Re: [Idr] [Responses for the comments during the IETF108] New Version Notification for draft-wang-idr-rd-orf-01.txt

Aijun Wang <wangaijun@tsinghua.org.cn> Wed, 05 August 2020 07:44 UTC

Return-Path: <wangaijun@tsinghua.org.cn>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 121E33A0F2D for <idr@ietfa.amsl.com>; Wed, 5 Aug 2020 00:44:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Level:
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id thIE65mPvXty for <idr@ietfa.amsl.com>; Wed, 5 Aug 2020 00:44:46 -0700 (PDT)
Received: from mail-m127101.qiye.163.com (mail-m127101.qiye.163.com [115.236.127.101]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 943173A0F12 for <idr@ietf.org>; Wed, 5 Aug 2020 00:44:42 -0700 (PDT)
Received: from DESKTOP2IOH5QC (unknown [219.142.69.75]) by mail-m127101.qiye.163.com (Hmail) with ESMTPA id 794A0478CA; Wed, 5 Aug 2020 15:44:36 +0800 (CST)
From: "Aijun Wang" <wangaijun@tsinghua.org.cn>
To: "'Robert Raszuk'" <robert@raszuk.net>
Cc: "'Keyur Patel'" <keyur@arrcus.com>, "'idr'" <idr@ietf.org>, <wangw36@chinatelecom.cn>
References: <059401d66ad0$f96c3b50$ec44b1f0$@tsinghua.org.cn> <CAOj+MMHgwXNcGduKHXoQNsn_UJS9Kpz_kDcpXH_kAhpotDKWng@mail.gmail.com>
In-Reply-To: <CAOj+MMHgwXNcGduKHXoQNsn_UJS9Kpz_kDcpXH_kAhpotDKWng@mail.gmail.com>
Date: Wed, 5 Aug 2020 15:44:32 +0800
Message-ID: <05d501d66afc$420efe30$c62cfa90$@tsinghua.org.cn>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_05D6_01D66B3F.50399130"
X-Mailer: Microsoft Outlook 16.0
Content-Language: zh-cn
Thread-Index: AQGyrK7kRWlQLNPgt0vuH/lT6mr+YQF5LsBFqWTPTsA=
X-HM-Spam-Status: e1kfGhgUHx5ZQUpXWQgYFAkeWUFZS1VLWVdZKFlBSkxLS0o3V1ktWUFJV1 kPCRoVCBIfWUFZTUNNTk1MGB5MHUofVkpOQk1NSkhPTE1DSUJVEwETFhoSFyQUDg9ZV1kWGg8SFR 0UWUFZT0tIVUpKS0hKTFVKS0tZBg++
X-HM-Sender-Digest: e1kMHhlZQR0aFwgeV1kSHx4VD1lBWUc6Myo6DCo6Ij8oH0tDPjg6Sg89 QysKFD9VSlVKTkJNTUpIT0xMT0NLVTMWGhIXVQwaFRwaEhEOFTsPCBIVHBMOGlUUCRxVGBVFWVdZ EgtZQVlJSkJVSk9JVU1CVUxOWVdZCAFZQU1OT05PNwY+
X-HM-Tid: 0a73bd9441329865kuuu794a0478ca
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/I_unr1GKQqYKpnVULNVndYWeSDA>
Subject: Re: [Idr] [Responses for the comments during the IETF108] New Version Notification for draft-wang-idr-rd-orf-01.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Aug 2020 07:44:54 -0000

Hi, Robert:

 

Thanks for your comments.  Please see the detail responses inline.

 

From: Robert Raszuk [mailto:robert@raszuk.net] 
Sent: Wednesday, August 5, 2020 2:55 PM
To: Aijun Wang <wangaijun@tsinghua.org.cn>
Cc: Keyur Patel <keyur@arrcus.com>om>; idr <idr@ietf.org>rg>; wangw36@chinatelecom.cn
Subject: Re: [Idr][Responses for the comments during the IETF108] New Version Notification for draft-wang-idr-rd-orf-01.txt

 

Hello Aijun,

 

【Robert】: there was a number of technical problems sent to the list. None of these were addressed. This is not the right way to filter VPN

【A-WAJ】:Would you like to point out which technical problem isn’t addressed yet?  We have also compared the existing solutions and their limitations in the draft and at the presentation.

As you know VPNs use different scheme of RD allocations. Most common would be to import RDs with local rewrite. So I know you realize that and your intention is to signal such RD to RRs or other PEs from the pre imported routes. So far so good. 

Now realize that on a given PE there is few VRFs which need to import given RD. Import is based on RTs. Therefor not all target VRFs may import same subset of routes originally carrying given RD. One VRF can import 5 routes, the other 10 and yet one more 10000. Let's assume for now that that last VRF "overflows" and decided to trigger RD-ORF. 

That means that PE signals this to RR and RR stops sending all such routes to given PE. That effectively means that even those first two VRFs which are fine as they just import subset of routes suffer unreachability as those routes are simply no longer arriving at the PE. 

[WAJ] Route Import is based on RTs, but different VRFs on one PE will use different RDs(and also different import RTs). Then filter based on RD will not influence the route import in another VRF, especially within the same PE.

 

For me this is showstopper - and pretty fatal one to use RD for filtering. We do import based on RTs and filtering should also be done based on the RTs. 

[WAJ] RT can’t be uniquely to identify one specified VPN. 

