Re: [Idr] The automatic policy exchange by draft-ietf-idr-rpd-05.txt can be used for draft-ietf-rtgwg-net2cloud-gap-analysis

Linda Dunbar <linda.dunbar@futurewei.com> Mon, 27 July 2020 00:21 UTC

Return-Path: <linda.dunbar@futurewei.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 42CB43A157D; Sun, 26 Jul 2020 17:21:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.989
X-Spam-Level:
X-Spam-Status: No, score=-1.989 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H2=-0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=futurewei.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2SVJyWR4skzl; Sun, 26 Jul 2020 17:21:06 -0700 (PDT)
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (mail-dm6nam11on2105.outbound.protection.outlook.com [40.107.223.105]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3A6293A157B; Sun, 26 Jul 2020 17:21:05 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=B6Ow0piGLGpJIlu5i4eNKb936hhKExUWkuy1SpiKjw4MgAblNFXnUVL6s5a3kIU1BuCTh96dNFwMqRU5a6g0dJzDSgWHsvdO79OKPf6acwDTpW+72N0hHsItS5mxmWwomOOdmLOZa+jIktMvSN3AbBExaBXGuLFm3a3MrQwuJdUf787WjRjGODX1FA4+ZsNir/FpYpzyTEGwvjWlgdOIaRPtWyChCafiS+jgYsgcbLDM+h7/9HtT9a0vCOwkzrDY9Dka8Aeppsw+ooIi2FqQo31D1HOXVGaXaA2og7hZdafRLHyEQW2c722Ty6LBbUSFrZrH4KBPUYN4CP8XfP9VLQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HAxdCSTCu86tyM6glFXvm+0I4k045peTiXoKXpzSI8U=; b=Ny7ypD1d/lmiU/Xhre8/04R+oOnIK9Zrk0RqZPADNgh9EmZZ2ruiONF849shJo19QB+IyafCqJ9CB4anFt5mz4tC2cRE3a4LcKiMYXv0YQ3RBYpbV7nf1Ek34XqJjf2j1Run0qVbAw2AJsNd3TyTMPZ8HoJR/E8fhm/PWlvzYJFYXXRqH4V0//brsn3gEZViwYpSthia3svI3H7irRaCezHwIPFp5JgwFWfsgquKMw22hfa2JtL6Du/BkJN5Kd5fOVumtkC5GWLnlY1fGFpPHNgYLc39Mei17z/ZE/1kZG5v87w/pZ1kkw11EfMM7gXDI+CGOCCP1ICrCxSVwT0fQg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=futurewei.com; dmarc=pass action=none header.from=futurewei.com; dkim=pass header.d=futurewei.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Futurewei.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HAxdCSTCu86tyM6glFXvm+0I4k045peTiXoKXpzSI8U=; b=eHxPdHEIpYUhM5fXI30oho5GHbzJS4zOMYGJVI/xvHZGO4Azj6XapGmhcoffoe0GO3DC/+GNzsdmYmmZSBeFUc7FLgP+Qvw/Qem0MreBhj2DIKxQQPyOzSVBLaFdb7YmzzEYJiJYryxf2bRJmd5vdKIkdyQJefThJesKnUIisnM=
Received: from SN6PR13MB2334.namprd13.prod.outlook.com (2603:10b6:805:55::16) by SA0PR13MB4160.namprd13.prod.outlook.com (2603:10b6:806:93::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3239.9; Mon, 27 Jul 2020 00:21:02 +0000
Received: from SN6PR13MB2334.namprd13.prod.outlook.com ([fe80::783f:2d78:2f9f:3116]) by SN6PR13MB2334.namprd13.prod.outlook.com ([fe80::783f:2d78:2f9f:3116%7]) with mapi id 15.20.3239.015; Mon, 27 Jul 2020 00:21:02 +0000
From: Linda Dunbar <linda.dunbar@futurewei.com>
To: Robert Raszuk <robert@raszuk.net>
CC: Lizhenbin <lizhenbin@huawei.com>, "Jakob Heitz (jheitz)" <jheitz@cisco.com>, "idr@ietf.org" <idr@ietf.org>, "grow@ietf.org grow@ietf.org" <grow@ietf.org>, "rtgwg@ietf.org" <rtgwg@ietf.org>
Thread-Topic: The automatic policy exchange by draft-ietf-idr-rpd-05.txt can be used for draft-ietf-rtgwg-net2cloud-gap-analysis
