Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

Aijun Wang <wangaijun@tsinghua.org.cn> Thu, 01 September 2022 13:28 UTC

Return-Path: <wangaijun@tsinghua.org.cn>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7484EC1524A4 for <idr@ietfa.amsl.com>; Thu, 1 Sep 2022 06:28:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.904
X-Spam-Level:
X-Spam-Status: No, score=-1.904 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IcKW-SncxffM for <idr@ietfa.amsl.com>; Thu, 1 Sep 2022 06:28:51 -0700 (PDT)
Received: from mail-m121145.qiye.163.com (mail-m121145.qiye.163.com [115.236.121.145]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 65283C14CE24 for <idr@ietf.org>; Thu, 1 Sep 2022 06:28:50 -0700 (PDT)
Received: from smtpclient.apple (unknown [221.223.103.237]) by mail-m121145.qiye.163.com (Hmail) with ESMTPA id C3CE0800225; Thu, 1 Sep 2022 21:28:48 +0800 (CST)
Content-Type: multipart/alternative; boundary="Apple-Mail-4B69FAE0-F146-4F7D-9153-170FBA4E8460"
Content-Transfer-Encoding: 7bit
From: Aijun Wang <wangaijun@tsinghua.org.cn>
Mime-Version: 1.0 (1.0)
Date: Thu, 01 Sep 2022 21:28:48 +0800
Message-Id: <BD3A75B9-B869-491D-8320-BA97EC702458@tsinghua.org.cn>
References: <CAOj+MMHh51M62Pn+=0Jic_P418rdzGuBBbpQk_CFNo09aHdqmA@mail.gmail.com>
Cc: Jeffrey Haas <jhaas@pfrc.org>, Sue Hares <shares@ndzh.com>, idr <idr@ietf.org>
In-Reply-To: <CAOj+MMHh51M62Pn+=0Jic_P418rdzGuBBbpQk_CFNo09aHdqmA@mail.gmail.com>
To: Robert Raszuk <robert@raszuk.net>
X-Mailer: iPhone Mail (19G82)
X-HM-Spam-Status: e1kfGhgUHx5ZQUpXWQgPGg8OCBgUHx5ZQUlOS1dZFg8aDwILHllBWSg2Ly tZV1koWUFKTEtLSjdXWS1ZQUlXWQ8JGhUIEh9ZQVkZS05CVkodTxgeTkNKSx5DTFUTARMWGhIXJB QOD1lXWRgSC1lBWUlJSlVJSUhVSktIVUlITFlXWRYaDxIVHRRZQVlPS0hVSkpLSE1KVUpLS1kG
X-HM-Sender-Digest: e1kMHhlZQR0aFwgeV1kSHx4VD1lBWUc6PU06Nio5Oj05L0MfKEJCLTYr KkkaChZVSlVKTU1JS0hDQklCSkxJVTMWGhIXVQwaFRwaEhEOFTsPCBIVHBMOGlUUCRxVGBVFWVdZ EgtZQVlJSUpVSUlIVUpLSFVJSExZV1kIAVlBSklPSk83Bg++
X-HM-Tid: 0a82f93d6da6b03akuuuc3ce0800225
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/4HVlMyJ9DFmsp7QmaSrPXpGKEFY>
Subject: Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Sep 2022 13:28:54 -0000

Please see inline.

> On Sep 1, 2022, at 20:50, Robert 
> 
>> Such strategies work great if the network is under single administrative control.  In the absence of such single administrative control, local mitigation becomes something that requires consideration.
> 
> On that one I think if there is a missing feature across all major vendors is per RD prefix limnit on eBGP VPNv4/v6 sessions. 

[WAJ] Current VPN Prefixes VRF is the base to achieve this goal. I think you should remember the initial aims in the earlier version are exactly the inter-AS option B/C scenarios.

> 
> Regards,
> R.
> 
> 
> 
>  
>> 
>> -- Jeff
>> 
>> 
>>> On Sep 1, 2022, at 4:33 AM, Robert Raszuk <robert@raszuk.net> wrote:
>>> 
>>> Dear Sue & Jeff,
>>> 
>>> I completely agree with you on the point below. 
>>> 
>>> Furthermore I would like to suggest the following text to be added to the shepherd's review: 
>>> 
>>> "The proposed functionality creates a set of filters after receiving and parsing BGP UPDATE messages. The document suggests that pushing such list of filters to upstream IBGP peer is a helpful and sound operation. 
>>> 
>>> However in practice BGP UPDATES to construct the filter have already been received, parsed, best path run and even import action (or its simulation) executed. Therefore such excessive routes can be dropped on the impacted PE locally without any need for upstream signalling. BGP does not resend full table periodically so only upon session reset or route refresh triggered dump the same NLRIs (with the same or possibly different paths) may arrive at the affected PEs. If paths are different then it is likely that previously sent filters in the form of <RD, RT list, NH> will not be effective. 
>>> 
>>> The VPN route local drops due to non-intersecting RTs is a very low cost operation and has been an integral part of BGP VPN deployments in all Provider Edge nodes since day one. Orders of magnitude more routes are being dropped on the receiving PEs then those which will be subject to action described as the hypothetical problem.  Such drop does not require running local best path nor import and can be highly optimised by local implementation. 
>>> 
>>> While dropping such excessive routes an alarm MUST be triggered to the operator to take action. 
>>> 
>>> Another advantage for local drops is that such a solution does not impact existing VPN connectivity. While the subject document does. Imagine the situation presented by one of the WG members where an existing VPN with 1000 routes works correctly on the receiving PE. For simplicity assume that those 1000 routes come from single hub src PE's VRF with one RT. 
>>> 
>>> So what the draft proposed when receiving even 10 excessive routes is to construct the filter <RD, RT, NH of src PE> and send it to Route Reflector. The effect of such action would be the withdrawal of all 1010 routes ! That's a harmful and not helpful model. Instead, locally receiving PE can drop those 10 routes and notify NOC."
>>> 
>>> Kind regards,
>>> Robert Raszuk
>>> 
>>> 
>>> 
>>> 
>>> On Thu, Sep 1, 2022 at 2:44 AM Jeffrey Haas <jhaas@pfrc.org> wrote:
>>>> 
>>>> 
>>>>> On Aug 30, 2022, at 10:12 AM, John E Drake <jdrake=40juniper.net@dmarc.ietf.org> wrote:
>>>>> I think Robert’s approach is a much better solution to the problem and it obviates the need for the subject draft.
>>>> 
>>>> The approach of running the procedures on the route reflector are problematic for the original scenario in multiple respects:
>>>> - The point of measurement for the quota is the receiving VRF.
>>>> - The reflector would have to proxy all VRF receive policies to see if the route should be applied vs. the quota.
>>>> 
>>>> Never mind that many providers prefer to avoid any specific provisioning of VPN behaviors on route reflectors.
>>>> 
>>>> -- Jeff
>>>> 
>>>> 
>> 
> _______________________________________________
> Idr mailing list
> Idr@ietf.org
> https://www.ietf.org/mailman/listinfo/idr