday, March 23, 2018 at 5:00 PM
To: "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>, Sandy Breeze <sandy.breeze@eu.clara.net>, "bess@ietf.org" <bess@ietf.org>
Subject: Re: [bess] draft-mohanty-bess-evpn-bum-opt-00 - clarification on problem description

[Jorge] my interpretation of RFC7432 is that IMET routes are mandatory to enable the handling of multi-destination traffic in a BD. But in a non-DF PE for a given ES and with no other ACs in the BD, assuming Ingress Replication, there is no such multi-destination traffic (Tx or Rx). So one could interpret that RFC7432 is ok with withdrawing the IMET route in that case.

If we consider the case of all-active multi-homing, then there may well be Tx multi-destination traffic in the scenario under discussion, as multicast traffic from a given ES could arrive at any PE attached to the ES, whether or not that PE is the DF.

The relevant section from RFC 7432 is:

11.  Handling of Multi-destination Traffic

   Procedures are required for a given PE to send broadcast or multicast
   traffic received from a CE encapsulated in a given Ethernet tag
   (VLAN) in an EVPN instance to all the other PEs that span that
   Ethernet tag (VLAN) in that EVPN instance.  In certain scenarios, as
   described in Section 12 ("Processing of Unknown Unicast Packets"), a
   given PE may also need to flood unknown unicast traffic to other PEs.

   The PEs in a particular EVPN instance may use ingress replication,
   P2MP LSPs, or MP2MP LSPs to send unknown unicast, broadcast, or
   multicast traffic to other PEs.

   Each PE MUST advertise an "Inclusive Multicast Ethernet Tag route" to
   enable the above.  The following subsection provides the procedures
   to construct the Inclusive Multicast Ethernet Tag route.  Subsequent
   subsections describe its usage in further detail.

Interestingly, this says that the IMET route is mandatory to enable "the above", where "the above" is "send broadcast or multicast traffic received from a CE".  Note it says "send", not "receive".

If P2MP tunnels are used for the BUM traffic, the IMET route is certainly required to support all-active multi-homing.  If IR is used, or if single-active multi-homing is used, one could argue that RFC 7432 didn't really need to require the IMET route.  However, it does.

[John] Wouldn’t it be better to have this draft define a bit in the Multicast Flags extended community (https://tools.ietf.org/html/draft-ietf-bess-evpn-igmp-mld-proxy-01<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Dbess-2Devpn-2Digmp-2Dmld-2Dproxy-2D01&d=DwMGaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=-DXB84eU9m4cIlq2OOcCJCQQAwJXQQswyu3F0kG0VNo&m=rs8r_tXnIDIv9e5NNgiXOy5yYuE10r6x9al8H6FgK04&s=V42kiY3ngmDNxMKmk5GgHmy9LcMGdOXpcvbereFtUR8&e=>) indicating that that the originating PE is neither DF nor backup DF for this broadcast domain on any ES to which it is attached?  This allows us to always advertise the IMET route and makes the situation explicit.  I think the consensus is that this situation is rare so the number of IMET route updates shouldn’t be excessive and we could also say that this bit is only set by EVPN DC GWs.
If it's worth doing at all, this would be a better method.  Alternatives would be omitting the PMSI Tunnel attribute, or setting the MPLS label in the PMSI Tunnel attribute to 0.
[Sandy] We’d considered alternative methods other than withdraw, such as extended community or something specific in PMSI Tunnel Attribute.  Withdraw/don’t advertise RT3 approach was chosen for the following reasons;
·         Requires no change to protocol
Since the proposal changes the conditions under which an IMET route is originated, it is certainly changing the protocol.  (It's obvious that the finite state machine is changed.)  Perhaps what is meant is that the protocol change is backwards compatible with systems that implement only RFC7432.  But it does not appear to be backwards compatible with systems that have IRB, and the draft has no analysis of the impact on all the various extensions and proposed extensions to RFC7432.
·         Is computationally easier on all participating PE’s, to deal with a simple withdraw than to look for something in an update.  For instance, on transition from BDF to NDF for example
These are of course not the only considerations.