Re: [Idr] WG adoption call for draft-xu-idr-neighbor-autodiscovery

Robert Raszuk <robert@raszuk.net> Tue, 17 July 2018 15:30 UTC

Return-Path: <rraszuk@gmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A2F8130FAE; Tue, 17 Jul 2018 08:30:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.599
X-Spam-Level:
X-Spam-Status: No, score=0.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.249, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BEyYskTA9AHq; Tue, 17 Jul 2018 08:30:51 -0700 (PDT)
Received: from mail-pl0-x243.google.com (mail-pl0-x243.google.com [IPv6:2607:f8b0:400e:c01::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 621B4130FB7; Tue, 17 Jul 2018 08:30:45 -0700 (PDT)
Received: by mail-pl0-x243.google.com with SMTP id b1-v6so619820pls.5; Tue, 17 Jul 2018 08:30:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=da5lwrcJvCfi//dn9g0G2rZpna/By+hI9AS1AA1hXGg=; b=lenPWPmsD7btsqzIwkfSbKzXv9gy6eBEm+4s8HL36Zymzi0G3WAJlVssTsmCwwMpvK TxCDWRQiB7I9GQfH87FvG0wwTOxjIXsmVwyR1A1NVAGlMcvP85fkirAXvOvPo9Uih8JO o3LAa6okwprHAUBASKytcuuDnEYDZpyJNINWBRp3wcN+fVOyQx0lSQLhULc8+6M7pn54 ju6gF8/HgGhRFK4N8bhfuZh7qdVYRMlmSRXD3DBbuPT+xjNsiuiBeCxuAF8nZtGcYUZD SNDUL4UlPUWdEYSmFIb13QUcR7YAjWBsaLNJ6iR4l3y/TvGidwur//i6j89GLw4GcATX Mahw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=da5lwrcJvCfi//dn9g0G2rZpna/By+hI9AS1AA1hXGg=; b=GYnGeUhqN4D+QPX9kPAOPZD2ifRnv5bVWzT+C10zA1J9IpfzF7arTUGeBFWY2yhLmU maUqgo7QTJPGRff5w0DU1GCtM05Awc68N7XPbxMcfyc7MKWMJou1ao3knmVhlNVpC5gT ZjlNKCeiBq489lp60aQsTlJNTPXVbFLfcDM3gD/Wt1mpjZ8YoPsScwqCFkJpgYbOShCB asTYx/yohmQWpzk3Crau5PM5CE5zjr1RSuk1V2PFpZ4ar7Q9NFUS+byCHNnk2NyFqGrB VOE6mplmakMmrRGhM1f+DAOAfxCUXvbyW8cGoYbfno6eWnr+8VGbg0Q3T6XIGVd50zbx bwKw==
X-Gm-Message-State: AOUpUlFPGgeJ6+jS7Sdqr5eWHNe8rkbUlL2L5ysLNvRQpLmUvJ1iWkWD GxBnMUfq4D4MBnRgEWtVvi0BPUqV9o3W3S1Ageo=
X-Google-Smtp-Source: AAOMgpdiBewqtfP+cbJZu8kPzbpM2sGY6CXfTeCBm3vbtUb1ajF0Jt6QF0CSGmC4rBQazACLxSTpbJb89MfHZomsqA8=
X-Received: by 2002:a17:902:1007:: with SMTP id b7-v6mr2043136pla.277.1531841444805; Tue, 17 Jul 2018 08:30:44 -0700 (PDT)
MIME-Version: 1.0
Sender: rraszuk@gmail.com
Received: by 2002:a17:90a:d396:0:0:0:0 with HTTP; Tue, 17 Jul 2018 08:30:43 -0700 (PDT)
In-Reply-To: <66faeea6-b4c4-4ef6-84a7-3bdc4737a6eb.xiaohu.xxh@alibaba-inc.com>
References: <013701d41227$579d2d10$06d78730$@ndzh.com> <6ACB426F-D10D-43E2-BC12-2D41D0CCE88A@arrcus.com> <CA+R4MGeh=+e4FvPfeGzd-4UnxuPiwHHEMEKuieXZOTitVYHm2A@mail.gmail.com> <CA+b+ERmAHwKY8x0jH6Pk9Svu1BQFDxrG2ozQO97VHWV=jXtHqA@mail.gmail.com> <CA+R4MGcoer=tAVCPPYTsXp-DtiO1cxArxJA=iAMsJ_A_LmzrhA@mail.gmail.com> <20401d8c-4591-0507-776f-a154bc968245@juniper.net> <006401d41d30$b3e0b1f0$1ba215d0$@ndzh.com> <009a01d41d31$d4c96b40$7e5c41c0$@ndzh.com> <b6d6905f2b904a21bfb8e59d8e760199@XCH-ALN-008.cisco.com> <B17A6910EEDD1F45980687268941550F36779D63@MISOUT7MSGUSRCD.ITServices.sbc.com> <66faeea6-b4c4-4ef6-84a7-3bdc4737a6eb.xiaohu.xxh@alibaba-inc.com>
From: Robert Raszuk <robert@raszuk.net>
Date: Tue, 17 Jul 2018 17:30:43 +0200
X-Google-Sender-Auth: D4ooYkulC7xKDmG-8VCnpCV62w8
Message-ID: <CA+b+ERm7v4Sp7a-_r=s9SOBo+x0bcS67FgPGoPjoUEUqznYbUQ@mail.gmail.com>
To: "徐小虎(义先)" <xiaohu.xxh@alibaba-inc.com>
Cc: Idr <idr-bounces@ietf.org>, "Ketan Talaulikar (ketant)" <ketant=40cisco.com@dmarc.ietf.org>, Susan Hares <shares@ndzh.com>, Eric C Rosen <erosen@juniper.net>, Nikos Triantafillis <ntriantafillis@gmail.com>, Keyur Patel <keyur@arrcus.com>, "draft-xu-idr-neighbor-autodiscovery@ietf.org" <draft-xu-idr-neighbor-autodiscovery@ietf.org>, "idr@ietf.org" <idr@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000002b8128057133a1ee"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/93KmffAQBVu_1unVjLH1GsmvlVk>
Subject: Re: [Idr] WG adoption call for draft-xu-idr-neighbor-autodiscovery
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Jul 2018 15:31:03 -0000

