Re: [Bier] Call for adoption: draft-wijnandsxu-bier-non-mpls-bift-encoding-01

Eric C Rosen <erosen@juniper.net> Wed, 28 February 2018 19:06 UTC

Return-Path: <erosen@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 67B4112025C for <bier@ietfa.amsl.com>; Wed, 28 Feb 2018 11:06:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ubtU7_q0QlEB for <bier@ietfa.amsl.com>; Wed, 28 Feb 2018 11:06:36 -0800 (PST)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C9931200E5 for <bier@ietf.org>; Wed, 28 Feb 2018 11:06:36 -0800 (PST)
Received: from pps.filterd (m0108162.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w1SJ3s35023147; Wed, 28 Feb 2018 11:06:35 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=PPS1017; bh=4t0MgG6pfi8LemvpzZnpPazTO8CKq6Uk0bk21fGyokA=; b=Vkp2dzNn3EEEUeYkGQ2BvtYYoF8snVIG0bbpwrb+PYRwOYjBij8QHvsj18xdGyMHAlzq e90SZdh3GcKHdC+Z5GJoAVi/g1oiri/U4uXUGs7Ov4zE/+ZxXLQD7PuNjNm+/yLVEWPo Enz4yz+oo2XE+wGxOM8eI9SVzKMVPgthrx2XwmFRfCTFzd1yVGvuGG+8HF8VhnymgUR+ MrrjAJonhsgPXi9k1vlq2r83jxrIYhRhFYxpiaLAr1GkaTA8ejEfZjRvUs0Leh3TNPIT qvCf4MarapQaXKjMe8CCieET/8DQlbvsUt7dD/oQYHCP9wJK888AuOuBKdQ9UwEbw/hg zg==
Received: from nam03-co1-obe.outbound.protection.outlook.com (mail-co1nam03lp0019.outbound.protection.outlook.com [216.32.181.19]) by mx0b-00273201.pphosted.com with ESMTP id 2ge24fg0y0-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Wed, 28 Feb 2018 11:06:34 -0800
Received: from [172.29.38.138] (66.129.241.12) by SN1PR05MB2304.namprd05.prod.outlook.com (2a01:111:e400:7a42::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.548.6; Wed, 28 Feb 2018 19:06:31 +0000
To: IJsbrand Wijnands <ice@cisco.com>
Cc: gjshep@gmail.com, BIER WG <bier@ietf.org>
References: <CABFReBrfrJU9u=ugG6Fs2dmZ+5vSs5pxySajfv9B7yvPuDW+hQ@mail.gmail.com> <938789da-1902-1a0e-98af-b2476204be62@juniper.net> <2B0FFBC1-FB91-4A6C-9800-69401C76B095@cisco.com> <d853e377-20a6-2bff-c959-ca16fcc12fad@juniper.net> <2B084F68-4854-4534-9F7D-A13A78E360E6@cisco.com> <b82b8855-a363-ecfd-6622-1b12fecd8a87@juniper.net> <6EE45D34-425C-4CCF-AE14-1F9B7D6ADBD1@cisco.com> <7C4345A7-7177-4BCB-8241-C1AABF6CE864@cisco.com>
From: Eric C Rosen <erosen@juniper.net>
Message-ID: <90eebc1b-e979-7410-9785-b7d0210925b9@juniper.net>
Date: Wed, 28 Feb 2018 14:06:29 -0500
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
In-Reply-To: <7C4345A7-7177-4BCB-8241-C1AABF6CE864@cisco.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
X-Originating-IP: [66.129.241.12]
X-ClientProxiedBy: BN3PR05CA0012.namprd05.prod.outlook.com (2603:10b6:400::22) To SN1PR05MB2304.namprd05.prod.outlook.com (2a01:111:e400:7a42::18)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 72419a8d-3c89-4cea-b412-08d57ede617d
