[Bier] Comments on draft-hfa-bier-pim-tunneling

Antoni Przygienda <prz@juniper.net> Tue, 18 July 2017 08:56 UTC

Return-Path: <prz@juniper.net>
X-Original-To: bier@ietfa.amsl.com
Delivered-To: bier@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E69A6131A78 for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 01:56:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.801
X-Spam-Level:
X-Spam-Status: No, score=-4.801 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.8, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wEjAREhMVTwT for <bier@ietfa.amsl.com>; Tue, 18 Jul 2017 01:56:51 -0700 (PDT)
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-bl2nam02on0106.outbound.protection.outlook.com [104.47.38.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA61A131DC5 for <bier@ietf.org>; Tue, 18 Jul 2017 01:56:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=WFNFTqKfeR7NIseGUYzqwdT+K/N/KQ/RcxKqoR2oO34=; b=dzQ4oPoMydh4Vd7N3puCa0WfT4uNStbxd6rZ1iWegsyycHpBKGZ4n7qctIvOfbOFNDJHI1WuIxn9lZ0k7GPPnYGBYotZSTxZn4QcbymEZsomzzezpwcbWeMLGSiHxbjZJDSmff0E0ib+lTAzapwdrkftgZrVsQYbniyIg3/iIrc=
Received: from DM2PR0501MB1438.namprd05.prod.outlook.com (10.161.224.148) by DM2PR0501MB1472.namprd05.prod.outlook.com (10.161.224.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.4; Tue, 18 Jul 2017 08:56:49 +0000
Received: from DM2PR0501MB1438.namprd05.prod.outlook.com ([fe80::5176:9694:c647:6444]) by DM2PR0501MB1438.namprd05.prod.outlook.com ([fe80::5176:9694:c647:6444%14]) with mapi id 15.01.1282.008; Tue, 18 Jul 2017 08:56:49 +0000
From: Antoni Przygienda <prz@juniper.net>
To: "bier@ietf.org" <bier@ietf.org>
Thread-Topic: Comments on draft-hfa-bier-pim-tunneling
Thread-Index: AQHS/XAwmu5yjNkcLUehC6Fnhg/YZA==
Date: Tue, 18 Jul 2017 08:56:49 +0000
Message-ID: <2F5AA4AB-E5E7-453E-963C-DF9679DDE2D8@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.20.0.170309
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=juniper.net;
x-originating-ip: [193.110.55.12]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM2PR0501MB1472; 7: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
x-ms-office365-filtering-correlation-id: 27f08ca0-16da-4f3f-41c7-08d4cdbaed17
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(48565401081)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:DM2PR0501MB1472;
x-ms-traffictypediagnostic: DM2PR0501MB1472:
x-exchange-antispam-report-test: UriScan:(151999592597050)(190756311086443)(26388249023172)(236129657087228)(148574349560750)(21748063052155)(247924648384137);
x-microsoft-antispam-prvs: <DM2PR0501MB1472F69460E077ED69B03A30ACA10@DM2PR0501MB1472.namprd05.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(2017060910075)(5005006)(10201501046)(100000703101)(100105400095)(3002001)(93006095)(93001095)(6055026)(6041248)(20161123562025)(20161123564025)(20161123560025)(20161123555025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DM2PR0501MB1472; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DM2PR0501MB1472;
x-forefront-prvs: 037291602B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(39840400002)(39400400002)(39860400002)(39450400003)(39410400002)(39850400002)(5660300001)(2351001)(2906002)(36756003)(2900100001)(4001350100001)(3660700001)(6916009)(83506001)(3280700002)(3846002)(7736002)(478600001)(6116002)(102836003)(53936002)(5250100002)(6306002)(2501003)(189998001)(5640700003)(83716003)(6512007)(99286003)(86362001)(6436002)(54896002)(230783001)(25786009)(14454004)(82746002)(110136004)(38730400002)(66066001)(8936002)(33656002)(6506006)(6486002)(54356999)(50986999)(81166006)(1730700003)(8676002)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR0501MB1472; H:DM2PR0501MB1438.namprd05.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_2F5AA4ABE5E7453E963CDF9679DDE2D8junipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2017 08:56:49.0480 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR0501MB1472
Archived-At: <https://mailarchive.ietf.org/arch/msg/bier/unFeHxYj6-HySByb-eHezgKa4o8>
Subject: [Bier] Comments on draft-hfa-bier-pim-tunneling
X-BeenThere: bier@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"Bit Indexed Explicit Replication discussion list\"" <bier.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bier>, <mailto:bier-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bier/>
List-Post: <mailto:bier@ietf.org>
List-Help: <mailto:bier-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bier>, <mailto:bier-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 08:56:54 -0000

Read the draft on the plane trying to figure out what’s that about. Observations


a)       First, the draft seems to indicate that it’s draft-rosen (6037) and I assume it’s talking about the P-G PIM which is generated by the PE and then first P is acting as BER. And it seems to concern mostly SSM. Just verifying …

b)       I’m suspicious of the 256bits argument somehow. Is the idea that running a single-SI BIER is somehow massively simpler than multiple-SI-s? The packet WILL split @ replication points & replication is necessary in any case (unless we have ingress rep for which BIER is not needed) so I don’t see how single-SI makes much of a difference.

c)       We do not need to burn a protocol bit for PIM albeit yes, it would be tad more efficient. PIM must be carried in either v4 or v6 frame which is its normal encoding and already fully supported by BIER encaps. Additionally, if PIM is stripped of v4/v6 encaps considerations would have to be made to all the PIM RPF & correct source/destination addresses checks in the spec AFAIR. Yes, the BER needs to look into v4/v6 packets to  see PIM being tunneled but if we try to accommodate every IP protocol with a bit, we’ll run out fast. Accomodating a protocol makes most sense when we talk heavy-volume dataplane such as maybe VxLAN if we can save headers for processing speed but PIM is a low volume control protocol and the check is trivial since it’s a well known next-protocol offset position.

d)       I think the moniker BRT is ill chosen. BIER does not do RPF and using “RPF” here to describe tracking of G-membership of P-BFRs is overloading the term in a confusing way IMO. Basically in overlay we should have a G to BFM mapping (and if necessary S to BFR-id derived from BIER packets) and nothing else. There is no “RPF” lookup per packet or anything like this which the moniker suggests (yes, one would say we do a “RPF” per “PIM join” but that somehow implies that such “RPF” can “fail and drop” which it cannot).

e)       The whole “RPF SPF lookup” in 3.1 for (S,G) joins will not work in general case AFAIS. Observe that BIER may NOT be IGP signaled (but e.g. controller based) or run subdomain over a MT sub-setting links or construct a different tree than SPF so this “PIM tunneled (S,G) overlay” seems to violate the separation of layers completely as proposed assuming that it can draw conclusions from IGP state (i.e. it considers the tunnel path somehow “backwards-computable” by the overlay making it not a tunnel but an encapsulation only).

If the whole (S,G) join architecture hinges on assumption that a “future” BIER packet’s source can be “figured out by computing SPF” then it is very restricted and those assumptions have to be spelled out very clearly. In general case an (S,G) join would have to be sent to all BERs that participate in the P-G IMO make is de-facto ASM is my impression.


Maybe I somehow miss the whole point completely given that the text is jumping between tons of technologies and seems to not state assumptions taken every time clearly …

--- tony