[Idr] Shepherd's review of draft-ietf-idr-sr-policy-path-mtu-09

Susan Hares <shares@ndzh.com> Tue, 03 September 2024 18:46 UTC

Return-Path: <shares@ndzh.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 949E2C14F5F4 for <idr@ietfa.amsl.com>; Tue, 3 Sep 2024 11:46:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wWmJS-kUIshm for <idr@ietfa.amsl.com>; Tue, 3 Sep 2024 11:46:58 -0700 (PDT)
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on2103.outbound.protection.outlook.com [40.107.243.103]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6EBAFC14F60E for <idr@ietf.org>; Tue, 3 Sep 2024 11:46:58 -0700 (PDT)
ARC-Seal: i=2; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=f5b4vQ1cZRjHZTzrAIDJvoeY/E8w4bUc9kF80MsN7M57R3m+/HEFvA5taqWWmsZ5oITjnGz1GDqGiStC+9zRrGopL2jv23p3usNJVZLSrNYbJrvlby+mU+YCDR/+a/e7zCa9t7jdCqc5EzvduJFGVrddd1FD45fn+5ZdSnNgzxjsNL3DW8KoeebJ/18vAyH3cpu1trWW40yprpDBAQL1xAkmIcBn//0tVeVZ8PbCbsC3V43vRDRnojT5Q/72Njj1wTBAHyEF6Zd0bqUMaWt26qmo/ijtLyheRYAxAAtGUWdfUbzajlz7SQ2PNIuAXHDtfRgNXAOEMSKphzwegPCt3w==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=22e77K8d7o+L8zujofBuobh3o8/udnQkmv/w/1iX4BQ=; b=gn1GqoBrERWwSBqNymqnQjvYZCZ4R0rSujw/dpacOdpbQCy5yNfm8Y7hP5vEBDxImo86TSc9grh9wVdKJcM6RDKKLCfS43mScr8uN7aeE4yPjPaZMRjI8N96hj3JmC1LbiwCNyn7qEWV0NE4jYcOd39+juCgVLGZnrPSFepUUqHAukNBwc6723avG0OXsKY2Dqh3xpTWmi/ywCfOggLr+9f0Jj5uzHt1emkMb+Mc6b9WJWXeiX03UZAcWMcVp3D3NliXkNugvDd/fYlG66O9EjorEs+xUyIMFP+C/i9E4g1f6sdP72TL3hO5i2Y1otIPLXpFKtcZ4tsDWCk5amxu6g==
ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 104.47.58.101) smtp.rcpttodomain=chinatelecom.cn smtp.mailfrom=ndzh.com; dmarc=bestguesspass action=none header.from=ndzh.com; dkim=none (message not signed); arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=ndzh.com] dkim=[1,1,header.d=ndzh.com] dmarc=[1,1,header.from=ndzh.com])
Received: from BN0PR10CA0010.namprd10.prod.outlook.com (2603:10b6:408:143::14) by PH0PR08MB7606.namprd08.prod.outlook.com (2603:10b6:510:10e::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7918.27; Tue, 3 Sep 2024 18:46:52 +0000
Received: from BN1PEPF0000467F.namprd03.prod.outlook.com (2603:10b6:408:143:cafe::bb) by BN0PR10CA0010.outlook.office365.com (2603:10b6:408:143::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7939.14 via Frontend Transport; Tue, 3 Sep 2024 18:46:50 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 104.47.58.101) smtp.mailfrom=ndzh.com; dkim=none (message not signed) header.d=none;dmarc=bestguesspass action=none header.from=ndzh.com;
Received-SPF: Pass (protection.outlook.com: domain of ndzh.com designates 104.47.58.101 as permitted sender) receiver=protection.outlook.com; client-ip=104.47.58.101; helo=NAM10-DM6-obe.outbound.protection.outlook.com; pr=C
Received: from obx-outbound.inkyphishfence.com (44.224.15.38) by BN1PEPF0000467F.mail.protection.outlook.com (10.167.243.84) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7918.13 via Frontend Transport; Tue, 3 Sep 2024 18:46:48 +0000
