[Idr] Update on advancement of rfc5575bis draft, implementations

John Scudder <jgs@juniper.net> Fri, 26 April 2019 21:14 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0A51120139; Fri, 26 Apr 2019 14:14:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.338
X-Spam-Level:
X-Spam-Status: No, score=-1.338 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, KHOP_DYNAMIC=1.363, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KgfescCgXkoK; Fri, 26 Apr 2019 14:14:44 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB0CF1200F4; Fri, 26 Apr 2019 14:14:43 -0700 (PDT)
Received: from pps.filterd (m0108163.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x3QL4OPA003011; Fri, 26 Apr 2019 14:14:41 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=1yD61xTebx2eOjfGdMFIBWZXIzB+5UEWFARGhx5OT8A=; b=iRFi3Prd/9709lZh/iR3rQ7NEqFP/uVRifAXnpGv8a60h8MuwuF73rYCeXN8H122qqht OoWGp3FK3NpZ+YW1ZQkGq6S0Kj7p8wQOiK8soh3kigVRNWS978WjENv2PQ3MMfoDufVy FD71gVl3V9g1sjJwJdCcawdtBT7USo1spsQef87xEFBDVqxm1iMC+DgX6g0iPmuq3TcL Ugbu/Po55KsBeDHvJovaE/y9LFMK0V1mO5OHbwu+dHdrkCYqbwxkJ0zA6i+FW8ji6sFG YVFv0jUAVPgs7kxmvNGeskFMFQamgohgsFHObHBuRaieL6/mF0m46pgrn7sYn4lSPitN Mw==
Received: from nam02-cy1-obe.outbound.protection.outlook.com (mail-cys01nam02lp2057.outbound.protection.outlook.com [104.47.37.57]) by mx0b-00273201.pphosted.com with ESMTP id 2s44528gwn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 26 Apr 2019 14:14:41 -0700
Received: from DM6PR05MB4714.namprd05.prod.outlook.com (20.176.109.215) by DM6PR05MB6363.namprd05.prod.outlook.com (20.178.224.202) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1835.7; Fri, 26 Apr 2019 21:14:39 +0000
Received: from DM6PR05MB4714.namprd05.prod.outlook.com ([fe80::1523:af80:389f:efb5]) by DM6PR05MB4714.namprd05.prod.outlook.com ([fe80::1523:af80:389f:efb5%2]) with mapi id 15.20.1835.010; Fri, 26 Apr 2019 21:14:39 +0000
From: John Scudder <jgs@juniper.net>
To: "idr@ietf.org" <idr@ietf.org>
CC: "draft-ietf-idr-rfc5575bis@ietf.org" <draft-ietf-idr-rfc5575bis@ietf.org>
Thread-Topic: Update on advancement of rfc5575bis draft, implementations
Thread-Index: AQHU/HUOVqUgE5PF5EKaDMoZxtKHiw==
Date: Fri, 26 Apr 2019 21:14:39 +0000
Message-ID: <3ECFE192-B04B-4C1F-89F0-812D4ADC68C0@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [162.225.191.79]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 54ba021f-839c-49f7-938b-08d6ca8c316c
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(4618075)(2017052603328)(7193020); SRVR:DM6PR05MB6363;
x-ms-traffictypediagnostic: DM6PR05MB6363:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <DM6PR05MB63637F4AF6E598883EA23FBCAA3E0@DM6PR05MB6363.namprd05.prod.outlook.com>
x-forefront-prvs: 001968DD50
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(376002)(136003)(39860400002)(346002)(366004)(199004)(189003)(53754006)(3846002)(2616005)(486006)(6916009)(476003)(66066001)(6306002)(6116002)(5660300002)(5640700003)(186003)(6436002)(26005)(102836004)(71190400001)(6486002)(71200400001)(83716004)(2906002)(6506007)(14454004)(478600001)(7736002)(305945005)(36756003)(2351001)(68736007)(66946007)(76116006)(66556008)(66476007)(66446008)(64756008)(73956011)(33656002)(82746002)(86362001)(450100002)(2501003)(81166006)(81156014)(8936002)(97736004)(14444005)(4326008)(8676002)(25786009)(316002)(15650500001)(1730700003)(6512007)(99286004)(256004)(53936002); DIR:OUT; SFP:1102; SCL:1; SRVR:DM6PR05MB6363; H:DM6PR05MB4714.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: UNyIZ0nHrv4f40Cb0GBhAXCr7JnKzyoVCasogEQF5CnMnT8hMHzMwHyzdkeh49y5skVg8zRdQFUfFpqqsFU9gfaZ3ofe5QPOwcERiJgR+Ts+qdXQSvALpZTB2RD4oVH6i3sbVFfuoryWMuwsc73ncrOyCIFdd1xrKhX/8xHKUESGRsBI8KfC0cDMQYv/nwtItjqOhr2vxRO5Nw3u9y/epsetXDQj+XHy87vmvb5CE8vRM7ibd7gDoeLNsD12ceJBUveSX81vBZyoJX9nIXgFKTHaKUq9BopB/Ilz4Yn1IhXRDpyFiudaiidbdYfyP8ltm7B7RmriBeweqfH/4U3wG/xNJ/X7Z9Y8mjjlxrrYHsxDgZ8dNJWtPrU5KzraI51EKc9P4uE8q+A4a3fY9kfAMmfpGxpMLNsGAFHI9Mqg6Ao=
Content-Type: text/plain; charset="utf-8"
Content-ID: <EEFBCCAA43F41C40ADF4127B990BB930@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 54ba021f-839c-49f7-938b-08d6ca8c316c
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Apr 2019 21:14:39.1814 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR05MB6363
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-04-26_14:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1904260139
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/JkePjzjO6GoamOizqo5F-cfJxqE>
Subject: [Idr] Update on advancement of rfc5575bis draft, implementations
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Apr 2019 21:14:46 -0000