>  However, it's not good to introduce static routes to remote loopback
addresses from the automation perspective

It is actually very good if you know how to do it correctly. I think Dino
was asking this question at the LSR WG mic yesterday. And someone
responded: "But the links break" oh .... hint: BFD works fine with static
routes for a long time !

Cheers,
R.


On Tue, Jul 17, 2018 at 4:56 PM, 徐小虎(义先) <xiaohu.xxh@alibaba-inc.com> wrote:

> Hi Jim,
>
> For small or even medium-sized DC fabrics, script and even CLI is
> sufficient. For large-scale DC fabric, automation and simplicity is always
> needed. For the use of BGP as IGP in MSDC, it's better to borrow the
> automation of IGP into IGP so as to simplify the configuration.
> Furthermore, it's desirable to establish BGP sessions over loopback
> addresses when there are multiple links among a give peer of switches.
> However, it's not good to introduce static routes to remote loopback
> addresses from the automation perspective, also not good to introduce
> another complex routing protocol such as ISIS or OSPF just for advertising
> the loopback addresses.
>
> Best regards,
> Xiaohu
>
>
>
>
>
> 来自钉钉专属商务邮箱 <http://(null)>
>
> ------------------------------------------------------------------
> 发件人:UTTARO, JAMES<ju1738@att.com>
> 日 期:2018年07月17日 21:39:47
> 收件人:Ketan Talaulikar (ketant)<ketant=40cisco.com@dmarc.ietf.org>; Susan
> Hares<shares@ndzh.com>; 'Eric C Rosen'<erosen@juniper.net>; 'Nikos
> Triantafillis'<ntriantafillis@gmail.com>; 'Robert Raszuk'<
> robert@raszuk.net>
> 抄 送:'Keyur Patel'<keyur@arrcus.com>; draft-xu-idr-neighbor-
> autodiscovery@ietf.org<draft-xu-idr-neighbor-autodiscovery@ietf.org>;
> idr@ietf.org<idr@ietf.org>
> 主 题:Re: [Idr] WG adoption call for draft-xu-idr-neighbor-autodiscovery
>
>
> *The main purpose of this draft is to:*
>
>
>
> *a)      **Simplify the MACD in terms of adding Leafs/Spines into a DC
> fabric*
>
> *b)      **Reduce the amount of “human touch” needed for the care and
> feeding of the above?*
>
>
>
> *Is there more to the ask here? *
>
>
>
> *Why is scripting not sufficient to meet this ask? IOW what is unique here
> the IP Addresses, number of interface, ASN List etc…*
>
>
>
> *I would like to better understand the trade-off between the added
> complexity of modifying BGP in the manner proposed and the simplification..*
>
>
>
> *It would be useful to provide more information as to the driver(s) for
> this draft…*
>
>
>
> *Thanks,*
>
> *                Jim Uttaro*
>
>
>
> *From:* Idr [mailto:idr-bounces@ietf.org] *On Behalf Of *Ketan Talaulikar
> (ketant)
> *Sent:* Monday, July 16, 2018 3:28 PM
> *To:* Susan Hares <shares@ndzh.com>; 'Eric C Rosen' <erosen@juniper.net>;
> 'Nikos Triantafillis' <ntriantafillis@gmail.com>; 'Robert Raszuk' <
> robert@raszuk.net>
> *Cc:* 'Keyur Patel' <keyur@arrcus.com>; draft-xu-idr-neighbor-
> autodiscovery@ietf.org; idr@ietf.org
> *Subject:* Re: [Idr] WG adoption call for draft-xu-idr-neighbor-
> autodiscovery
>
>
>
> Hello Eric/All,
>
>
>
> We have updated the document with more details based on the feedback and
> comments received from the WG. I hope this better describes the proposal
> and provides clarity on its interactions with the BGP protocol operations.
>
>
>
> https://tools.ietf.org/html/draft-xu-idr-neighbor-autodiscovery-09
> <https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dxu-2Didr-2Dneighbor-2Dautodiscovery-2D09&d=DwMGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=s7ZzB4JbPv3nYuoSx5Gy8Q&m=FT-lCfjgXir4WhnyJwGTkogTDuXBvH0HydO7P6BNBHo&s=8EG10mMq-fhv5rqYctp5jTkVoGvvKq3joBMF4otSw9k&e=>
>
>
>
> Would request to please review this version and share your inputs/comments.
>
>
>
> Thanks,
>
> Ketan
>
>
>
> *From:* Idr <idr-bounces@ietf.org> *On Behalf Of *Susan Hares