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(2017052603307)(7153060)(7193020); SRVR:SN1PR05MB2304;
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2304; 3:CPmBUOptKt5Tc/VWUYmzDGezzkkYkacaQ09LKuZOJXYG2DhAWxw56eFj7ZIwKhCbVCfLIQn9Djp71+RLa2u5WOmv720MCGK5KCNZ49kjvqnurbztdrC0mVSd2ewOlxSXEBTbA1pbcFU83c8+RzRgvrfQMf5EkhPfcYs0oS3dCtcdUwoaXstvs/JlRvN9xrbcvc+FMUPuxCxX8/1+4ewzVLjlOMXt0lyO3E0eoyT9fHRJzehDBEBfPj9dA8pLBBds; 25:AXWT4SPgZuwXUS3oOyKvdKM07/wu0t6JILCAa63nWYi7tn/3NS578BfUHpibih9u0B2G/ccoVs+KCX0kiCiE0iQryWphZm11WNb4Z3z1fDmgn2nDwa6V9xpIPT3uryj0wua7PePQs55p8VujaH3M/cfyFp/pvp9m/x/yYYgtnUM5tJKhhUtZnHUHqOKH1UeGH8tNbBOyZWOMY1rmAA7y4cpP2NbojMcpcjTTjh72u1DM3SZ/6wdYmuqLeBGdKiPA/2lMfEUsqDsQfilBbnXACh+2/ZXAOA1dws1HQXaF+PaL80/UKb+FI5J9/gf6QpybA5Mt+X9smQLUZQTpAJ6zCA==; 31:SfjLZlKPu//b4bqRpyG8mYufqsvbO/nMaFnPeeaBXPCZ/0BSfeIFFLTP+jPxI6zYqDKnJrooZ8OvlK42gRtTt0pSTa7xRm5VgrdjbJGn+7To7Vza00ouqVTkfsn7t/VLCsy+RFxDCZHAVBJ6Fiz1IDnuyY4oxd0aYB/02xVk30AFwfrSUrtzZyEQCdp3iuZPW+w4M7EzMoHDP5TB0IHVEscrAyN+K5mLUEPWYmMuZgI=
X-MS-TrafficTypeDiagnostic: SN1PR05MB2304:
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2304; 20: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
X-Microsoft-Antispam-PRVS: <SN1PR05MB23040399A2420141EFD59CE8D4C70@SN1PR05MB2304.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(138986009662008)(95692535739014);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040501)(2401047)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(3231220)(944501161)(6055026)(6041288)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(20161123558120)(20161123562045)(6072148)(201708071742011); SRVR:SN1PR05MB2304; BCL:0; PCL:0; RULEID:; SRVR:SN1PR05MB2304;
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2304; 4:Ya4doK9e2Mp6IAtYgwgmpMq0zAArPAP7Iw6BSKm8QjyMIhwpiR8Cb95OkgPWKhl2vnDqD2nffWxIZg3QsRliSq4dQaZp6hI+5WTAcBeLvR9F6L0wC5LYoS2FmI5mAsyEBV4xKRO/3YDCtWguQP3OF+VOWGCEdlNockyeL77pKgKUUVqAU85+2mHrtiqpjOPpllLFi1gjTa1/OHAGk+PKnX7eRg2EjJZjpo+TNhcsMGEBXFV5NfHj8SD3ET0WoP8FqDVhr9TWEYQwpwfFQIHzCXYrAO5jK+AcGvdKjVDOO77tRNR6wgJws8PhMC/nxh1DLgnRm701Lg9BEdQxMEh+D890q/HdFcDTzveto0UPgtg=
X-Forefront-PRVS: 0597911EE1
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(6049001)(376002)(39860400002)(366004)(396003)(39380400002)(346002)(199004)(189003)(85644002)(6916009)(106356001)(2950100002)(76176011)(16526019)(2870700001)(2906002)(36756003)(39060400002)(53936002)(229853002)(4326008)(6486002)(6246003)(31696002)(386003)(86362001)(59450400001)(52116002)(53546011)(77096007)(3846002)(26005)(50466002)(65806001)(68736007)(66066001)(47776003)(58126008)(16576012)(316002)(25786009)(3260700006)(67846002)(6116002)(64126003)(31686004)(23676004)(52146003)(2486003)(65956001)(561944003)(81166006)(8936002)(478600001)(8676002)(81156014)(97736004)(7736002)(105586002)(5660300001)(305945005)(93886005)(65826007); DIR:OUT; SFP:1102; SCL:1; SRVR:SN1PR05MB2304; H:[172.29.38.138]; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
