Re: [Bier] Review Comments - draft-ietf-bier-bar-ipa-05

"Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net> Mon, 04 November 2019 19:23 UTC

Return-Path: <zzhang@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA443120B10; Mon, 4 Nov 2019 11:23:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id J9ICKR83ay_T; Mon, 4 Nov 2019 11:23:39 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DA9C1209D8; Mon, 4 Nov 2019 11:15:34 -0800 (PST)
Received: from pps.filterd (m0108161.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id xA4J2QUv009648; Mon, 4 Nov 2019 11:15:29 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=7A2fggV1dcG9yJz0UrGRtufAowLzvgppd5/drgZZSfI=; b=Umcns88caraoKWZFDe9yL7aKSmbV4rcD0OOSgJenCqcPI1uooVj8zaiLyeR1rqNxWqtr EzCnove/Xat56INB0RokfnPeUhUPq+Hs6mtmpKCEgn0ImvdRBeLz0yADif5E30/xs0Ur cKJP2OZ6mb2UEQeBUrUwmdJABrUzS1s4UtIRUjRr/0XpYQ0wwa/cNvcsIq1rCf4+pEJH 9DNup6qAtknp3nYj6nwFiYU1OEx47PJgtEPyh0HIWJR6LhPsdud+3t8bFj9zt/BtUSad ZFIul3oOg6Bfb+ghBp9BzjVMI6hDTLtoRrsd/yQ58Z2PPxCjt+HMVz4UAUUTNirBGDLc 3g==
Received: from nam05-co1-obe.outbound.protection.outlook.com (mail-co1nam05lp2054.outbound.protection.outlook.com [104.47.48.54]) by mx0b-00273201.pphosted.com with ESMTP id 2w18wxu580-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 04 Nov 2019 11:15:28 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZYrRLuNo3zicOzXrnXu5SPQ+zsw9jhV+mxKyF018ADSm208LSKEVV2yjVWMatCMqhrbxS/fQJGufFWEwb/XLdhyru8noH2uOcXnzdBG+K0D66s1nr34DxnUn8NGRR7gRPsuRZ+CS0iDfHi8ZivlYkabNlJC3p4+xUVHU0oWP6acXomnWyFnGoP0veOKujgHgTrbm3STAriKXpE275kWH5rcmH3E9Rqv0u0MiFuEjaJmMJtPFAHgugLld2f0R7+3csp+X1Xc34OT6nc/bafcJR2coM59C1gV1MUQdTyVlfFQp0wU4vkZQSwU89rsp5d3ZngZqn62Pxv8/sOIqPc/gNA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=7A2fggV1dcG9yJz0UrGRtufAowLzvgppd5/drgZZSfI=; b=CXFMT4v/y1vM/Q924JCC8javzbFM+gwbTS58tK8dBGt3ODAIsF0iWJ+8nErugQSkxPGP3VuXCMw1cw/oe1sY+rI3MPZxxgSW3DjZ5fM/GY1GCMJCdf9+s9/wLDSq5xQjwJobRcCQQCaPbIWNifQkbkoOUEGZynEvI57iM3f7KoydKsbmlXa5eLxukhDny3/bvRJ5imYULD7DVUSBvfHAkKCMF8kPosA6mGW6l05Y4gcFRRwXibx0QhqY3C31GC7H9+E8EjznYjI+/1VJnmNpBSVES9TGCOqDMJOmKV/DefmmAmPZt4XFXhfy6k5u6ikw9ckm3zBbBRMM041ckyPxvw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
Received: from CY4PR05MB3637.namprd05.prod.outlook.com (10.171.248.25) by CY4PR05MB3286.namprd05.prod.outlook.com (10.171.245.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2430.13; Mon, 4 Nov 2019 19:15:26 +0000
Received: from CY4PR05MB3637.namprd05.prod.outlook.com ([fe80::e036:dbee:4e8c:7359]) by CY4PR05MB3637.namprd05.prod.outlook.com ([fe80::e036:dbee:4e8c:7359%7]) with mapi id 15.20.2430.013; Mon, 4 Nov 2019 19:15:26 +0000
From: "Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net>
To: "'Xiejingrong (Jingrong)'" <xiejingrong@huawei.com>, "'draft-ietf-bier-bar-ipa@ietf.org'" <draft-ietf-bier-bar-ipa@ietf.org>
CC: 'BIER WG' <bier@ietf.org>
Thread-Topic: Review Comments - draft-ietf-bier-bar-ipa-05
Thread-Index: AdV9jFJ+dTormCscQCKdYIHfTzcHKARM3l4QAREiEnAADoXacAABb3mA
Date: Mon, 04 Nov 2019 19:15:25 +0000
Message-ID: <CY4PR05MB36375619596091EC10C016F2D47F0@CY4PR05MB3637.namprd05.prod.outlook.com>
