[Bier] [draft-ietf-bier-tether] Shepherding AD document review of draft-ietf-bier-tether-05

"Gunter van de Velde (Nokia)" <gunter.van_de_velde@nokia.com> Tue, 09 April 2024 11:32 UTC

Return-Path: <gunter.van_de_velde@nokia.com>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA9B8C14F6BD; Tue, 9 Apr 2024 04:32:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.175
X-Spam-Level:
X-Spam-Status: No, score=-2.175 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.08, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nokia.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ltHjBnJuHrPj; Tue, 9 Apr 2024 04:32:25 -0700 (PDT)
Received: from EUR02-VI1-obe.outbound.protection.outlook.com (mail-vi1eur02on2134.outbound.protection.outlook.com [40.107.241.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3DFBCC14F68D; Tue, 9 Apr 2024 04:32:24 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cn1zNcqLfa/4wC3RazPFEL/mTSdb/kPzesXzFs+aNCDTLnEWQJbUd9MAb/ncTaOXzdKpXIGWJN0x5gLxwdaZyeB3+UtA/yVSAfEiu6OAYQhJnNuGB+OuH68dhyY47h5VcUilkSxWshWhQ9+Q5ysrWU831x478NzaWj4ZVRRWaHe8rkFyWaCiV97HIQrd4gFEu89024BOUDDlVCcBZNkiumG2dmcQnFfTCWpvFfBkliePtEnbGj7EtVuHQYlUHssmc2Hu/y5Cet6ZEqUe5FmWFkdKjfET1TnrTcQ0iS3EDWHEVetP3++DDxLLzNNQR6t0UzqBadA+BWwAay3HafaFnA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ZAOqqy5ojcyiOYH+pqwB5l4SqJ/9jTH/zrYELs3OF2s=; b=Dy5dlHpucBUfAGRgsKkiJ3Wsa7/7V3/WEK1mqtBxF3fTOSrHqcLgfO83aSe4fKPjdSZTbftpToyNVUuZx1+1BR1luINxz6tONw6Uo/DSEuWm2yyrcM5xvRIizhnmljSggUV6Z1LmLDiRi/KCckb6KG+6AU/9oF+JPFa/MTPpnvrua/LSlNgUgy4S+syXjezA8KTOOt7hYXRIh5OSMti8roeTJSK9QTDffgN3JmXYKShXUhDTnp5nAmtWRghrTxf8NMKkzN7X1ZIUDXQqAQ00JaNfc9k482qX8uRjca0/vtZBJprNq9x/a3J+dQL5ck1jmqtP7Kb/Y+B27UFuFK7RJQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZAOqqy5ojcyiOYH+pqwB5l4SqJ/9jTH/zrYELs3OF2s=; b=g4cxq1UjcDiJJXJ93H2h1unm5uP8d/fLTeiQhE5wtTSBV/c5vKqNUSfmhKZLNLRHEG0RkNYa9AucDIOApCDvL/mR0WQ1ptu6LwiP5TRAxOcO7ibzW58MBca0OyT0DDqUcYPQohEiITsEf97TFM1no/O+dpLJQZw58cypSiovtiK+gwclGz808Zj3yz7NecFj0Hr0V1sBBVjxaS+9JMqWWsAfwNT0Nx6YDJBSRTkX5/3QH3avvEMogP3vv34y5+PF57s8G1XyPMZVYoW4VHN8AGoEGYs9kOrbiz7TNmY7YcFawLSXljE/gBCZhdL9GGPPOVikp6bYRilO4mPw4DAPWQ==
Received: from AS1PR07MB8589.eurprd07.prod.outlook.com (2603:10a6:20b:470::16) by AS8PR07MB8297.eurprd07.prod.outlook.com (2603:10a6:20b:37c::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7409.55; Tue, 9 Apr 2024 11:32:20 +0000
Received: from AS1PR07MB8589.eurprd07.prod.outlook.com ([fe80::c316:8cd6:216e:d7a8]) by AS1PR07MB8589.eurprd07.prod.outlook.com ([fe80::c316:8cd6:216e:d7a8%6]) with mapi id 15.20.7409.042; Tue, 9 Apr 2024 11:32:19 +0000
From: "Gunter van de Velde (Nokia)" <gunter.van_de_velde@nokia.com>
To: "draft-ietf-bier-tether@ietf.org" <draft-ietf-bier-tether@ietf.org>
CC: BIER WG <bier@ietf.org>
Thread-Topic: [draft-ietf-bier-tether] Shepherding AD document review of draft-ietf-bier-tether-05
Thread-Index: AdqKcZP33ZkxqkMKTF28yyE8RAQqqA==
Date: Tue, 09 Apr 2024 11:32:19 +0000
Message-ID: <AS1PR07MB8589A23805E5B18D7560762DE0072@AS1PR07MB8589.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: AS1PR07MB8589:EE_|AS8PR07MB8297:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS1PR07MB8589.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(1800799015)(376005)(366007); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_AS1PR07MB8589A23805E5B18D7560762DE0072AS1PR07MB8589eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AS1PR07MB8589.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3f7a7c80-35f9-463c-083b-08dc5888b74c
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Apr 2024 11:32:19.3544 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: zYnsa7MTrDcSmEt81QHAzMllxJFX9c2a/q5jpGlXJHALmcNYvamfhCocHXhlULS2m6/w1Z4uL5SguYqEVWlQQ7dc8dgApf8hZ9BfwH6pU3o=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR07MB8297
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/tv4_Yz4-2MKpOyd3MvBe1_caG_E>
Subject: [Bier] [draft-ietf-bier-tether] Shepherding AD document review of draft-ietf-bier-tether-05
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Apr 2024 11:32:29 -0000