Received-SPF: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: 1;SN1PR05MB2304;23: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
X-Microsoft-Exchange-Diagnostics: 1; SN1PR05MB2304; 6:AScuY3dnS0kchURh+0sXacCNNiPt7S1umHQkHw8GlP7RfnBmK/ni7ynVAEoSwvfK2tsCHF4MmcNwPBcNzXVharf1ooX2dw6MoImQ0I8nYDiLPFYVCBi37A8oxgVJv7Uo1qiZ5RFCmyJIS8g3PzZPA7wC4uWIsLkQtK4z96vB2kRXnAAasoC71Lm5daDIs1DFz5gEDJA1r+/2y7LX1DhDmkAHqm/GeZswWpcsocPni6DJmPjo/6QhAbfS1xkCqviS6oZrnFX2RV0klGHjDiBEOxxkuR1oLE2t2yH8btnhld5PjwqFjiORKs5KzqTtYox/GyncKCETYxhwMJGcxf027s/sDsmr95c/sM8g8kPgxDM=; 5:tSwZ49n3nETJnFe2laUuMbM212cg03vF/OxqocP2FyR/e+BiAlGxEeV/YETD+x14csYQmCABkh1R5LlcNM16GAgUEsuky/IckAtj2r/0PO9OTeWMxkJbcI2BDcui0cJATSkdIlU39Rkc75PvDeIKkSINLyPtgpPTZNKS3F5FqrE=; 24:WNNqglTBel8zEbsJymfwZSwxlaW0IlBFqYD8V1SK3yn52e2BIqvtorpm0iyQb9IGlnQPl28+g5TlRPmrCmzjwyT4yvrrfTcagA9Bz9UU/a8=; 7:yuEoOIvis3uiXcz0fBfY1cNi4Mx6dMpAt7vIrWRH7/Q4Igq5z0WtPG0RxBDNlFvcriv8ug62Rs7YxzgweWHR4GXYRbQ2EI7dgxDWB1QXdQo+Ty8AhvvdyXwJ3m7Z7BPbN6kIeuHUmyqbIiYjdlleVt6FtGQRQ1GBpos9yDuLxERsMCKY2S+aREcLORgL/LMLIrL4tZOaUxb+Ga1PJjftqj1Ns5/uh9m+wnuINCpi+Ce0Rlgw5RpBa7R+EJlcTWNT
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Feb 2018 19:06:31.7533 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 72419a8d-3c89-4cea-b412-08d57ede617d
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN1PR05MB2304
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2018-02-28_11:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1802280232
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/Fj67snq8mwQNU4FaeoFoPD3MHzE>
Subject: Re: [Bier] Call for adoption: draft-wijnandsxu-bier-non-mpls-bift-encoding-01
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2018 19:06:38 -0000

It seems that there are a few details to pin down regarding the 
provisioning model used for assigning BIFT-ids in non-MPLS networks, and 
about the need (or lack of need) for further BIER-specific IGP 
extensions to signal information about the BIFT-ids.

Isn't it premature to be recommending algorithmic encodings before we 
understand the bigger picture?

I do like the idea though of specifying more than one way of structuring 
the BIFT-id, that makes it slightly less likely that someone will burn 
any particular structure into their ASICs.

