Re: [Bier] Review Comments - draft-ietf-bier-bar-ipa-05

"Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net> Mon, 04 November 2019 18:55 UTC

Return-Path: <zzhang@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 753E8120019; Mon, 4 Nov 2019 10:55:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hoHsc8RwQATt; Mon, 4 Nov 2019 10:55:26 -0800 (PST)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 13A6612013A; Mon, 4 Nov 2019 10:55:26 -0800 (PST)
Received: from pps.filterd (m0108156.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id xA4Ig6GS009123; Mon, 4 Nov 2019 10:55:21 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=hvu/SWiQl0TEZFySukn5TxQv04F3o/fIzgb7BdFheXA=; b=de8Xo2LAXIoH/9JyYK+R5AdkX7WW3AmsHkEAA+oq/yCJBybaKIOwxepDvT5diuHxXaLQ XFkA3RzrNKxt/0jXfNIXRREAl6lxu/Tnqb8Jh3R8BKNYZp8RXq31E+kPbj360Vo3QTgo cdJobAGYFJks8cXsaxErtAzes5IT+3K4FTDl7fZNZ+na9jswPgnbbt1e2hCHbgq2dAHH 5ev5BB7TIl6zRZEHlu/X/ptK1YC6x7c1ffUNSXOIhaMaM4eYjcYmWdJB87Yor4NTMykP KTVa2EnlYXcZtgd5NlsZKbZegjHayszqb+hH0GhYJ8JcT9+4wb89d9A8qaq/9fVLrjGg LQ==
Received: from nam04-co1-obe.outbound.protection.outlook.com (mail-co1nam04lp2052.outbound.protection.outlook.com [104.47.45.52]) by mx0a-00273201.pphosted.com with ESMTP id 2w18tp33a7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Mon, 04 Nov 2019 10:55:21 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OxO2H2gsTH1mdsGQ2gYmHrNz3NIi5NDyQv3eUIvu6cZarYnapVf6SI4643X5yg8NEKeejI1yLyan3tDyvQEi+TZsV1IUBl2bsWFOnPzUJOnl9Z2XpOEzLL+zFTlHeVcb4+nt/GFBkgVKX6vVP7RAaku+OsecuIxUWzAKjHLD8se+xnuhgCtjOt/KwIj2DkljdqoBCII5pPBgv7djcQxsy8sKyokliPXjd1BbyyVoDv/wghJ5Gl0WFYR3h0Nmi4BPtCxIoo0HiOlbZuEEpqcvpP6YNvHQu2DYw/bctWfDtGpqPIDpAk4zw1LMOPmz47U4fQOvgfvzTpRERhp6xbWvaA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hvu/SWiQl0TEZFySukn5TxQv04F3o/fIzgb7BdFheXA=; b=C3eQjzu8P06wE/wj6fLiB2BRTEUOYT5W59zj8htWuG1jsuopqfiqT6XSChHx8Q0ST0OpFHOMX3q1ky7m1UaP047AFhKjqooiYBBk43i9JN+utnkWfNYMq+EeaowtIF/FzyovfHK89mS5IJAUq4wQ+Ji4slPWODnrHtBf/46rhzG2ZbqLdqxYdk2T++TBk3XLbdn2Cy862kGEN4qvLtyxo7xNBMaa1PoG873qd99Xt1vgP85GuMgUbaIVxHS/M5y8bUtp6VQKq3s32DIMMAuJImNSE50sJ/7Ikc1CMOYcuvMUqONucdy3ASaJqW6Cp89Xx2+b/e0r+UlCK9xJZzmkdw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
Received: from CY4PR05MB3637.namprd05.prod.outlook.com (10.171.248.25) by CY4PR05MB3366.namprd05.prod.outlook.com (10.171.248.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2430.16; Mon, 4 Nov 2019 18:55:07 +0000
Received: from CY4PR05MB3637.namprd05.prod.outlook.com ([fe80::e036:dbee:4e8c:7359]) by CY4PR05MB3637.namprd05.prod.outlook.com ([fe80::e036:dbee:4e8c:7359%7]) with mapi id 15.20.2430.013; Mon, 4 Nov 2019 18:55:07 +0000
From: "Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net>
To: "Xiejingrong (Jingrong)" <xiejingrong@huawei.com>, "draft-ietf-bier-bar-ipa@ietf.org" <draft-ietf-bier-bar-ipa@ietf.org>
CC: BIER WG <bier@ietf.org>
Thread-Topic: Review Comments - draft-ietf-bier-bar-ipa-05
Thread-Index: AdV9jFJ+dTormCscQCKdYIHfTzcHKARM3l4QAREiEnAADoXacA==
Date: Mon, 04 Nov 2019 18:55:07 +0000
Message-ID: <CY4PR05MB3637CD495F6D9C30B0BA22A6D47F0@CY4PR05MB3637.namprd05.prod.outlook.com>