# Gunter Van de Velde, RTG AD, comments for draft-ietf-bier-tether-05

In the absence of an earlier shepherding AD review pertaining to the
draft-ietf-bier-tether document, please find my review comments for
discussion. These comments are shared prior to the document being
considered for IESG Telechat.

In reviewing this document, I start with a broad overview of its
current status, followed by a detailed discussion of critical technical
points. I conclude with an analysis performed by idnits, which
includes annotations for both [minor] and [major] comments. This
structured approach helps to ensure that all aspects of the document
are thoroughly examined and addressed.

Summary:
========
The abstract of this document reads:
   This document specifies optional procedures to optimize the handling
   of Bit Index Explicit Replication (BIER) incapable routers, by
   attaching (tethering) a BIER router to a BIER incapable router.

The document is not overly long and appears not
overly complex. However the document reads relative light on formal
specification. Additional strict formal usage using BCP14 language
to prescribing operations, the code points and the spf modification
will provide better specification.

The shepherd writeup (4 July 2022) suggest document shepherd
reviewed draft-ietf-bier-tether-01.

Implementations: no existing and known future Implementations.
idnits: no substantial issues shown

Looking at the email archive, only very few discussions about this
document happened on the list

Many thanks to Dan Romascanu (OPSDIR), Wes Hardaker (SECDIR) and Joel
Halpern (GENART) reviews. I encourage the document authors to
consider the feedbacks and observations provided.

Key Technical Issues:
=====================

Due to no existing or known future implementations would
experimental not be more appropriate IETF track then "proposed standard"?

The comments on the email list from Les about encodings has significant impact:
https://mailarchive.ietf.org/arch/msg/last-call/tUy5jdA2z62BmvpP-TC-_k-rIws/
In general there is ongoing effort to be conservative about any IGP
encoding, however especially with ISIS are TLV resources often constrained.

IANA code points: why are early code points not considered? It would help to grow experience
with the solution before requesting final code point allocations. It seems especially when
encoding descriptions seem not fully firm at the moment.

Operational guidelines: light specification details about troubleshooting and
network behaviour due to diverged paths between multicast and unicast.
For example, what is the impact on ping/traceroute and other multicast
operational tools, convergence impact expectations? What addresses should
be used as the helped address? is it possible that unicast SPF has race
condition with the BIER topology SPF? etc. if BGP is used, any risks for the
recursive lookups to go wrong?

Security implications: As indicated in the security directorate review
it would help the document to add proof points why there are no
additional security concerns compared to BIER architecture and OSPF/ISIS/BGP
extensions for BIER signaling. (it is for example possible to insert the TLV on
a rogue node and add all loopback addresses of the router in the area)

What is the impact of technologies as LFA/BFD/ECMP impact BIER Tether topology?

Please find in next section a set of review comments [minor] and [major]

Detailed review using the idnits rendering of the draft:
========================================================

17             This document specifies optional procedures to optimize the handling
18             of Bit Index Explicit Replication (BIER) incapable routers, by
19             attaching (tethering) a BIER router to a BIER incapable router.

[major] this is incorrect. The draft specifies in addition to operational
procedures a few IGP TLVs (code points and IGP encodings).