On 2/28/2018 4:32 AM, IJsbrand Wijnands wrote:
> Eric,
>
> I thought a little more about it and the following occurred to me.
>
> How the non-MPLS encoding is used/provisioned is not fully specified with regards to the IGP drafts. This is something that still need to be done. I don’t expect (although it could) static BFR-id to Prefix mappings to be configured on every BIER node, so it makes perfect sense to use the IGPs for that. That brought me to the topic of the SI. The BIER encapsulation RFC does not spell out that for non-MPLS encapsulation there is an automatic way to translate the BFR-id into a SI and into a BIFT-id. For MPLS we have the Label range for it.
>
> Would it help if we add an other encoding to draft to allow a Provisioned BIFT-Id (PBI) with space to embed the SI? So the PBI is in the range of 0x000 - 0xFFF?
>
>
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>       |          PBI          |       SI      | TC  |S|       TTL     |
>       +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
>
>       |-------- 20 bit BIFT-id Field ---------|
>
>
> It will still be up to the operator to determine which mechanism to use and it will make clear to the implementors there are different ways to encode the BIFT-id, so no assumptions can be made how to parse it.
>
> Thx,
>
> Ice.
>
>
>
>> On 27 Feb 2018, at 20:57, IJsbrand Wijnands <ice@cisco.com> wrote:
>>
>> Eric,
>>
>>> What you're showing below is not a multi-vendor interoperability issue, it's a provisioning issue.    The BIFT-id is only one of
>> I agree its provisioning issue, but that does not mean there is no multi-vendor angle here. Every vendor that supports “bift-id auto” needs to encode it the same way.
>>
>>> several parameters that need to be provisioned, and if the provisioning system cannot manage the BIFT-ids, it's hard to see how it can
>>> manage the provisioning of the BFR-prefixes and BSLs.   To me, this seems a minor problem when compared to the possibility of an implementation that only works when the BIFT-id is constructed according to the algorithm of this draft.
>> On the other hand, there is less risk of mis-configuration because its done through an algorithm :-).
>>
>> Thx,
>>
>> Ice.
>>
>>>
>>> On 2/27/2018 12:59 PM, IJsbrand Wijnands wrote:
>>>> Eric,
>>>>
>>>> Maybe a configuration example helps:
>>>>
>>>> Consider the below configuration:
>>>>
>>>> router bier
>>>> encapsulation non-mpls bsl 256
>>>>   sub-domain 1
>>>>    source loopback 0
>>>>    bift-id auto
>>>>   !
>>>> !
>>>> !
>>>>
>>>> I would think that such configuration is the minimum required on every BIER router (unless there are default that don’t need to be required) independent of the vendor.
>>>>
>>>> Based on the above we can generate a BIFT-id following the draft proposal. Two different vendors having BIER configured will be interoperable because they generate the same BIFT-id, without having to configure it.
>>>>
>>>> It is also possible to configure:
>>>>
>>>> router bier
>>>> encapsulation non-mpls bsl 256
>>>>   sub-domain 1
>>>>    source loopback 0
>>>>    bift-id 10000
>>>>   !
>>>> !
>>>> !
>>>>
>>>> Now the operator needs to manage value ‘10000’ and make sure its configure on every router the same.
>>>>
>>>> Thx,
>>>>
>>>> Ice.
>>>>
>>>>
>>>>> On 27 Feb 2018, at 18:46, Eric C Rosen <erosen@juniper.net> wrote:
>>>>>
>>>>> On 2/27/2018 12:25 PM, IJsbrand Wijnands wrote:
>>>>>> If we want to be interoperable among different vendors, I think it is good to have this documented.
>>>>> This is the sort of statement that really worries me.  What is the interoperability issue?  As long as a vendor allows the assignment of BIFT-ids, interoperability should be possible without the need for any particular suggested way of constructing the BIFT-ids.
>>>>>
>>>>> I'm not sure we can say both that the draft is informational, and that it is needed for multi-vendor interoperability.
>>>>>