References: <16253F7987E4F346823E305D08F9115AAB9F103F@nkgeml514-mbx.china.huawei.com> <DM5PR05MB354821C57CB4B8C5F819BFC9D4600@DM5PR05MB3548.namprd05.prod.outlook.com> <16253F7987E4F346823E305D08F9115AABA496E6@nkgeml514-mbx.china.huawei.com> <CY4PR05MB3637CD495F6D9C30B0BA22A6D47F0@CY4PR05MB3637.namprd05.prod.outlook.com>
In-Reply-To: <CY4PR05MB3637CD495F6D9C30B0BA22A6D47F0@CY4PR05MB3637.namprd05.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.2.0.14
dlp-reaction: no-action
x-originating-ip: [96.237.64.80]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 416d7988-0b1f-4f0d-7cb7-08d7615b5918
x-ms-traffictypediagnostic: CY4PR05MB3286:
x-microsoft-antispam-prvs: <CY4PR05MB3286B8395BDE8548B66AD9E1D47F0@CY4PR05MB3286.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0211965D06
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(346002)(136003)(366004)(39860400002)(396003)(51444003)(37854004)(199004)(189003)(86362001)(476003)(14454004)(55016002)(25786009)(3846002)(64756008)(66556008)(7696005)(5660300002)(102836004)(52536014)(7736002)(33656002)(76176011)(8676002)(561944003)(256004)(8936002)(14444005)(2940100002)(6506007)(66476007)(66446008)(26005)(81166006)(6246003)(71200400001)(71190400001)(6436002)(478600001)(2906002)(54896002)(6306002)(6116002)(790700001)(9686003)(229853002)(186003)(4326008)(74316002)(446003)(81156014)(11346002)(486006)(76116006)(53546011)(66066001)(66946007)(110136005)(99286004)(236005)(316002)(491001); DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR05MB3286; H:CY4PR05MB3637.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Cve25R39aMXyvx17d22A1ERywgEy/Elbi7YNLTBgY/qsMDejd09cgd+f/HY/4BwlBZWGOk8ToQQJMtG6SExNykmnxHWDnm5BDu7rObC4D5f4edi5/Q2EKBvz/ZRUg9ixXicyJA+QTaZ2uULF9+YlWPVZutymNGRtvyhG81BnqccUFkg/Fpd61ghcSHIOw8HeQO2zzSREi5ksbRpNmtkOzJuEJsL/Rm6clFEHI1TRseoJqZQ78CR2eMU7pLFARxx92SaPZujTQDKyD70iNLL0/Qhk+TsgKBVX9Wvpa73T3ySU6d6ueBqDWSU23ZI8bBL5G0QOBGotwkA/GsnRuGhD42tX8eJVch1IAYGhO3QWSQU/RAgG7mWwClLt4fkFBVX6C+v8MmW770y0IguQD1FfhPH3X3YbBx2cpVyZKYc8Wn6bZHv8NbxGB+uidlR0V6N6
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CY4PR05MB36375619596091EC10C016F2D47F0CY4PR05MB3637namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 416d7988-0b1f-4f0d-7cb7-08d7615b5918
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Nov 2019 19:15:25.9200 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 8fzK6eeXOZWXNNx9Gzyqp3DHgKd/hnJ1lZ1Ga7FzAqLQ9kjYoK8qqq1BK1BBz5TYKqqHJMykX68yMjyCUbMIPg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR05MB3286
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,1.0.8 definitions=2019-11-04_10:2019-11-04,2019-11-04 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 lowpriorityscore=0 malwarescore=0 suspectscore=0 impostorscore=0 bulkscore=0 phishscore=0 clxscore=1015 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1908290000 definitions=main-1911040184
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/30wOPMIoH5E-G4XS-Ck6d-r5j_A>
Subject: Re: [Bier] Review Comments - draft-ietf-bier-bar-ipa-05
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Nov 2019 19:23:52 -0000

