Re: [Bier] Review Comments - draft-ietf-bier-bar-ipa-05

"Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net> Wed, 30 October 2019 01:51 UTC

Return-Path: <zzhang@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E0F41200A3; Tue, 29 Oct 2019 18:51:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UiKv9cUPFwoR; Tue, 29 Oct 2019 18:51:55 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2902312009E; Tue, 29 Oct 2019 18:51:52 -0700 (PDT)
Received: from pps.filterd (m0108162.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id x9U1hJZ5005746; Tue, 29 Oct 2019 18:51:42 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=j6+Qi0iSDspBMzQBEdl9fi37m85J7PdwtCWtf3X4MZ8=; b=lqEosbEC2DwitRb1GWA19la8ZPTamjMYapIssZpPf5soL2NkLRKfUDu7YuSgnHgLIbCo k7iyGWOBI1wBmWZfW0TRROLhjkuxZbqg7346JjD/4s5ugE53S2VCfqsYIFe4fc8LpkUT 936vfNvxUGHce/TuJStKudTGmoM/OQs5jcZI5nKxpoqctWl05JhKX9p4XRDuq9xiYCBK KMp3hmjXbToP9+q8Ew3S/JD+VDiKjg+A1SHMM1j4Va/5BSdv0kpQ7+welDtsGnTjTNFB u/9ypS+H4woWNfZVrVwmBqwu3wVuDvoqU0Ef9S4QU9qEBmx2el6menQTEsbvrfiLhN8K tA==
Received: from nam02-sn1-obe.outbound.protection.outlook.com (mail-sn1nam02lp2053.outbound.protection.outlook.com [104.47.36.53]) by mx0b-00273201.pphosted.com with ESMTP id 2vxwfhga4r-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 29 Oct 2019 18:51:42 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=G91SMjyGJw2Cl2GCZS7vJ3E5a1obRaOulRIJYoUwXHSxjo2fiqmL7xDx96c4iwDOMqF6mhKy+nutwmtMtkH0/SbSOl5B+r5y0E92OQyHGBclhNPdhb2bUN+RXn19AedweBddc2SFcZnnjC6ypJQ7/zGk8QNs0pPLnVnzeYv/EFLmmBjGWYmVCkFk4v8EpL+zehjkbmguxYifVOvuhS3rMKzroxjuTWE/ZGgmrkDcG3XEPFNN/m5vFp5Y9dVXwa/RSOLqDqGIppon5papo/TH0uRaYjVWfDT34QB9FcMeJcj8qc7jH7TW/aQJpsJbmPL/I/GC37vzL4skcVHEXSysSw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=j6+Qi0iSDspBMzQBEdl9fi37m85J7PdwtCWtf3X4MZ8=; b=JAHQyGR1OQi+bCKmqxVuwCTncp4IDXBhf+K+/AtqZ+r8VmKeIZ9/Oe9Oh5c+u2lTAMfl74R/QaXQUVsh/hv1OCkPHNv/GFEt2nvEMxqEcogEvK6gn2ibb3RZayKgIHXEwmLF3/qGzSb0Qz+myhv4x9MT+KjjxkNgYzDT7FSu2KutkWNzOij7PEXKoqbRLb/xm6otDOayKA/nI4oaLVHUZeDOFEqS5QAGTXywBtqO+geiYHhe3VE4eVxUNoK/PF+XiOoNBWmFuEtGomc/sfzmp4nyp09EggV8+Not1HmhSU9PPoK+mIiU2KdofcuFPT2jjq1SvSyt6+bzhbjN7PKYKQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
Received: from DM5PR05MB3548.namprd05.prod.outlook.com (10.174.242.153) by DM5PR05MB3433.namprd05.prod.outlook.com (10.174.190.36) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2408.10; Wed, 30 Oct 2019 01:51:39 +0000
Received: from DM5PR05MB3548.namprd05.prod.outlook.com ([fe80::5de9:4ee0:9174:fc4f]) by DM5PR05MB3548.namprd05.prod.outlook.com ([fe80::5de9:4ee0:9174:fc4f%6]) with mapi id 15.20.2408.016; Wed, 30 Oct 2019 01:51:39 +0000
From: "Jeffrey (Zhaohui) Zhang" <zzhang@juniper.net>
To: Xiejingrong <xiejingrong@huawei.com>, "draft-ietf-bier-bar-ipa@ietf.org" <draft-ietf-bier-bar-ipa@ietf.org>
CC: BIER WG <bier@ietf.org>
Thread-Topic: Review Comments - draft-ietf-bier-bar-ipa-05
Thread-Index: AdV9jFJ+dTormCscQCKdYIHfTzcHKARM3l4Q
Date: Wed, 30 Oct 2019 01:51:39 +0000