References: <16253F7987E4F346823E305D08F9115AAB9F103F@nkgeml514-mbx.china.huawei.com> <DM5PR05MB354821C57CB4B8C5F819BFC9D4600@DM5PR05MB3548.namprd05.prod.outlook.com> <16253F7987E4F346823E305D08F9115AABA496E6@nkgeml514-mbx.china.huawei.com>
In-Reply-To: <16253F7987E4F346823E305D08F9115AABA496E6@nkgeml514-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.2.0.14
dlp-reaction: no-action
x-originating-ip: [96.237.64.80]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 97b79d20-4ada-4a0a-a369-08d76158829c
x-ms-traffictypediagnostic: CY4PR05MB3366:
x-microsoft-antispam-prvs: <CY4PR05MB3366B5426C495CBBADA2573FD47F0@CY4PR05MB3366.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0211965D06
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(39860400002)(396003)(346002)(376002)(136003)(51444003)(37854004)(199004)(189003)(86362001)(2906002)(256004)(486006)(55016002)(14454004)(446003)(26005)(186003)(66476007)(64756008)(790700001)(4326008)(6116002)(76116006)(316002)(66556008)(66446008)(3846002)(11346002)(25786009)(76176011)(14444005)(7696005)(66946007)(102836004)(53546011)(6506007)(110136005)(71190400001)(71200400001)(6246003)(66066001)(9326002)(9686003)(8676002)(81156014)(8936002)(81166006)(236005)(54896002)(6436002)(478600001)(2501003)(74316002)(52536014)(476003)(229853002)(561944003)(99286004)(7736002)(5660300002)(33656002)(6306002); DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR05MB3366; H:CY4PR05MB3637.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: +QKTqlQPcVZJ9OX5fmrk+ASbKICfGuH5jPYjdfxmyjl6l8dPhn3+xGfUE/x6Il4u1YLBx7975O4/nJxeL2cZ+0P2E0Thb1LBLCK3wBNViYML2AoXC3YGglhXqUmYb3MxwLBom2wT/zVv/TAQgKbdxKRc4XOWci2bq3j4m61oLAXFiA87UV1FfpFaz0iw0HUhsgK4qdhYGsJFLPU8Kf4fFGVb9mp0EYqhcYqGw1YuYEQ+W6R67qA2iFV13hT1Az9unVEmQKoVFPl0e3vofnYZbUyopW7515tHB8ewEPsZNKkvAm9aNxJjdrsodoUQcmvXHNOWn7pyG8xM1l/g6J2q6BupGkiBW6658ESdTrW6S44dIo5Yqw1bHP9MmgnqtCqi4AjdLjEzipy7Ii+fngPCUj50zOdG8HJURlk3I9nL81B9vnMDyiSK2WJWLObO0Xt6
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CY4PR05MB3637CD495F6D9C30B0BA22A6D47F0CY4PR05MB3637namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 97b79d20-4ada-4a0a-a369-08d76158829c
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Nov 2019 18:55:07.1195 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dk4P/C4Wr1Vf6BUw2L7tYI3LkhNGoupd7EDxHF2G6VC/qvsvSWU6TJ2/TLdTNfnchNZvSHCJFFzS/ymY3aqKfw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR05MB3366
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,1.0.8 definitions=2019-11-04_10:2019-11-04,2019-11-04 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 lowpriorityscore=0 suspectscore=0 malwarescore=0 mlxlogscore=999 impostorscore=0 priorityscore=1501 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 adultscore=0 clxscore=1015 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1908290000 definitions=main-1911040181
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/9ULZjzL6Cl-yQE8IMG6AV_GMTrQ>
Subject: Re: [Bier] Review Comments - draft-ietf-bier-bar-ipa-05
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Nov 2019 18:55:31 -0000