76             Consider the scenario in Figure 1 where router X does not support
77             BIER.

[minor] It will be more clear if it is more explicit that this paragraph is
the explanation of the observed problem space. A few paragraphs later the
term solution is used. For readability it woul de nice to first get
description of the problem space, followed by the naturally by the solutin discussion.

94             A solution to the inefficient tunneling from BFRs is to attach
95             (tether) a BFRx to X as depicted in Figure 2:

[major] The wording "A solution" implies that there are other solutions to
the problem possible. However, these are not discussed in the document.
In the email archives there have been comments questioning why
draft-ietf-bier-tether solution is better as placing for example
a BIER router in the forwarding path close to the helped BFR?
The 'why' is tethering better as the other solutions is unclear
and undocumented.

111           For BFR1 to tunnel BIER packets to BFRx, the BFR1-BFRx tunnel need to
112           be announced in Interior Gateway Protocol (IGP) as a forwarding
113           adjacency so that BFRx will appear on the Shortest Path First (SPF)
114           tree.  This needs to happen in a BIER specific topology so that
115           unicast traffic would not be tunneled to BFRx.  Obviously this is
116           operationally cumbersome.

[minor] an alternative is to place the BFRx into the IGP forwarding path?
Is the multicast traffoc expected of lesser valume as the unicast traffic?
Maybe the unicast traffic volume can be neglected compared to the multicast traffic?

118           Section 6.9 of BIER architecture specification [RFC8279] describes a
119           method that tunnels BIER packets through incapable routers without
120           the need to announce tunnels.  However that does not work here,
121           because BFRx will not appear on the SPF tree of BFR1.

[minor] style rewrite:
"Section 6.9 of the BIER architecture specification [RFC8279] delineates a
methodology for tunneling BIER packets through incapable routers without
the need to explicitely announce tunnels. Nonetheless, this method is
inapplicable in the current context, as BFRx is not a node in the SPF
tree rooted at BFR1.

123           There is a simple solution to the problem though.  BFRx could
124           advertise that it is X's helper and other BFRs will use BFRx (instead
125           of X's children on the SPF tree) to replace X during its post-SPF
126           processing as described in section 6.9 of BIER architecture
127           specification [RFC8279].

[major] simple is subjective language. The need for code points,
IGP signalling, usage of multicast only router (=unicast stealth router)
and topological BIFT abstraction is not that simple. This section is an
opportunity to present and defend that the tether solution is the most
optimal solution for the presented use-case.

131           While the example shows a local connection between BFRx and X, it
132           does not have to be like that.  As long as packets can arrive at BFRx
133           without requiring X to do BIER forwarding, it should work.

[minor] what example is being referenced. From a style perspective it
is unclear what 'should work' means in a proposed standard document.
Maybe more formal writing is appropriate? Does "should work" mean it behaves
as architected or does not behave as architected. What are the conditions
it would not work as intended?

129        2.  Additional Considerations

[minor] this is odd titled section. The section title is "Additional
Considerations", but there is no section about "Considerations"?

135           Additionally, the helper BRFx can be a transit helper, i.e., it has

[minor] s/BRFx/BFRx/

137           connected to X), as long as BFRx won't send BIER packets tunneled to
138           it back towards the tunnel ingress.  Figure 3 below is a simple case:

[minor] a use-case or a network topology? a little more context helps
readability on how expected multicast flows wil be steered through
the topology. How would this impact security and operational implications?

151           In the example of Figure 4, there is a connection between BFR1 and
152           BFRx.  If the link metrics are all 1 on the three sides of
153           BFR1-X-BFRx triangle, loop won't happen but if the BFRx-X metric is 3
154           while other two sides of the triangle has metric 1 then BFRx will
155           send BIER packets tunneled to it from BFR1 back to BFR1, causing a
156           loop.

[major] This description truely provides an indication that when tether is
used, that there is divergence between unicast and multicast topologies. How would
LFA and other fast convergence race conditions impact during instabity?

174           Notice that this SPF calculation on BFR1 with BFRx as the root is not

[minor] unsure what "this spf" referes towards. more formal language will
help to understand the example better

174           Notice that this SPF calculation on BFR1 with BFRx as the root is not
175           different from the SPF done for a neighbor as part of Loop-Free
176           Alternate (LFA) calculation.  In fact, BFR1 tunneling packets to X's
177           helper is not different from sending packets to a LFA backup.