-06 has been posted, with the following additions:

3.  Examples

   As an example, one may define BAR=x with semantics of "excluding BIER
   incapable routers".  That BIER specific constraint can go with any
   IPA: whatever RCRA defined by the IPA are augmented with "excluding
   BIER incapable routers", i.e., BIER incapable routers are not put
   onto the candidate list during SPF calculation.

   Note that if the BC and RC happen to conflict and lead to an empty
   topology, then no native BIER forwarding path will be found.  That is
   a network design issue that an operator need to avoid when choosing
   BAR/IPA.

Thanks!
Jeffrey

From: Jeffrey (Zhaohui) Zhang
Sent: Monday, November 4, 2019 1:55 PM
To: Xiejingrong (Jingrong) <xiejingrong@huawei.com>; draft-ietf-bier-bar-ipa@ietf.org
Cc: BIER WG <bier@ietf.org>
Subject: RE: Review Comments - draft-ietf-bier-bar-ipa-05

Hi Jingrong,

Please see zzh2> below.

From: Xiejingrong (Jingrong) <xiejingrong@huawei.com<mailto:xiejingrong@huawei.com>>
Sent: Monday, November 4, 2019 7:18 AM
To: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net<mailto:zzhang@juniper.net>>; draft-ietf-bier-bar-ipa@ietf.org<mailto:draft-ietf-bier-bar-ipa@ietf.org>
Cc: BIER WG <bier@ietf.org<mailto:bier@ietf.org>>
Subject: RE: Review Comments - draft-ietf-bier-bar-ipa-05

Hi Jeffrey,
Please find below my comments marked with [XJR]

Thanks
Jingrong

From: Jeffrey (Zhaohui) Zhang [mailto:zzhang@juniper.net]
Sent: Wednesday, October 30, 2019 9:52 AM
To: Xiejingrong (Jingrong) <xiejingrong@huawei.com<mailto:xiejingrong@huawei.com>>; draft-ietf-bier-bar-ipa@ietf.org<mailto:draft-ietf-bier-bar-ipa@ietf.org>
Cc: BIER WG <bier@ietf.org<mailto:bier@ietf.org>>
Subject: RE: Review Comments - draft-ietf-bier-bar-ipa-05

Hi Jingrong,

Thank you for shepherding the document. Please see zzh> below.

From: Xiejingrong <xiejingrong@huawei.com<mailto:xiejingrong@huawei.com>>
Sent: Monday, October 7, 2019 11:56 PM
To: draft-ietf-bier-bar-ipa@ietf.org<mailto:draft-ietf-bier-bar-ipa@ietf.org>
Cc: BIER WG <bier@ietf.org<mailto:bier@ietf.org>>
Subject: Review Comments - draft-ietf-bier-bar-ipa-05

Hi authors,
I am assigned as Doc shepherd for this draft.
I think the document is useful to clarify the BAR/IPA field defined in RFC8401/RFC8444.
My main suggestion is adding some real examples of IPA/BAR to make this document more clear and deployable.
Please see below for the comments.