Thread-Index: AQHWY5tZfIoWDII0rUSyzno+CVNcIqkajw/w
Date: Mon, 27 Jul 2020 00:21:02 +0000
Message-ID: <SN6PR13MB2334CCDC36A49DC07F05946485720@SN6PR13MB2334.namprd13.prod.outlook.com>
References: <SN6PR13MB23347FC0BC5212B52E62591385750@SN6PR13MB2334.namprd13.prod.outlook.com> <CAOj+MMFqFaQ3e6voR-4LyZaAwY2VVX12h_z8tTtJMV+y9KJjyw@mail.gmail.com>
In-Reply-To: <CAOj+MMFqFaQ3e6voR-4LyZaAwY2VVX12h_z8tTtJMV+y9KJjyw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: raszuk.net; dkim=none (message not signed) header.d=none;raszuk.net; dmarc=none action=none header.from=futurewei.com;
x-originating-ip: [72.180.73.64]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a28b9875-56f8-4096-beba-08d831c2f1e8
x-ms-traffictypediagnostic: SA0PR13MB4160:
x-microsoft-antispam-prvs: <SA0PR13MB4160DFED64F27AB040BAE09585720@SA0PR13MB4160.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: z10RvidXyCrJKOFYvKdtHYtd3co6P8UxZ0iVqqI7tZ6b76S6+W1yZCGJbenVI2gMMDG6T8wg4pk+I0vYETCuCqlN3NLjtvnjlvNZBfume9eB5skZ9AGnJep8yeymgr/ztnCfFv95Wrdfz5R91UBbsQawjYpcvcKnCBR4SvCADLDLTqCPfBrIo0K5DpJdU/Xef4iOppH3MfHgue0jxQzuQJn+CDr7igZe3Cpjp9iqQnl9gq25gGet9L3HT+nwONynSFvIYgVIkt81NLkPPkIRDABgF1VXKu8ytTFmRQ2R1/6qFQGaZjhNTsd8x/eXc9DgMYl3g51P03p1uIzZwV+y16wNSXS+145pAD6dwxgJplGlITa9FobhpbtmbOIQ4c8kBuGzBxzA7qVV46i39ggCbJ/ttslptkBKLVOBfpFjA1vKeTGNh7I3NUF/khGIpKBF
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SN6PR13MB2334.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(376002)(366004)(39830400003)(136003)(396003)(346002)(26005)(2906002)(7696005)(66446008)(52536014)(966005)(86362001)(8936002)(4326008)(64756008)(33656002)(71200400001)(8676002)(6916009)(186003)(508600001)(66946007)(99936003)(54906003)(66556008)(53546011)(166002)(6506007)(66616009)(83380400001)(66476007)(5660300002)(76116006)(44832011)(316002)(55016002)(30864003)(9686003)(2304002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/related; boundary="_004_SN6PR13MB2334CCDC36A49DC07F05946485720SN6PR13MB2334namp_"; type="multipart/alternative"
MIME-Version: 1.0
X-OriginatorOrg: Futurewei.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SN6PR13MB2334.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a28b9875-56f8-4096-beba-08d831c2f1e8
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Jul 2020 00:21:02.3874 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0fee8ff2-a3b2-4018-9c75-3a1d5591fedc
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: NW5ex43UgJ1MtzMNA/Pb/3hc5R0SeVvwZMmPXohWmmymEaW5sGZNshl5P4mEuY8qW9aBDp119HyywMqtmpFN1w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR13MB4160
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/h4eKV7-s9QTUorE--HPeXtECdgA>
Subject: Re: [Idr] The automatic policy exchange by draft-ietf-idr-rpd-05.txt can be used for draft-ietf-rtgwg-net2cloud-gap-analysis
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Jul 2020 00:21:09 -0000

Robert,

Thank you very much for the explanation.
“new BGP Transport Instance with new separate port and separate process”, very interesting perspective.