Message-ID: <DM5PR05MB354821C57CB4B8C5F819BFC9D4600@DM5PR05MB3548.namprd05.prod.outlook.com>
References: <16253F7987E4F346823E305D08F9115AAB9F103F@nkgeml514-mbx.china.huawei.com>
In-Reply-To: <16253F7987E4F346823E305D08F9115AAB9F103F@nkgeml514-mbx.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.2.0.14
dlp-reaction: no-action
x-originating-ip: [72.70.34.241]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 8e609b7d-73d0-4544-dedc-08d75cdbb4e1
x-ms-traffictypediagnostic: DM5PR05MB3433:
x-microsoft-antispam-prvs: <DM5PR05MB34338EB02CE523C43EDE5634D4600@DM5PR05MB3433.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02065A9E77
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(136003)(366004)(346002)(376002)(39860400002)(396003)(189003)(199004)(51444003)(102836004)(81166006)(55016002)(26005)(86362001)(66066001)(186003)(71200400001)(71190400001)(316002)(6436002)(25786009)(110136005)(2906002)(6246003)(9686003)(54896002)(6306002)(2501003)(229853002)(74316002)(66476007)(256004)(7736002)(66946007)(6116002)(8676002)(64756008)(3846002)(478600001)(790700001)(76176011)(9326002)(66446008)(14454004)(99286004)(66556008)(76116006)(33656002)(5660300002)(52536014)(53546011)(446003)(4326008)(8936002)(476003)(11346002)(486006)(7696005)(14444005)(6506007)(81156014); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR05MB3433; H:DM5PR05MB3548.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: w/wXqMcHMt2MHncsztOc/oVKnxHeYbZpfL10mkJ895wAUpHtPxkOM2dLogPJqsR1f+lPk66I8S6EWOPf31+80dpO5BXUzkYGObyNq5qqpThuhCEiB6qo6my3rRDkt6Ad6o0Zo+tIYaYnsaQ2IpB0OpyU2uRGMUkFfkplhmuofT86vwE1HJweFrOAzh413cfCWDrfEt3Hq4YyuhHA1xqnzlvHSSYfFdITVXW9cMXZGtyx0TQe+FvENGoU35GmZ88erbTvefu3QpTZ++jTPeGeWjvhM4BlvfmFiPyBJ+mOy7njWY2okskS10vtJwzNk7mfXNxb+tZufnIbbEsE2kkDlNBO5GYxLh231zZMGk7eyENK86Q1xdvtFA4sUZ2z3/89KCL24ZEnOKkArt+SoU5F8GKJaVh9bepnd4y5LJz87zTNRKJ6WCUsG76DjRKQscEY
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_DM5PR05MB354821C57CB4B8C5F819BFC9D4600DM5PR05MB3548namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 8e609b7d-73d0-4544-dedc-08d75cdbb4e1
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Oct 2019 01:51:39.7200 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: xqD98/Zc5rV3G4zHhgbEl6z9UCzSiMn9WLjQnx2FwuUIY7nLehoF7B37+5o9IVIzPD+oRTT57V6JXslWq7Gnjg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR05MB3433
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,1.0.8 definitions=2019-10-30_01:2019-10-28,2019-10-30 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 lowpriorityscore=0 malwarescore=0 adultscore=0 spamscore=0 mlxlogscore=999 clxscore=1011 phishscore=0 suspectscore=0 impostorscore=0 mlxscore=0 bulkscore=0 priorityscore=1501 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-1908290000 definitions=main-1910300017
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/kNnWfwc9pLUIm4Wc5frHOntRsLY>
Subject: Re: [Bier] Review Comments - draft-ietf-bier-bar-ipa-05
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Oct 2019 01:51:58 -0000