Hi Jingrong,

Please see zzh2> below.

From: Xiejingrong (Jingrong) <xiejingrong@huawei.com>
Sent: Monday, November 4, 2019 7:18 AM
To: Jeffrey (Zhaohui) Zhang <zzhang@juniper.net>; draft-ietf-bier-bar-ipa@ietf.org
Cc: BIER WG <bier@ietf.org>
Subject: RE: Review Comments - draft-ietf-bier-bar-ipa-05

Hi Jeffrey,
Please find below my comments marked with [XJR]

Thanks
Jingrong

From: Jeffrey (Zhaohui) Zhang [mailto:zzhang@juniper.net]
Sent: Wednesday, October 30, 2019 9:52 AM
To: Xiejingrong (Jingrong) <xiejingrong@huawei.com<mailto:xiejingrong@huawei.com>>; draft-ietf-bier-bar-ipa@ietf.org<mailto:draft-ietf-bier-bar-ipa@ietf.org>
Cc: BIER WG <bier@ietf.org<mailto:bier@ietf.org>>
Subject: RE: Review Comments - draft-ietf-bier-bar-ipa-05

Hi Jingrong,

Thank you for shepherding the document. Please see zzh> below.

From: Xiejingrong <xiejingrong@huawei.com<mailto:xiejingrong@huawei.com>>
Sent: Monday, October 7, 2019 11:56 PM
To: draft-ietf-bier-bar-ipa@ietf.org<mailto:draft-ietf-bier-bar-ipa@ietf.org>
Cc: BIER WG <bier@ietf.org<mailto:bier@ietf.org>>
Subject: Review Comments - draft-ietf-bier-bar-ipa-05

Hi authors,
I am assigned as Doc shepherd for this draft.
I think the document is useful to clarify the BAR/IPA field defined in RFC8401/RFC8444.
My main suggestion is adding some real examples of IPA/BAR to make this document more clear and deployable.
Please see below for the comments.

1. For the following rules 1# and #2, how if there are conflictions of BC(X) and RC(X)?
For example, BC(X) says “prefer RED links and exclude BLUE links”, while RC(X) says “prefer BLUE links and exclude RED links”.
   1.  Apply the BIER constraints, resulting in BC(X).
   2.  Apply the routing constraints, resulting in RC(BC(X)).
   3.  Select the algorithm AG as following:
       A.  If BA is NULL, AG is set to RA.
       B.  If BA is not NULL, AG is set to BA.
   4.  Run AG on RC(BC(X)).

Zzh> An operator would be expected to do the reasonable things and not specify conflicting BC and RC for a sub-domain. Even if he did specify conflicting BC and RC, the rules are clear – apply BC first and then RC. In your example, you end up with no links to use. I think that’s acceptable.
[XJR] I assume this is a point need to be pointed out, since it is useful for avoiding misconfiguration, and this document is intent to explain the BAR and IPA.
Zzh2> I thought that was obvious, but I’ll explicitly point that out.

Should the combination of IPA/BAR be specified (following text be changed to new text) ?
[ORIG TEXT]
   When a new BAR value is defined, its corresponding BC/BA semantics MUST be specified.
   For a new IGP Algorithm to be used as a BIER IPA, its RC/RA semantics MUST also be clear.
[NEW TEXT]
   When a new BAR value is defined, its corresponding BC/BA semantics MUST be specified, and the combination of BAR and IPA MUST also be specified.
   For a new IGP Algorithm to be used as a BIER IPA, its RC/RA semantics MUST be specified, and the combination of BAR and IPA MUST also be specified.

Zzh> As long as BC/BA or RC/RA semantics are clear, the combination is clear once you apply the rules, right?
[XJR] the combination is not clear due to the following comments ---- combination of BAR and IPA is not only responsible for calculating the BFR-NBR of a BFER, but also responsible of calculating the next-hop of a non-directly-connected BFR-NBR.
Zzh2> I don’t agree with the above. An operator may not care how the BFR-NBR is reached via any tunnel; even if that tunnel must be following IPA (which I don’t think this document should specify), it is not the combination of BAR and IPA that determines the nexthop for that tunnel, as there should be no BIER routers (that advertise the same BAR+IPA) on the tunnel path to the BFR-NBR.

2. For the function of bypassing Non-BIER routers (6.9 of RFC8279), this document is not clear.
Two possible options I can think of:
(a) Run AG on RC(BC(x)) to find the BFR-NBR of a BFER, and then run RA on RC(x) to find the IGP next-hop toward the BFR-NBR if BFR-NBR is not a directly connected NBR.
(b) Run AG on RC(BC(x)) to find the BFR-NBR of a BFER, and then run AG on RC(BC(x)) to find the IGP next-hop toward the BFR-NBR if BFR-NBR is not a directly connected NBR.