My other serious concern is that end customer will in no one be notified about such RD-ORF filtering ... - that is frankly not acceptable to me or to any L3VPN or L2VPN customer. As comparison when you use prefix limit on the PE-CE customer's session goes down hence customer is alerted about the problem. 

See worst "solutions" are those which may cause silent failures. We should avoid those at all cost. 

[WAJ] The RD-ORF message is initiated from the overflow PE.  The RR or the source of VPN overflow act based on the instruction from the applier. Then this is not silent failures.

 

Last this is measure to protect SP resources (PEs). Let me observe that this topic came up in early 2000 and it was commonly agreed that the best we can offer is protect the network from any customer injecting more then in the customer <--> SP SLAs. 

Beyond that SP's infra must keep good monitoring of PE resources instead of waiting for disaster to happen and building parachutes. 

[WAJ] RD-ORF just want to keep the disaster as small as possible, based on the parachutes J

 

Kind regards,

R.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

On Wed, Aug 5, 2020 at 4:34 AM Aijun Wang <wangaijun@tsinghua.org.cn <mailto:wangaijun@tsinghua.org.cn> > wrote:

Hi, Keyur, Praveen and Robert:

 

Thanks for your comments on this draft during the IETF 108 meeting.  

Below are responses for your questions, please review them to see whether they resolve your concerns:

 

【Q-Praveen】: When PE1 injects a prefix, will it impact other routers which are not overflowing the source?

【A-WAJ】:No. RR can control when to send the RD-ORF message to the upstream/source router. 

For example, if only one PE overflow, RR can add the RD-ORF as its Adj-RIB-Out filter to this PE, and don’t send this message to the source PE, or other RR.

Theoretically, RR need only send such RD-ORF upstream when it can’t process the BGP Updates, or it is overflow. 

 

【Keyur】:The prefix filter level filtering has more expense than a higher level filters.

【A-WAJ】:RD based filter is also higher level filter.  RT based filter can’t solve the problems that described in this draft.

 

【Robert】: there was a number of technical problems sent to the list. None of these were addressed. This is not the right way to filter VPN

【A-WAJ】:Would you like to point out which technical problem isn’t addressed yet?  We have also compared the existing solutions and their limitations in the draft and at the presentation.

 

 

Best Regards

 

Aijun Wang

China Telecom 

 

From: idr-bounces@ietf.org <mailto:idr-bounces@ietf.org>  [mailto:idr-bounces@ietf.org <mailto:idr-bounces@ietf.org> ] On Behalf Of wangw36@chinatelecom.cn <mailto:wangw36@chinatelecom.cn> 
Sent: Tuesday, July 28, 2020 4:47 PM
To: idr <idr@ietf.org <mailto:idr@ietf.org> >
Subject: [Idr] New Version Notification for draft-wang-idr-rd-orf-01.txt

 

Hi,IDR experts:

 

    Based on the previous discussion with Robert and Jakob, we update our draft as follows:

·       The differences between RD-ORF, RTC and Address Prefix ORF are briefly described;

·       The encoding of RD-ORF type-specific part is changed and the source address sub TLV field is added;

·       The application in single-domain scenario is added;

·       Four new types of sub-TLV are defined to carry the source address in different scenarios.

    Any comments are welcome.

 

Best Regards.


  _____  


 王巍  Wang Wei    

+86-010-5090-2397  
+86-177-7809-6050  
wangw36@chinatelecom.cn  
------------------------------------------------------------------------  
CTNET2025研究所  
中国电信股份有限公司北京研究院  
China Telecom Corporation Limited Beijing Research Institute  
北京市昌平区北七家镇未来科技城南区中国电信北京信息科技创新园  
邮编:102209 

 

From: internet-drafts <mailto:internet-drafts@ietf.org> 

Date: 2020-07-28 16:17

To: Jie Dong <mailto:jie.dong@huawei.com> ; Aijun Wang <mailto:wangaj3@chinatelecom.cn> ; Shunwan Zhuang <mailto:zhuangshunwan@huawei.com> ; Wei Wang <mailto:wangw36@chinatelecom.cn> ; Haibo Wang <mailto:rainsword.wang@huawei.com> 

Subject: New Version Notification for draft-wang-idr-rd-orf-01.txt

 

A new version of I-D, draft-wang-idr-rd-orf-01.txt

has been successfully submitted by Wei Wang and posted to the

IETF repository.

 

Name: draft-wang-idr-rd-orf

Revision: 01

Title: Route Distinguisher Outbound Route Filter (RD-ORF) for BGP-4

Document date: 2020-07-28

Group: Individual Submission

Pages: 14

URL:            https://www.ietf.org/internet-drafts/draft-wang-idr-rd-orf-01.txt

Status:         https://datatracker.ietf.org/doc/draft-wang-idr-rd-orf/

Htmlized:       https://tools.ietf.org/html/draft-wang-idr-rd-orf-01

Htmlized:       https://datatracker.ietf.org/doc/html/draft-wang-idr-rd-orf

Diff:           https://www.ietf.org/rfcdiff?url2=draft-wang-idr-rd-orf-01

 

Abstract:

   This draft defines a new Outbound Route Filter (ORF) type, called the

   Route Distinguisher ORF (RD-ORF).  RD-ORF is applicable when the

   routers do not exchange VPN routing infomation directly (e.g. routers

   in single-domain connect via Route Reflector, or routers in Option B/

   Option C cross-domain scenario)..

 

                                                                                  

 

 

Please note that it may take a couple of minutes from the time of submission

until the htmlized version and diff are available at tools.ietf.org <http://tools.ietf.org> .

 

The IETF Secretariat