Re: [Idr] WG Adoption call for draft-wang-idr-rd-orf-05.txt (2/4/2021 to 2/18/2021)

Gyan Mishra <> Sat, 13 February 2021 03:16 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id C138C3A12AE for <>; Fri, 12 Feb 2021 19:16:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.087
X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (2048-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id 5Emv7bKVJQ58 for <>; Fri, 12 Feb 2021 19:16:18 -0800 (PST)
Received: from ( [IPv6:2607:f8b0:4864:20::529]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPS id 556FA3A12AC for <>; Fri, 12 Feb 2021 19:16:18 -0800 (PST)
Received: by with SMTP id t11so866118pgu.8 for <>; Fri, 12 Feb 2021 19:16:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=KRQGhge85eydRwZ70WS5hY4ug9NKBohOXR75TPMi+yA=; b=TahqjvsNVPOv+Ctt7TIqkmbzKEVKCvMSYAL8K+P8X/IkysvfN8OF4LFOTiNIepGDem /9qI0B3cMf5eSKikGxB4ibCt13v70rQ/+9NyINELJ90uijoYqHW3tjEOG/4ufPM+x7Ra fWJswqSb4IE2Mc0LcLGOUUDJZb1eIcmAxPcFy5rPnYphsDiDheM8vkWJYFWZOpaOL65S KbX2M1Mmg/hhEW79G5BgfSvTfTEt/fMyRfcG2VyZEoRwA+CN51fbv+yoT8BVUyFclDzc aSt6ZSQdKo8uVBCl+kJ7QZgCO1Q7G7/WN0ZgPGro1fFjhFehPAe8Wp1oaMb/a1Go1WX5 bZhA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=KRQGhge85eydRwZ70WS5hY4ug9NKBohOXR75TPMi+yA=; b=D/elwVfaPm72J/d1SyLtU3VzJkFDd7qNl1jfy308PuHjAiZIGwTST6gAJxOcOM8Z7W idYbVoxdmGP554JHztTR8bxY824iz7m7yC13ILFIGXqk/aI7fIItUhlDVrgDLBfQTfIT 6r6Arw+Oo9SXMa8xfOFMZq50MzLyT526QSHsCOoIspvgSmh94tEaBz+f1tSZorvIVBbC CMthphxJNgTw8rNyJpLOr0ncgWaya23XhW1Ys8RVRimmrKEnNMJgbrlaEy8VRZfXUwqu Yr0c3LZqC7A7V0sqnUHugX7D4cKTyKVgOEp+/gR7Nyu1FUkR9RRzNofqRUkCaVWAfVxT 8E2w==
X-Gm-Message-State: AOAM530LzWPEWF7Hsgb+STzW8Rvi4+nUgFHzaVmeTDmPhy+K5yyjtQ3v RZ5LWa7R/8U9QHckAi8R+R66DJ0fCQbttHtiOHw=
X-Google-Smtp-Source: ABdhPJzpVwRgH2cWQ6xzjPIufk3LGVX5ILDJqKqerfzqu8SFmi05iuhF6+xk4w02oJpVAKls7FMjo+pujWDxQQyvgh8=
X-Received: by 2002:a65:6547:: with SMTP id a7mr5972119pgw.50.1613186176146; Fri, 12 Feb 2021 19:16:16 -0800 (PST)
MIME-Version: 1.0
References: <> <>
In-Reply-To: <>
From: Gyan Mishra <>
Date: Fri, 12 Feb 2021 22:16:05 -0500
Message-ID: <>
To: Aijun Wang <>
Cc: "Jakob Heitz (jheitz)" <>, Robert Raszuk <>, Susan Hares <>,
Content-Type: multipart/alternative; boundary="000000000000fc5fc605bb2f2c3b"
Archived-At: <>
Subject: Re: [Idr] WG Adoption call for draft-wang-idr-rd-orf-05.txt (2/4/2021 to 2/18/2021)
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Sat, 13 Feb 2021 03:16:21 -0000


>From Susan Hares summary of where we are at with the adoption call let’s
start with the problem this draft is trying to solve and gaining
consensus.  Once we gain consensus we can get back to RD-ORF solution.  See

a) the problem this draft is drafting to solve relating to BGP routes,

The problem we are trying to solve is a scenario where you have an
offending PE that is flooding routes and a weak PE that is overwhelmed by a
flood of routes.  This is not a normal situation and is an outage situation
where the weak PE being overwhelmed by a flood of routes.  Do we all agree
to the problem statement?

Why and why not?

b) the need for additional mechanisms to solve the problem,

Do other methods exist that can solve the problem and if not do we need a
new mechanism to solve this?