1. For the following rules 1# and #2, how if there are conflictions of BC(X) and RC(X)?
For example, BC(X) says “prefer RED links and exclude BLUE links”, while RC(X) says “prefer BLUE links and exclude RED links”.
   1.  Apply the BIER constraints, resulting in BC(X).
   2.  Apply the routing constraints, resulting in RC(BC(X)).
   3.  Select the algorithm AG as following:
       A.  If BA is NULL, AG is set to RA.
       B.  If BA is not NULL, AG is set to BA.
   4.  Run AG on RC(BC(X)).

Zzh> An operator would be expected to do the reasonable things and not specify conflicting BC and RC for a sub-domain. Even if he did specify conflicting BC and RC, the rules are clear – apply BC first and then RC. In your example, you end up with no links to use. I think that’s acceptable.
[XJR] I assume this is a point need to be pointed out, since it is useful for avoiding misconfiguration, and this document is intent to explain the BAR and IPA.
Zzh2> I thought that was obvious, but I’ll explicitly point that out.

Should the combination of IPA/BAR be specified (following text be changed to new text) ?
[ORIG TEXT]
   When a new BAR value is defined, its corresponding BC/BA semantics MUST be specified.
   For a new IGP Algorithm to be used as a BIER IPA, its RC/RA semantics MUST also be clear.
[NEW TEXT]
   When a new BAR value is defined, its corresponding BC/BA semantics MUST be specified, and the combination of BAR and IPA MUST also be specified.
   For a new IGP Algorithm to be used as a BIER IPA, its RC/RA semantics MUST be specified, and the combination of BAR and IPA MUST also be specified.

Zzh> As long as BC/BA or RC/RA semantics are clear, the combination is clear once you apply the rules, right?
[XJR] the combination is not clear due to the following comments ---- combination of BAR and IPA is not only responsible for calculating the BFR-NBR of a BFER, but also responsible of calculating the next-hop of a non-directly-connected BFR-NBR.
Zzh2> I don’t agree with the above. An operator may not care how the BFR-NBR is reached via any tunnel; even if that tunnel must be following IPA (which I don’t think this document should specify), it is not the combination of BAR and IPA that determines the nexthop for that tunnel, as there should be no BIER routers (that advertise the same BAR+IPA) on the tunnel path to the BFR-NBR.

2. For the function of bypassing Non-BIER routers (6.9 of RFC8279), this document is not clear.
Two possible options I can think of:
(a) Run AG on RC(BC(x)) to find the BFR-NBR of a BFER, and then run RA on RC(x) to find the IGP next-hop toward the BFR-NBR if BFR-NBR is not a directly connected NBR.
(b) Run AG on RC(BC(x)) to find the BFR-NBR of a BFER, and then run AG on RC(BC(x)) to find the IGP next-hop toward the BFR-NBR if BFR-NBR is not a directly connected NBR.

Zzh> I don’t follow the above. The spec does say that for a particular subdomain if your own BAR/IPA is different from a BFR’s, then that BFR is considered as not BIER capable and whatever method you use to deal with incapable routers apply. I think that’s straightforward.
[XJR] it is reasonable for me to describe the overall method of dealing with incapable routers in RFC8279, but this doc is responsible for making this more detailed, since it is a specification of BAR/IPA and may be used to address the incapable routers as a use case of BAR.
Zzh2> Details of dealing with incapable routers is outside the scope of this document. There are many ways to deal with incapable routers: section 6.9 of 8279 (and tethering extension); excluding in capable routers; whatever may be defined in the future.

(a) looks better to me, since the finding of IGP next-hop toward the BFR-NBR seems to be a pure IGP behavior.
It is also notable that, incorrect combination of IPA and BAR may cause black hole of building a BIFT item to a BFER.
For example, a non-directly-connected BFR-NBR is found but the IGP next-hop toward the BFR-NBR could not be found according to the IPA+BAR.