Tl;dr: rfc5575bis is almost ready to advance but is missing implementation of two features. It also needs a code point, which is available from a FCFS registry, so easily acquired. Unless there’s strong support to waive the WG’s implementation requirement, we’ll hold on advancing it for now. Details below.


Hi All,

I’ve just finished reviewing the document shepherd’s writeup (https://datatracker.ietf.org/doc/draft-ietf-idr-rfc5575bis/shepherdwriteup/) and Implementation report (https://trac.ietf.org/trac/idr/wiki/draft-ietf-rfc5575bis%20implementations) for draft-ietf-idr-rfc5575bis-14. I’d like to thank all those who contributed to the very helpful and readable implementation report. I see two issues I want to discuss in the WG.

First, the implementation report line item for whether the implementation supports "Error-Handling and Future NLRI Extensions” is answered “no” across the board, though the Junos report does note that "As of Junos 19.1, unknown NLRI component types may result in session reset. Work is in progress to conform to 5575-bis behavior”. 

I would like the WG to discuss whether to wait until we have reports of implementations of the behavior before we progress the document, or whether to progress it without implementation. For reference, what’s being referred to is section 11:

   In case BGP encounters an error in a Flow Specification UPDATE
   message it SHOULD treat this message as Treat-as-withdraw according
   to [RFC7606] Section 2
.
   Possible reasons for an error are (for more reasons see also
   [RFC7606]):

   o  Incorrect implementation of this specification - the encoding/
      decoding of the NLRI or traffic action extended-communities do not
      comply with this specification.

   o  Unknown Flow Specification extensions - The sending party has
      implemented a Flow Specification NLRI extension unknown to the
      receiving party.

Second, the implementation report line item for "Traffic Rate in Packets” is "pending IANA cp assignment” across the board, with the annotation "note that without the IANA allocation, all implementations cannot comply with this specification”. 

Again, I would like the WG to decide whether to wait until we have implementation to proceed, or whether to proceed without implementation. For reference, here’s section 7.2:

   The traffic-rate-packets extended community uses the same encoding as
   the traffic-rate-bytes extended community.  The floating point value
   carries the maximum packet rate in packets per second.  A traffic-
   rate-packets of 0 should result in all traffic for the particular
   flow to be discarded.  On encoding the traffic-rate-packets MUST NOT
   be negative.  On decoding negative values MUST be treated as zero
   (discard all traffic).

   Interferes with: No other BGP Flow Specification traffic action in
   this document.

Note, the traffic-rate-packets code point is from the Generic Transitive Experimental Use Extended Community Sub-Types registry, which has a FCFS range available. So all that is needed in order to get a code point is for someone (perhaps one of the authors) to ask IANA for one.

Unless there is strong support in the WG to waive the WG's implementation requirement for these two items, we’ll hold for implementation. (Another option would be to revise the draft to remove the non-implemented items, but we should only do that if there’s indication nobody intends to implement them. At present I don’t see reason to believe that.)

Thanks,

—John