[bess] [Errata Verified] RFC9135 (7683)

RFC Errata System <rfc-editor@rfc-editor.org> Fri, 09 February 2024 21:23 UTC

Return-Path: <wwwrun@rfcpa.amsl.com>
X-Original-To: bess@ietfa.amsl.com
Delivered-To: bess@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49990C14F6B3; Fri, 9 Feb 2024 13:23:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.658
X-Spam-Level:
X-Spam-Status: No, score=-6.658 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.249, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zeiXgQthfrUI; Fri, 9 Feb 2024 13:23:24 -0800 (PST)
Received: from rfcpa.amsl.com (rfcpa.amsl.com [50.223.129.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B60CAC14F6B2; Fri, 9 Feb 2024 13:23:24 -0800 (PST)
Received: by rfcpa.amsl.com (Postfix, from userid 499) id 9312118F0F68; Fri, 9 Feb 2024 13:23:24 -0800 (PST)
To: vrkic.denis@gmail.com, sajassi@cisco.com, ssalam@cisco.com, sthoria@cisco.com, jdrake@juniper.net, jorge.rabadan@nokia.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: jgs@juniper.net, iesg@ietf.org, bess@ietf.org, iana@iana.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240209212324.9312118F0F68@rfcpa.amsl.com>
Date: Fri, 09 Feb 2024 13:23:24 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/bess/vh8w6i8L4BIbA48BS68Qjsjz5lk>
X-Mailman-Approved-At: Mon, 12 Feb 2024 02:22:11 -0800
Subject: [bess] [Errata Verified] RFC9135 (7683)
X-BeenThere: bess@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: BGP-Enabled ServiceS working group discussion list <bess.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bess>, <mailto:bess-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bess/>
List-Post: <mailto:bess@ietf.org>
List-Help: <mailto:bess-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bess>, <mailto:bess-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Feb 2024 21:23:29 -0000

The following errata report has been verified for RFC9135,
"Integrated Routing and Bridging in Ethernet VPN (EVPN)". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid7683

--------------------------------------
Status: Verified
Type: Technical

Reported by: Denis Vrkic <vrkic.denis@gmail.com>
Date Reported: 2023-10-19
Verified by: John Scudder (IESG)

Section: 4.2.

Original Text
-------------
  2.  However, if PE2 is configured for asymmetric IRB mode, PE2 will
       advertise TS4 MAC/IP information in a MAC/IP Advertisement route
       with a zero Label2 field and no Route Target identifying IP-VRF1.
       In this case, PE2 will install TS4 information in its ARP table
       and BT1.  When a packet from TS2 to TS4 arrives at PE1, a longest
       prefix match on IP-VRF1's route table will yield the local IRB
       interface to BT1, where a subsequent ARP and bridge table lookup
       will provide the information for an asymmetric forwarding mode to
       PE2.

Corrected Text
--------------
  2.  However, if PE2 is configured for asymmetric IRB mode, PE2 will
       advertise TS4 MAC/IP information in a MAC/IP Advertisement route
       with a zero Label2 field and no Route Target identifying IP-VRF1.
       In this case, PE1 will install TS4 information in its ARP table
       and BT1.  When a packet from TS2 to TS4 arrives at PE1, a longest
       prefix match on IP-VRF1's route table will yield the local IRB
       interface to BT1, where a subsequent ARP and bridge table lookup
       will provide the information for an asymmetric forwarding mode to
       PE2.

Notes
-----
PE1 will use ARP table for forwarding traffic to PE2 - seems like typo

--------------------------------------
RFC9135 (draft-ietf-bess-evpn-inter-subnet-forwarding-15)
--------------------------------------
Title               : Integrated Routing and Bridging in Ethernet VPN (EVPN)
Publication Date    : October 2021
Author(s)           : A. Sajassi, S. Salam, S. Thoria, J. Drake, J. Rabadan
Category            : PROPOSED STANDARD
Source              : BGP Enabled ServiceS
Area                : Routing
Stream              : IETF
Verifying Party     : IESG