RTC, Peer maximum prefix, VPN maximum prefix

c) a clear description of the technology to solve the problem.

Do we all agree that in a normal situation we would never filter on RD as
that would partition the VPN which is unwanted and what Robert mentioned.
As this is not a normal situation but a unique situation where a weak PE is
overwhelmed by a flood of routes.  How best can this be solved?

On Fri, Feb 12, 2021 at 10:32 AM Aijun Wang <>

> Hi, Robert:
> Yes, the behavior of the device should be determined. There maybe several
> factors to be considered for this local behavior, we should describe it
> more clearly in this section later.
> We have discussed the differences between RTC and RD-ORF a lot. As Haibo
> mentioned, they are not exclusive to each other, and can be used together
> in some situations. But they are different and can’t replace each other.
> Aijun Wang
> China Telecom
> On Feb 12, 2021, at 23:04, Robert Raszuk <> wrote:
> Sorry Aijun,
> What you say is just handwaving. There is no room for it in any spec.
> When code is written PE must deterministically behave so the RR or any
> other network element.
> Statements "decisions of PE2 to judge" are not acceptable in protocol
> design.
> Just imagine that each PE does what it feels like in a distributed network
> .... Same for BGP same for IGP etc ....
> And all of this is not needed if on ingress between PE1 and HQ1 you apply
> max prefix of 2 or even 100. It is also not needed if you enable  RTC to
> send RT:TO_HUB from PE2 to RR.
> But I understand - no matter what we say or how much we spend time to
> explain why this idea is a bad idea you are still going to push this fwd.
> Oh well ...   If I were you I would spend this time to redefine L3VPN such
> that customer routes are never needed to be sent to SP core routers.
> Thx,
> R.
> On Fri, Feb 12, 2021 at 3:47 PM Aijun Wang <>
> wrote:
>> Hi, Robert:
>> has
>> described such situations, which will require the additional local
>> decisions of PE2 to judge whether to send the RD-ORF message out.
>> In your example, if only the HUB VRF exceed but the resources of PE2 is
>> not exhausted, then the PE2 will not send the RD-ORF message. It may just
>> discard the excessive 100000/32 routes.
>> If the resources of PE2 is nearly exhausted, it must send the RD-ORF
>> message out. Or else not only the Spoke VRF, but also other VPNs on this
>> device can’t be used.
>> Regarding to RR, it is the same principle: if RR can cope with such
>> flooding, it need not send out RD-ORF to PE1. If RR can’t cope with, it
>> must send out the RD-ORF message, or else not only the VPN that import RD
>> X1 routes can’t work, but also other VPNs that don’t import RD x1 routes.
>> RD-ORF mechanism just keep the influences as small as possible.
>> Wish the above explanation can refresh your review of this draft.
>> We are also hopeful to invite you join us to make RD-ORF mechanism more
>> robust and meet the critical challenges.
>> Aijun Wang
>> China Telecom
>> On Feb 12, 2021, at 19:30, Robert Raszuk <> wrote:
>> Aijun & Gyan,
>> Let me try one more (hopefully last time) to explain to both of you - and
>> for that matter to anyone how supported this adoption.
>> Let's consider very typical Hub and Spoke scenario as illustrated below:
>> <image.png>
>> HQ1 is advertising two routes:
>> - one default with RDX1 with RT TO_SPOKE
>> - one or more specifics with RDX1 to the other HUBs
>> Now imagine HQ1 bought a new BGP "Optimizer" and suddenly is starting to
>> advertise 100000 /32 routes just to the other HUB with RT: TO_HUB.
>> <image.png>
>> So PE2 detects this as VRF with RDX2 on it got overwhelmed during import
>> with RT TO_HUB and starts pushing RDX1 (original RD) to RR to stop getting
>> those routes.
>> Well all great except now you are throwing baby with the water as all
>> spokes attached to PE2 which just import default route to HUB HQ1 also can
>> no longer reach their hub site as their default route will be removed.
>> Therefor they will have nothing to import with RT:TO_SPOKE
>> Further if RR "independently" decided ... oh let's push this ORF to PE1
>> then all of the spokes attached to perhaps even much more powerful PE3 can
>> also no longer reach their headquarters.
>> - - -
>> *Summary: *
>> The above clearly illustrates why the proposed solution to use RD for
>> filtering is in fact harmful.
>> See when you design new protocol extensions the difficulty is to not
>> break any existing protocols and deployments.
>> Hope this puts this long thread to rest now.
>> Thx,
>> Robert
>> --


*Gyan Mishra*

*Network Solutions A**rchitect *

*M 301 502-134713101 Columbia Pike *Silver Spring, MD