Zzh> I don’t follow the above. The spec does say that for a particular subdomain if your own BAR/IPA is different from a BFR’s, then that BFR is considered as not BIER capable and whatever method you use to deal with incapable routers apply. I think that’s straightforward.
[XJR] it is reasonable for me to describe the overall method of dealing with incapable routers in RFC8279, but this doc is responsible for making this more detailed, since it is a specification of BAR/IPA and may be used to address the incapable routers as a use case of BAR.
Zzh2> Details of dealing with incapable routers is outside the scope of this document. There are many ways to deal with incapable routers: section 6.9 of 8279 (and tethering extension); excluding in capable routers; whatever may be defined in the future.

(a) looks better to me, since the finding of IGP next-hop toward the BFR-NBR seems to be a pure IGP behavior.
It is also notable that, incorrect combination of IPA and BAR may cause black hole of building a BIFT item to a BFER.
For example, a non-directly-connected BFR-NBR is found but the IGP next-hop toward the BFR-NBR could not be found according to the IPA+BAR.


3. For the above rule #1, the doc is not clear what does the BC(x) mean if BC = NULL. So does the rule #2 when RC = NULL.

Zzh> BC means BIER specific constraints. If BC is NULL it means no constraints.

4. I think one or two examples of IPA/BAR should be given to make it clear as an update to RFC8401/RFC8444.
(1)IPA = 0, and IPA = 1
IPA = 0 means that, RA = SPF based on link metric, RC = permit any node to overwrite the SPF path to the BFR-prefix of a BFR.
IPA = 1 means that, RA = SPF based on link metric, RC = Not permit overwriting the SPF path to the BFR-prefix of a BFR.

Text from draft-ietf-isis-segment-routing-extensions for reference:
      0: Shortest Path First (SPF) algorithm based on link metric.  This
      is the well-known shortest path algorithm as computed by the IS-IS
      Decision process.  Consistent with the deployed practice for link-
      state protocols, algorithm 0 permits any node to overwrite the SPF
      path with a different path based on local policy.

      1: Strict Shortest Path First (SPF) algorithm based on link
      metric.  The algorithm is identical to algorithm 0 but algorithm 1
      requires that all nodes along the path will honor the SPF routing
      decision.  Local policy MUST NOT alter the forwarding decision
      computed by algorithm 1 at the node claiming to support algorithm 1.

Zzh> It seems to me that the general rules are clear enough and adding the above examples only makes things more complicated?

(2)BAR = 0, and BAR = 1
BAR = 0 means that, BA = NULL, BC = NULL
BAR = 1 means that, BA = NULL, BC = exclude non-BIER routers

Zzh>  BAR 0 is already defined in 8401/8444. BAR 1 has not been officially defined (even thought it was used as an example in various discussions) and it’s not good to use it as an example here.
[XJR] Example is better than precept. One may find it difficult to define any new BAR/IPA according to this document if there is no examples, since the basic idea of BAR/IPA have been put in 8401/8444 since its proposal.
Zzh2> I honestly don’t see why it is difficult and why an example will help defining new BAR/IPA. But I will add the following example:

  For example, one may define BAR=x with semantics of “excluding BIER incapable routers”. That BIER specific constraint can go with any IPA: whatever RCRA defined by IPA is augmented with “excluding BIER incapable routers”.

Is the above interpretation of IPA = 0 correct ?

Zzh> Honestly speaking I’m not good at interpreting IPA definitions.

If it is, then maybe the use of IPA/BAR = 1/1 is allowed, but IPA/BAR = 0/1 is not allowed ?

Zzh> I don’t see why 0/1 is not allowed. Using your example, BAR1 simply says excluding non-BIER routers, i.e. as if they don’t exist (or treated as always down). I don’t see why BAR 1 would conflict with ANY IPA.
[XJR] One may find a non-directly-connected BFR-NBR by using BAR+IPA, but may failed to find the next-hop of the non-directly-connected BFR-NBR according to IPA.
Zzh2> That’s not a conflict of BAR/IPA definition; that’s just like requesting a RSVP-TE tunnel with 1G BW while all the links in the network are only 10M.
Zzh2> Thanks!
Zzh2> Jeffrey

If IPA/BAR = 0/1 is used, run AG on RC(BC(x)) to get the non-directly-connected BFR-NBR of a BFER seems difficult.


5.  editorial suggestions:
The topology could be a default topology, a multi-topology [RFC5120] topology.
Suggested:
The topology could be a default topology, or a non-default topology as defined in [RFC5120].

For a particular topology X (which could be a default topology or multi-topolgy topology)
Suggested:
For a particular topology X (which could be a default topology or non-default topology)

Zzh> Sure I can change that.
Zzh> Thanks!
Zzh> Jeffrey

Thanks
Jingrong