> *Sent:* 16 July 2018 14:22
> *To:* 'Eric C Rosen' <erosen@juniper.net>; 'Nikos Triantafillis' <
> ntriantafillis@gmail.com>; 'Robert Raszuk' <robert@raszuk.net>
> *Cc:* 'Keyur Patel' <keyur@arrcus.com>; draft-xu-idr-neighbor-
> autodiscovery@ietf.org; idr@ietf.org
> *Subject:* Re: [Idr] WG adoption call for draft-xu-idr-neighbor-
> autodiscovery
>
>
>
> Eric:
>
>
>
> If you get time to send details on this analysis, will you include:
>
> ·         draft-raszuk-idr-bgp-auto-session-setup-00
>
>
>
> Robert would appreciate the feedback (and so would I).
>
>
>
> Thank you, Sue
>
>
>
> *From:* Idr [mailto:idr-bounces@ietf.org <idr-bounces@ietf.org>] *On
> Behalf Of *Susan Hares
> *Sent:* Monday, July 16, 2018 2:14 PM
> *To:* 'Eric C Rosen'; 'Nikos Triantafillis'; 'Robert Raszuk'
> *Cc:* 'Keyur Patel'; draft-xu-idr-neighbor-autodiscovery@ietf.org;
> idr@ietf.org
> *Subject:* Re: [Idr] WG adoption call for draft-xu-idr-neighbor-
> autodiscovery
>
>
>
> Eric :
>
>
>
> Could you provide a short summary on your opinion on potential
> auto-discovery protocols based on functionality, cost security, unintended
> side
>
> a)      Draft-xu-idr-neighbor-autodiscovery
>
> b)      Use of LLDP (draft-acee-idr-lldp-peer-discovery)
>
> c)       A multicast of neighbor information
>
>
>
> I know you’ve mentioned part of this information in other messages --- but
> I think it would be very useful to advance the discussion on this draft.
>
>
>
> Thank you,
>
>
>
> Sue Hares
>
>
>
> *From:* Idr [mailto:idr-bounces@ietf.org <idr-bounces@ietf.org>] *On
> Behalf Of *Eric C Rosen
> *Sent:* Monday, July 16, 2018 11:51 AM
> *To:* Nikos Triantafillis; Robert Raszuk
> *Cc:* Keyur Patel; draft-xu-idr-neighbor-autodiscovery@ietf.org; Susan
> Hares; idr@ietf.org
> *Subject:* Re: [Idr] WG adoption call for draft-xu-idr-neighbor-
> autodiscovery
>
>
>
> Nikos> a much simpler one to address than asking someone to run yet
> another protocol if the functionality could be provided by enhancing the
> existing one they run.
>
> The proposal is to define a brand new message type that is carried in UDP
> (as a multicast datagram!), rather than being carried on a BGP session.
> It's hard to see why that is considered to be "enhancing BGP" rather than
> being "yet another protocol".   Taking a new protocol and calling it"BGP"
> does not necessarily result in an opex savings.  Auto-discovery protocols
> need to be evaluated on the basis of functionality, cost, security,
> unintended side-effects, etc., not on the basis of what name they are given.
>
> Robert> Last it is often the case today - when running no overlay - to
> advertise dynamically VMs or LXCs addresses to TORs via routing protocol -
> say BGP. What happens when now the LXCs or VMs will start sending such BGP
> Hellos directly to TORs ? Do you envision that this proposal will
> automatically establish BGP sessions with those tenant entities if they
> happen to be on the same subnet then compute node itself ?
>
>
>
> Nikos> Do you need to enable such functionality on the VMs or LXCs?
>
> One certainly has to deal with the possibility that a Hello will come in
> on an interface that is "DC-facing" rather than "network-facing".
>
> Presumably one wouldn't intentionally enable such functionality on an
> arbitrary tenant VM.  Not intentionally.  Also, is it really inconceivable
> that a malicious tenant may find a way to cause the Hellos to be generated
> even if the functionality has not been enabled?
>
> Something that all the auto-discovery proposals need to make clear is how
> much provisioning has to be done before the auto-discovery protocol starts
> up.  Perhaps the intention is that it is known by provisioning that certain
> interfaces are allowed to lead to EBGP neighbors,  and certain interfaces
> are not?
>
>