Re: [Bier] AD review of draft-ietf-bier-architecture-06

Antoni Przygienda <prz@juniper.net> Fri, 16 June 2017 18:33 UTC

Return-Path: <prz@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6040A12EB9F; Fri, 16 Jun 2017 11:33:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.02
X-Spam-Level:
X-Spam-Status: No, score=-2.02 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_RATIO_08=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cQqSJtWS7REG; Fri, 16 Jun 2017 11:33:41 -0700 (PDT)
Received: from NAM01-BY2-obe.outbound.protection.outlook.com (mail-by2nam01on0105.outbound.protection.outlook.com [104.47.34.105]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10726126C89; Fri, 16 Jun 2017 11:33:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=QT0vtnvECUNjNZBi4R/9DIUgb+slBePjeoMH46wqw5A=; b=jAS/JDMmzbv/MwKRUKkS9N4cf6i1aoGrdDrVnZ9jWGdxujN5dBfd2YGOP9Ti7xU8qMZqUXWNTkY7zs6reBMpzqIyKrbf7KRPPFdK1eCY+EW2dAb8XXaAe5FHtJdCWT3+9hPq1ToMnKksTk3rPfLduU28V4h8kgNd1xe3QviqDZw=
Received: from DM2PR0501MB1438.namprd05.prod.outlook.com (10.161.224.148) by DM2PR0501MB1533.namprd05.prod.outlook.com (10.160.133.11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1178.10; Fri, 16 Jun 2017 18:33:38 +0000
Received: from DM2PR0501MB1438.namprd05.prod.outlook.com ([fe80::88fa:1fd2:314c:23b3]) by DM2PR0501MB1438.namprd05.prod.outlook.com ([fe80::88fa:1fd2:314c:23b3%17]) with mapi id 15.01.1199.006; Fri, 16 Jun 2017 18:33:38 +0000
From: Antoni Przygienda <prz@juniper.net>
To: IJsbrand Wijnands <ice@cisco.com>, Alia Atlas <akatlas@gmail.com>
CC: "bier@ietf.org" <bier@ietf.org>, "draft-ietf-bier-architecture@ietf.org" <draft-ietf-bier-architecture@ietf.org>
Thread-Topic: AD review of draft-ietf-bier-architecture-06
Thread-Index: AQHS5iXynDkZTq0ANkiCzFCFvBq/MqInHyeAgAA9TgA=
Date: Fri, 16 Jun 2017 18:33:38 +0000
Message-ID: <9543A0F2-CA64-4E0C-AE85-6D855D38C59E@juniper.net>
References: <CAG4d1rcU-Xbd4dS8q7sxVSaZra2Cs8Cm50rrn5VUezvdp-8onQ@mail.gmail.com> <62BE802B-F77E-433C-9DAD-8A7B8FD21B07@cisco.com>
In-Reply-To: <62BE802B-F77E-433C-9DAD-8A7B8FD21B07@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.20.0.170309
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=juniper.net;
x-originating-ip: [66.129.239.14]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM2PR0501MB1533; 7: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
x-ms-office365-filtering-correlation-id: 146b1562-3b6b-4af5-4424-08d4b4e6348d
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500041)(300135000095)(300000501041)(300135300095)(22001)(300000502041)(300135100095)(2017030254075)(48565401081)(300000503041)(300135400095)(49563029)(201703131423075)(201703031133081)(300000504041)(300135200095)(300000505041)(300135600095)(300000506037)(300135500095); SRVR:DM2PR0501MB1533;
x-ms-traffictypediagnostic: DM2PR0501MB1533:
x-microsoft-antispam-prvs: <DM2PR0501MB1533852FDD0D40CA2C606EA7ACC10@DM2PR0501MB1533.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(102415395)(6040450)(601004)(2401047)(5005006)(8121501046)(3002001)(100000703101)(100105400095)(10201501046)(93006095)(93001095)(6055026)(6041248)(20161123562025)(20161123555025)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(20161123564025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DM2PR0501MB1533; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DM2PR0501MB1533;
x-forefront-prvs: 0340850FCD
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(39860400002)(39450400003)(39840400002)(39400400002)(39850400002)(39410400002)(51444003)(14454004)(54556002)(230783001)(86362001)(53936002)(7736002)(2906002)(4001350100001)(38730400002)(76176999)(229853002)(81166006)(99936001)(54356999)(50986999)(66066001)(54896002)(6512007)(54906002)(99286003)(6306002)(189998001)(3846002)(6486002)(8676002)(83716003)(478600001)(33656002)(733005)(6116002)(6246003)(5660300001)(39060400002)(6436002)(2900100001)(3660700001)(25786009)(83506001)(5250100002)(4326008)(3280700002)(2950100002)(36756003)(82746002)(6506006)(102836003)(8936002)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR0501MB1533; H:DM2PR0501MB1438.namprd05.prod.outlook.com; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/related; boundary="_005_9543A0F2CA644E0CAE856D855D38C59Ejunipernet_"; type="multipart/alternative"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Jun 2017 18:33:38.1514 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR0501MB1533
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/gooOBD2QTH-glA6lOJC9QgBKxGc>
Subject: Re: [Bier] AD review of draft-ietf-bier-architecture-06
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Jun 2017 18:33:44 -0000

Inline …



--- tony

    >

    > Minor:

    >

    > 1) Sec 4.1: "its BFR prefix"  Is it possible to have multiple BFR prefixes for the same BFR?  I am thinking about renumbering cases (for acquisitions) as well as migrations from IPv4 to IPv4 + IPv6 and then to IPv6.  Conceptually, I see no reason that there couldn't be multiple BFR prefixes for the same BFR as long as they really are that BFR's prefixes.