But draft-raszuk-ti-bgp-01 was written 10 years ago. Is it still valid and worth pursuing?

Thank you
Linda

From: Robert Raszuk <robert@raszuk.net>
Sent: Sunday, July 26, 2020 5:23 PM
To: Linda Dunbar <linda.dunbar@futurewei.com>
Cc: Lizhenbin <lizhenbin@huawei.com>om>; Jakob Heitz (jheitz) <jheitz@cisco.com>om>; idr@ietf.org; grow@ietf.org grow@ietf.org <grow@ietf.org>rg>; rtgwg@ietf.org
Subject: Re: The automatic policy exchange by draft-ietf-idr-rpd-05.txt can be used for draft-ietf-rtgwg-net2cloud-gap-analysis

Hi Linda,

So are you suggesting that this new SAFI is to be sent on EBGP too ?? Whow ... Note BGP is not too secure transport ! I would never allow any peer to push me policy via eBGP to my ASBRs regardless how much I would trust it.

That aside I think no one is questioning that overall this is nice to have BGP policy distributed in a dynamic way. We are however concerned in three planes ...

Aspect #1 - BGP is p2mp and information and encoding (NLRI) here clearly make this proposal p2p. And no Robin p2p is not a special case of p2mp :)

Aspect #2 - This proposal adds additional burden to IP Routing BGP subsystem and its clear that if approved there will be more and more extensions to new MATCH and SET sub-TLVs coming. While it is easy to write a draft that at the end requires a serious commitment from any vendor to now turn BGP into configuration channel. That means overall more cycles spend and more burden on BGP dev teams.

Aspect #3 - The proposal has lots of technical issues (as described) which can not just be swapped under the carpet.

My recommendations (in order of preference):

*1*

Turn proposed sub-TLVs into JSON and use HTTPS PUT, GET & DELETE along with real time response status codes to send required policy over targeted TCP sessions just using curl to remote ASBRs. Note all vendors today support RESTful commands or httpd on the routers. Some already even support JSON based BGP configuration for some time now (ex: NX-OS).

*2*

At least decouple it from routing BGP - support new BGP Transport Instance with new separate port and separate process. Whenever we need to use such protocol (call it Configuration Transport Protocol "CTP") for loop free information dissemination such isolation could deliver what you are really after with no impact to stability of IP routing.
Ref: https://tools.ietf.org/html/draft-raszuk-ti-bgp-01<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-raszuk-ti-bgp-01&data=02%7C01%7Clinda.dunbar%40futurewei.com%7Cfc692e6f8ad641dd5b9908d831b27afd%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637313989929483251&sdata=t6YI2%2BYcngtpCMJ3d%2BSFAkuffeGFW236zvXIZsd7cA8%3D&reserved=0>

Thx,
R.


On Sun, Jul 26, 2020 at 11:53 PM Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:
Robert, Jakob, etc.

Thank you very much for detailed explanation of the issues.
One of the points you all raised is that p2p policies should be administrated by controller via NETCONF.

https://datatracker.ietf.org/doc/draft-ietf-rtgwg-net2cloud-gap-analysis/<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-rtgwg-net2cloud-gap-analysis%2F&data=02%7C01%7Clinda.dunbar%40futurewei.com%7Cfc692e6f8ad641dd5b9908d831b27afd%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637313989929483251&sdata=ESJ%2BqmxEnlpAq32P3H3WxrkWzFIN863%2F7bKtucFdTrg%3D&reserved=0> describes a scenario of one vCPE in cloud DC reachable by multiple PEs. Depending on the nature of the applications or/and network conditions, some applications may need to egress or ingress from PE1, others may need to egress or ingress from PE2.