3. For the above rule #1, the doc is not clear what does the BC(x) mean if BC = NULL. So does the rule #2 when RC = NULL.

Zzh> BC means BIER specific constraints. If BC is NULL it means no constraints.

4. I think one or two examples of IPA/BAR should be given to make it clear as an update to RFC8401/RFC8444.
(1)IPA = 0, and IPA = 1
IPA = 0 means that, RA = SPF based on link metric, RC = permit any node to overwrite the SPF path to the BFR-prefix of a BFR.
IPA = 1 means that, RA = SPF based on link metric, RC = Not permit overwriting the SPF path to the BFR-prefix of a BFR.

Text from draft-ietf-isis-segment-routing-extensions for reference:
      0: Shortest Path First (SPF) algorithm based on link metric.  This
      is the well-known shortest path algorithm as computed by the IS-IS
      Decision process.  Consistent with the deployed practice for link-
      state protocols, algorithm 0 permits any node to overwrite the SPF
      path with a different path based on local policy.

      1: Strict Shortest Path First (SPF) algorithm based on link
      metric.  The algorithm is identical to algorithm 0 but algorithm 1
      requires that all nodes along the path will honor the SPF routing
      decision.  Local policy MUST NOT alter the forwarding decision
      computed by algorithm 1 at the node claiming to support algorithm 1.

Zzh> It seems to me that the general rules are clear enough and adding the above examples only makes things more complicated?

(2)BAR = 0, and BAR = 1
BAR = 0 means that, BA = NULL, BC = NULL
BAR = 1 means that, BA = NULL, BC = exclude non-BIER routers

Zzh>  BAR 0 is already defined in 8401/8444. BAR 1 has not been officially defined (even thought it was used as an example in various discussions) and it’s not good to use it as an example here.
[XJR] Example is better than precept. One may find it difficult to define any new BAR/IPA according to this document if there is no examples, since the basic idea of BAR/IPA have been put in 8401/8444 since its proposal.
Zzh2> I honestly don’t see why it is difficult and why an example will help defining new BAR/IPA. But I will add the following example:

  For example, one may define BAR=x with semantics of “excluding BIER incapable routers”. That BIER specific constraint can go with any IPA: whatever RCRA defined by IPA is augmented with “excluding BIER incapable routers”.

Is the above interpretation of IPA = 0 correct ?

Zzh> Honestly speaking I’m not good at interpreting IPA definitions.

If it is, then maybe the use of IPA/BAR = 1/1 is allowed, but IPA/BAR = 0/1 is not allowed ?

Zzh> I don’t see why 0/1 is not allowed. Using your example, BAR1 simply says excluding non-BIER routers, i.e. as if they don’t exist (or treated as always down). I don’t see why BAR 1 would conflict with ANY IPA.
[XJR] One may find a non-directly-connected BFR-NBR by using BAR+IPA, but may failed to find the next-hop of the non-directly-connected BFR-NBR according to IPA.
Zzh2> That’s not a conflict of BAR/IPA definition; that’s just like requesting a RSVP-TE tunnel with 1G BW while all the links in the network are only 10M.
Zzh2> Thanks!
Zzh2> Jeffrey

If IPA/BAR = 0/1 is used, run AG on RC(BC(x)) to get the non-directly-connected BFR-NBR of a BFER seems difficult.


5.  editorial suggestions:
The topology could be a default topology, a multi-topology [RFC5120] topology.
Suggested:
The topology could be a default topology, or a non-default topology as defined in [RFC5120].

For a particular topology X (which could be a default topology or multi-topolgy topology)
Suggested:
For a particular topology X (which could be a default topology or non-default topology)

Zzh> Sure I can change that.
Zzh> Thanks!
Zzh> Jeffrey

Thanks
Jingrong