    Ice: I don’t see "its BFR prefix” in 4.1, but 4.2. Are you asking to allow a router to have say two different BFR-Prefixes for the same BFR-id? I agree if the BFR-Prefixes are on the same router it would not hurt, but it would mess up the duplicate BFR-id detection in the rest of the network. A BFR-id that is owned by multiple BFR-Prefixes indicates an inconsistency and will make the BFR-id to be removed from the BIFT.





      Prz: All procedures are written with a tactic assumption that we have a single BFR-prefix, the implied conceptual model has been spread in language but bit below it is as rough UML (it is probably easiest derived from the ISIS encoding document & the restrictions put on TLV). Having said that, BIER does NOT govern how many such prefixes can show up but reading the ISIS spec we clearly govern for subdomains in BIER Info sub-TLV that



“This sub-TLV MAY appear multiple

   times in a given prefix-reachability TLV - once for each sub-domain

   supported in the associated topology”



We could say more explicitly that “if the subdomain shows up twice ignore it” or “ignore the whole prefix” or “ignore subdomain” or “behavior unspecified”. Thinking through it however whether the domains show up in a single prefix or multiple does not even matter except for possibly BIFT computation where you may need an IP address for a next-hop but then again (and practically; when flooding you really prefer all in a single flooded packet rather than stitching the bits). BIFT construction/computation is implementation dependent so maybe the spec does not have to govern ANYTHING about BFR prefix. With that, the <: BFR-->(1)BFR prefix :> multiplicity may be left out without making the model=BIER architecture defective.



BTW, if anybody sees deviation in this picture of what BIER architecture consists off, please speak up now or hold your piece forever ;-)



[cid:image001.png@01D2E694.6117BE60]



    >

    >

    > 2) Sec 4.2: This is missing the procedures for removing the BIER header for the payload - which would presumably include potential details such as TTL inheritance and DSCP/EXP handling….



    Ice: Yes, part of the procedures should also be “Disposition” of the BIER header.



Prz: Correct, we need clear procedures for the bits in the MPLS label we’re silent about.





    >

    > 4) Sec 6.6.1:"At BFER-D, the BIFT entry (not pictured) for BFR-id 1 will specify an

    >    F-BM of 0000 and a BFR-NBR of BFR-D itself."

    > Sec 6.6.2: "At BFER-D, the BIFT entry (not pictured) for BFR-id 1 will specify an

    >    F-BM of 0000 and a BFR-NBR of BFR-D itself."  and "At BFER-E, the BIFT entry (not pictured) for BFR-id 3 will specify an F-BM of 0000 and a BFR-NBR of BFR-E itself."

    > I don't understand why the F-BM would be 0000 and not 0001 nor how the packet's BitString would end up cleared if the F-BM were 0000.   I suspect a typo, but it is repeated thrice...  I will note that in Sec 6.5 after the pseudocode, it says " It also assumes that the corresponding F-BM has only one bit set, the bit representing the BFER itself."  which appears to contradict the two examples.



    Ice: I think you’re right. The F-BM should be 0001, otherwise the procedure to clear the bit would also not work. We’ll fix it, good catch!



Prz: Looked @ it as well and yes, it needs the fix. Alia, a most impressive diving catch ;-)



[cid:image002.png@01D2E694.6117BE60]





    >

    > 6) Sec 10.2.1: "This fallback procedure will work best if the value of F is

    >    established by the architecture, rather than by provisioning."  Since this is the

    > architecture and it does specify that all BFRs must support a BitStringLength of 256 - surely this is exactly the point to establish the value of F and there isn't a better time. :-)



    Ice: Sec 6.10.1? Ok, maybe we can add that it is RECOMMENDED that the fallback disposition bit-string length is 256...





Prz: I suggest to say that F=256 simply and be done with it …



    >

    > Nit:

    >

    > a) End of Section 3:"An encapsulation for use in MPLS networks is described in

    >    [MPLS_BIER_ENCAPS]"

    > Given that encap is also now a generic encapsulation that will work for Ethernet, this statement could be expanded to be more complete.



    Ice: Ok.



    >

    > b) Sec 4.3: "Since BIER is, in effect, a new type of "tunneling

    >    technology", some extensions to the MVPN signaling are needed in

    >    order to properly interface the multicast flow overlay with the BIER

    >    layer.  These will be specified in a companion document."

    > I think that this is draft-ietf-bier-mvpn, so it'd be helpful to have an informative reference to it.



    Ice: Ack!





Prz: I suggest to refer to more generic “overlay signaling” [we just published EVPN] and refer to MPVN draft as a specific incarnation of such an “overlay signaling”



--- tony