Today’s Cloud DC configuration can use the AS Path metric to influence the preferred path to/from a specific PEs. But requires manual configuration.
After reading through the draft-ietf-idr-rpd-05, I think the automatic approach can make the change on demand. The policy change can be ephemeral.
Therefore, if one side doesn’t implement the feature, the “spray” doesn’t have any impact. The traffic egress or ingress to the peer network would just go with the configuration. If the “spray” is answered, then the performance can be improved.



[cid:image001.jpg@01D66381.DF851460]



If not using the automatic method proposed by draft-ietf-idr-rpd, do you have other suggestions?

Thank you very much.

Linda Dunbar
From: Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>>
Sent: Friday, July 24, 2020 2:50 PM
To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>; Lizhenbin <lizhenbin@huawei.com<mailto:lizhenbin@huawei.com>>
Cc: Jakob Heitz (jheitz) <jheitz@cisco.com<mailto:jheitz@cisco.com>>; idr@ietf.org<mailto:idr@ietf.org>; grow@ietf.org<mailto:grow@ietf.org> grow@ietf.org<mailto:grow@ietf.org> <grow@ietf.org<mailto:grow@ietf.org>>
Subject: Re: [Idr] WG LC on draft-ietf-idr-rpd-05.txt (7/15 to 7/29/2020)

Linda,

It seems that authors of this document are strongly pushing to pass the last call irrespective of observations made by WG.

As said before and as reiterated by Jakob and Ketan BGP is not the right tool for p2p config push. We must stop adding such extensions to BGP like this one or BGP-LS or SR Policies if we really want to keep routing at some proper stability levels.

But even if you would convince everyone in IDR that this is all great the draft itself is so immature that I can't imagine why are we discussing last call at this time.

* Please observe that BGP state is ephemeral. When BGP sessions resets all state previously distributed is gone (modulo GR ...) Is the expectation here that state distributed by this new SAFI will persists ? If so for how long ? If not have you even considered the initial churn ?

* We have hooks to make sure LDP and IGP play in concert with BGP reachability. Would we need to now add to also wait for BGP policy to be received from controllers ?

* We have spent fair amount of time to make sure GR works well. Do you expect to now GR to recognize all policy parameters and sync deltas locally upon BGP sessions restarts ?

* Do you expect BGP implementations to now get busy with understanding all BGP policies syntax and semantics not in current terms how they are send or received in BGP UPDATEs but how they are applied implementation by implementation ...

* What happens when some implementation does not allow some policy defined in the draft ... for example flexible AS_PATH creation as defined in AS-Path Change sub-TLV ? Note that this section alone is catastrophic for BGP protocol to allow insertion of more then your own ASN into AS-PATH. Just looking at this alone should be enough to reject this draft.

And there are many many more real issues with this proposal  ....

See when document has low adoption bar it does not mean that it will also have the same low bar to progress it :)

Kind regards,
R.

PS. Let me cc GROW WG here as I think more operational review and comments would be highly valuable at this point.



On Fri, Jul 24, 2020 at 6:28 PM Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>> wrote:
Jakob,

Comparing Netconf with BGP  is not apple to apple comparison.
I remember a few years ago that  Netconf advocators have claimed that Netconf can replace PCE, replace BGP, replace xx, …

After many years debate,  many of the Netconf  limitations have been acknowledged,  that is why PCE still exists, so does BGP.