[minor] What is the point that is being proved with the comparison to LFA style SPF calculation?

179           Also notice that, instead of a dedicated helper BFRx, any one or
180           multiple ones of BFR2..N can also be the helper (as long as the

[minor] upper or lower case n vs N? seems that there is disreptency between
diagram and text

185           highest priority among those satisfying the loop-free condition
186           described above.  When there are multiple helpers advertising the
187           same priority and satisfying the loop-free condition, any one or
188           multiple ones could be used solely at the discretion of BFR1.

[major] The node BFR1 silently implies that it is the upstream node of the BIER uncapable router (the helped node).
This is nowhere defined or specified.

192           The situation in Figure 5 where a helper BFRxy helps two different
193           non-BFRs X and Y also works.  It's just a special situation of a
194           transit helper.

[minor] what does "also works" exactly mean? formal description of the outcome will helps

192           The situation in Figure 5 where a helper BFRxy helps two different
193           non-BFRs X and Y also works.  It's just a special situation of a
194           transit helper.

[minor] THis is becoming very complex and no longer simple. What are the operational
implications and how to troubleshoot this now that unicast and multicast
topology are looking vastly different.

214           The procedures in this document apply when a BFRx is tethered to a
215           BIER incapable router X as X's helper for BIER forwarding.

[minor] It would help to formally give the BIER incapable router a name to refer to from documentation perspective.

219           Suppose that the BIER domain uses BIER signaling extensions to ISIS
220           [RFC8401] or OSPF [RFC8444].  The helper node (BFRx) MUST advertise
221           one or more BIER Helped Node sub-sub-TLVs in the BIER Info sub-TLV in
222           the case of ISIS or BIER Helped Node sub-TLVs in the BIER sub-TLV in
223           the case of OSPF, one for each helped node:

[minor] s/suppose/when/

[major] referencing to the comments from Les.
In addition, having explicit sections for ISIS and OSPF and OSPFv3 will be beter to formalize and document the code-points and associated TLV descriptions.

[minor] no figure number is provided?

225                0                   1                   2                   3
226                0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
227               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
228               |    Type       |   Length      |    Priority   |   Reserved    |
229               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
230               |              Address of the Helped Node                       |
231               +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

[major] WHat is this address of the helped node? is that a interface address? is
that a loopback? is it a router id? does it have to be a stable address? does
the address have to exists on the router? must the address be UP and ENABLED
and PINGABLE on the router? What if multiple helped node addresses are added all over the network (for an attach for example)?

243           At step 2, the removed node is added to an ordered list maintained
244           with each child that replaces the node.  If the removed node already
245           has a non-empty list maintained with itself, add the removed node to
246           the tail of the list and copy the list to each child.

[major] The text at section 6.9 is written formally. if the intent is to
change the step 2 with alternate logic prescribing when and how to insert the BIER helper
node. Most correct would be to rewrite using formal BCP14 language the complete 'step 2'
for the tether use case.

    (RFC8279 section6.9)
   2.  If one of the child nodes does not support BIER, BFR-B removes
       that node from the tree.  The child nodes of the node that has
       just been removed are then re-parented on the tree, so that BFR-B
       now becomes their parent.

268           If the above procedure finishes without finding any helper, then the
269           original BFR next hop via a tunnel is used to reach the BFER.

[minor] Is this statement also not part of the process that tether modifies the BIER-SPF?

273           Suppose that the BIER domain uses BGP signaling
274           [I-D.ietf-bier-idr-extensions] instead of IGP.  BFR1..N advertises

[minor] s/suppose/when/

271        3.2.  BGP Signaling

[major] Can BGP signaling not be seen as another ecoding in addition to the IGP encodings?

273           Suppose that the BIER domain uses BGP signaling
274           [I-D.ietf-bier-idr-extensions] instead of IGP.  BFR1..N advertises
275           BIER prefixes that are reachable through them, with BIER Path
276           Attributes (BPA) attached.  There are three situations regarding X's
277           involvement:

[minor] what does "them" reference?
[minor] not sure what the BIER prefix is. Is that a special NLRI used for signalling BIER BitString?
[minor] three situations are mentioned, but only 2 follow?

286           To make tethering work well with BGP signalling, the following can be
287           done:

[major] what does "work well" mean? please explain using BCP14 langue how the technology and encodings will work.
[minor] is there any impact upon how the BIER-SPF is modified using the received BGP derived BIER information.
[major] are there no BGP code points or encodings specified?