Hi Jingrong,

Thank you for shepherding the document. Please see zzh> below.

From: Xiejingrong <xiejingrong@huawei.com>
Sent: Monday, October 7, 2019 11:56 PM
To: draft-ietf-bier-bar-ipa@ietf.org
Cc: BIER WG <bier@ietf.org>
Subject: Review Comments - draft-ietf-bier-bar-ipa-05

Hi authors,
I am assigned as Doc shepherd for this draft.
I think the document is useful to clarify the BAR/IPA field defined in RFC8401/RFC8444.
My main suggestion is adding some real examples of IPA/BAR to make this document more clear and deployable.
Please see below for the comments.

1. For the following rules 1# and #2, how if there are conflictions of BC(X) and RC(X)?
For example, BC(X) says “prefer RED links and exclude BLUE links”, while RC(X) says “prefer BLUE links and exclude RED links”.
   1.  Apply the BIER constraints, resulting in BC(X).
   2.  Apply the routing constraints, resulting in RC(BC(X)).
   3.  Select the algorithm AG as following:
       A.  If BA is NULL, AG is set to RA.
       B.  If BA is not NULL, AG is set to BA.
   4.  Run AG on RC(BC(X)).

Zzh> An operator would be expected to do the reasonable things and not specify conflicting BC and RC for a sub-domain. Even if he did specify conflicting BC and RC, the rules are clear – apply BC first and then RC. In your example, you end up with no links to use. I think that’s acceptable.

Should the combination of IPA/BAR be specified (following text be changed to new text) ?
[ORIG TEXT]
   When a new BAR value is defined, its corresponding BC/BA semantics MUST be specified.
   For a new IGP Algorithm to be used as a BIER IPA, its RC/RA semantics MUST also be clear.
[NEW TEXT]
   When a new BAR value is defined, its corresponding BC/BA semantics MUST be specified, and the combination of BAR and IPA MUST also be specified.
   For a new IGP Algorithm to be used as a BIER IPA, its RC/RA semantics MUST be specified, and the combination of BAR and IPA MUST also be specified.

Zzh> As long as BC/BA or RC/RA semantics are clear, the combination is clear once you apply the rules, right?

2. For the function of bypassing Non-BIER routers (6.9 of RFC8279), this document is not clear.
Two possible options I can think of:
(a) Run AG on RC(BC(x)) to find the BFR-NBR of a BFER, and then run RA on RC(x) to find the IGP next-hop toward the BFR-NBR if BFR-NBR is not a directly connected NBR.
(b) Run AG on RC(BC(x)) to find the BFR-NBR of a BFER, and then run AG on RC(BC(x)) to find the IGP next-hop toward the BFR-NBR if BFR-NBR is not a directly connected NBR.

Zzh> I don’t follow the above. The spec does say that for a particular subdomain if your own BAR/IPA is different from a BFR’s, then that BFR is considered as not BIER capable and whatever method you use to deal with incapable routers apply. I think that’s straightforward.

(a) looks better to me, since the finding of IGP next-hop toward the BFR-NBR seems to be a pure IGP behavior.
It is also notable that, incorrect combination of IPA and BAR may cause black hole of building a BIFT item to a BFER.
For example, a non-directly-connected BFR-NBR is found but the IGP next-hop toward the BFR-NBR could not be found according to the IPA+BAR.


3. For the above rule #1, the doc is not clear what does the BC(x) mean if BC = NULL. So does the rule #2 when RC = NULL.

Zzh> BC means BIER specific constraints. If BC is NULL it means no constraints.

4. I think one or two examples of IPA/BAR should be given to make it clear as an update to RFC8401/RFC8444.
(1)IPA = 0, and IPA = 1
IPA = 0 means that, RA = SPF based on link metric, RC = permit any node to overwrite the SPF path to the BFR-prefix of a BFR.
IPA = 1 means that, RA = SPF based on link metric, RC = Not permit overwriting the SPF path to the BFR-prefix of a BFR.

Text from draft-ietf-isis-segment-routing-extensions for reference:
      0: Shortest Path First (SPF) algorithm based on link metric.  This
      is the well-known shortest path algorithm as computed by the IS-IS
      Decision process.  Consistent with the deployed practice for link-
      state protocols, algorithm 0 permits any node to overwrite the SPF
      path with a different path based on local policy.

      1: Strict Shortest Path First (SPF) algorithm based on link
      metric.  The algorithm is identical to algorithm 0 but algorithm 1
      requires that all nodes along the path will honor the SPF routing
      decision.  Local policy MUST NOT alter the forwarding decision
      computed by algorithm 1 at the node claiming to support algorithm 1.

Zzh> It seems to me that the general rules are clear enough and adding the above examples only makes things more complicated?

(2)BAR = 0, and BAR = 1
BAR = 0 means that, BA = NULL, BC = NULL
BAR = 1 means that, BA = NULL, BC = exclude non-BIER routers

Zzh>  BAR 0 is already defined in 8401/8444. BAR 1 has not been officially defined (even thought it was used as an example in various discussions) and it’s not good to use it as an example here.

Is the above interpretation of IPA = 0 correct ?

Zzh> Honestly speaking I’m not good at interpreting IPA definitions.

If it is, then maybe the use of IPA/BAR = 1/1 is allowed, but IPA/BAR = 0/1 is not allowed ?

Zzh> I don’t see why 0/1 is not allowed. Using your example, BAR1 simply says excluding non-BIER routers, i.e. as if they don’t exist (or treated as always down). I don’t see why BAR 1 would conflict with ANY IPA.

If IPA/BAR = 0/1 is used, run AG on RC(BC(x)) to get the non-directly-connected BFR-NBR of a BFER seems difficult.


5.  editorial suggestions:
The topology could be a default topology, a multi-topology [RFC5120] topology.
Suggested:
The topology could be a default topology, or a non-default topology as defined in [RFC5120].

For a particular topology X (which could be a default topology or multi-topolgy topology)
Suggested:
For a particular topology X (which could be a default topology or non-default topology)

Zzh> Sure I can change that.
Zzh> Thanks!
Zzh> Jeffrey

Thanks
Jingrong