Other comments are inserted below:

From: Jakob Heitz (jheitz) <jheitz@cisco.com<mailto:jheitz@cisco.com>>
Sent: Thursday, July 23, 2020 5:37 PM
To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>; idr@ietf.org<mailto:idr@ietf.org>
Subject: RE: WG LC on draft-ietf-idr-rpd-05.txt (7/15 to 7/29/2020)

Netconf provides needed features that BGP does not have:
- Atomic Transactions:
  If one configuration item fails, they all fail.
  They all either succeed or all fail. There is no partial success.
  Multiple configurations in one transaction are applied at the same time.
   . This avoids non-deterministic transient behavior between application of the first policy and the last.
[Linda] Just like Routes Advertisement, receivers can improperly install the routes into their RIB/FIB.  BGP has been running for over 3 decades. Those who don’t implement correctly eventually fix their bugs.
 If the Policies sent to peers are not enforced  as the RPD is asking for,  traffic might be sent to non-preferred links, just like a BGP receiver incorrectly processes the BGP route updates.

- Feedback:
  BGP is "spray and pray".
  Netconf provides an acknowledgement that the config either failed or was applied,
  which then allows the controller to take the next steps with
  reliable information about what configuration exists in the network.

[Linda]  BGP UPDATE is over reliable TCP transport and BGP protocol itself can guarantee the proper distribution of the UDPATE. Therefore, its “spray and pray” nature has its advantage of optimized processing. BGP  Route Update doesn’t expect confirmation from  the receivers.

- Persistence:
  If the BGP session were to go down, all the configuration it sent will be implicitly withdrawn.

If another AS would not allow a foreign AS to configure it with netconf,
it would not allow it with RPD either.
[Linda] That is very true. The originator can only “Pray” as BGP is intended for.

There are already ways in BGP for an AS to signal preference across AS boundaries:
Med, AS-path length, communities.

[Linda] All those methods you have mentioned require heavy duty configurations, which is difficult to change on the fly. The proposed method is a flexible method which allows policies to be changed on the fly (depending on real time traffic conditions).


Ketan and Robert added other objections.
[Linda] I have been studying their reasons for the objections.

Thank you very much for the explanation.

Linda Dunbar


Regards,
Jakob.

From: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>
Sent: Thursday, July 23, 2020 3:24 PM
To: Jakob Heitz (jheitz) <jheitz@cisco.com<mailto:jheitz@cisco.com>>; idr@ietf.org<mailto:idr@ietf.org>
Subject: RE: WG LC on draft-ietf-idr-rpd-05.txt (7/15 to 7/29/2020)

Jakob,

Can you elaborate those automation configuration methods that are much better and less error prone than the proposed one?
It will take a long time to dig through so many IDR emails to find them.

Thank you very much,
Linda Dunbar

From: Jakob Heitz (jheitz) <jheitz@cisco.com<mailto:jheitz@cisco.com>>
Sent: Thursday, July 23, 2020 5:20 PM
To: Linda Dunbar <linda.dunbar@futurewei.com<mailto:linda.dunbar@futurewei.com>>; idr@ietf.org<mailto:idr@ietf.org>
Subject: RE: WG LC on draft-ietf-idr-rpd-05.txt (7/15 to 7/29/2020)

Of course it's better than manual configuration.
That's not much of an argument, because there are plenty of
automatic configuration methods that are much better and
less error prone than this draft as I and others have pointed
out in previous emails.

Regards,
Jakob.

From: Idr <idr-bounces@ietf.org<mailto:idr-bounces@ietf.org>> On Behalf Of Linda Dunbar
Sent: Thursday, July 23, 2020 2:57 PM
To: idr@ietf.org<mailto:idr@ietf.org>
Subject: Re: [Idr] WG LC on draft-ietf-idr-rpd-05.txt (7/15 to 7/29/2020)

I support the WGLC for the draft. I think the proposed distribution of policy can scale much better and less error prone than any manual configuration.
_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://www.ietf.org/mailman/listinfo/idr<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fidr&data=02%7C01%7Clinda.dunbar%40futurewei.com%7Cfc692e6f8ad641dd5b9908d831b27afd%7C0fee8ff2a3b240189c753a1d5591fedc%7C1%7C0%7C637313989929483251&sdata=HMOd%2FD7ak6rGTS6b6NV7Xr%2FIF6FX9HF8uaM0KaHRRuM%3D&reserved=0>