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10lp2101.outbound.protection.outlook.com [104.47.58.101]) by obx-inbound.inkyphishfence.com (Postfix) with ESMTPS id E559A102642; Tue, 3 Sep 2024 18:46:46 +0000 (UTC)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=j5BhNdPN28jxB62G36QJjVl7vW7HHMRe53cLX2Uyo5gQHrmkyqsNA8/wLvaJ0fHJ0edRBnZ1iRiLbAxpxt3vKgGctA/UlHWh+qLsR8nG3xFi9kXINe2Eke5fD/tuy0v4yj/QcwqDePQaBO+563sKQv8Ol/Bg5J3mMS1pNVKhmKWNqlSs+L14KUb5rY+RVl1eK7jBqSNDF1yl04TwAtsiIGwRNyyoX3Q2qWrhC52DSinaAKvbmDVgeDbgvyNr1E5CfHt6lhPtEf9PA75AWTh9Tb+QyzYteEsyrnallBRpCsW2RxrZt9ZWE+V4tfzUod4FzDPQBI2JH9YD6dwC0KIEOA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=22e77K8d7o+L8zujofBuobh3o8/udnQkmv/w/1iX4BQ=; b=pPzzpCb2gIA4hNW5rh8ykGs0ueowLCab7DIdHNmCtFVaRDTtSRIcx5QW5sUtE3xTVwhgvlvIl95490lxPt2RMEFL9bmghZsYhCKOMjPDvKz9u1rdnh8y1iG7opGVOMio5lh9Eije7rgS8VgnNOtHNL5ok3oj7AYHFVi5ohoRKLmkORZVtUN0P0NJqmvRcPiOuR9HMRHeAy4yEXhW+eGTrlNoOoG2bRyN0EP39xzn0mReFDBzkGRCp456jybtpBSC+ISUK8Q/amyD9yE2mbXyHdxKsLlvS3qOwg5e4lVxta8zI3LJGlXO7udlP6/wSG+O7ovigQVvdpkxJW9lwBdGAA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ndzh.com; dmarc=pass action=none header.from=ndzh.com; dkim=pass header.d=ndzh.com; arc=none
Received: from CO1PR08MB6611.namprd08.prod.outlook.com (2603:10b6:303:98::12) by CO1PR08MB6627.namprd08.prod.outlook.com (2603:10b6:303:91::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7918.27; Tue, 3 Sep 2024 18:46:43 +0000
Received: from CO1PR08MB6611.namprd08.prod.outlook.com ([fe80::7744:8abd:9769:c2bf]) by CO1PR08MB6611.namprd08.prod.outlook.com ([fe80::7744:8abd:9769:c2bf%5]) with mapi id 15.20.7918.024; Tue, 3 Sep 2024 18:46:42 +0000
From: Susan Hares <shares@ndzh.com>
To: "idr@ietf.org" <idr@ietf.org>
Thread-Topic: Shepherd's review of draft-ietf-idr-sr-policy-path-mtu-09
Thread-Index: Adr+MFhtX7mQcAxWSS+Nn/34cw1iOg==
Date: Tue, 03 Sep 2024 18:46:42 +0000
Message-ID: <CO1PR08MB6611B31326FFAB2A41FA9BB2B3932@CO1PR08MB6611.namprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ndzh.com;
x-ms-traffictypediagnostic: CO1PR08MB6611:EE_|CO1PR08MB6627:EE_|BN1PEPF0000467F:EE_|PH0PR08MB7606:EE_
X-MS-Office365-Filtering-Correlation-Id: 9ffc0f9d-0734-43c3-d67e-08dccc48c491
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;ARA:13230040|1800799024|376014|366016|38070700018;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CO1PR08MB6611.namprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(38070700018);DIR:OUT;SFP:1102;
Content-Type: multipart/alternative; boundary="_000_CO1PR08MB6611B31326FFAB2A41FA9BB2B3932CO1PR08MB6611namp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR08MB6627
X-Inky-Outbound-Processed: True
X-EOPAttributedMessage: 0
X-MS-Exchange-SkipListedInternetSender: ip=[104.47.58.101];domain=NAM10-DM6-obe.outbound.protection.outlook.com
X-MS-Exchange-ExternalOriginalInternetSender: ip=[104.47.58.101];domain=NAM10-DM6-obe.outbound.protection.outlook.com
X-MS-Exchange-Transport-CrossTenantHeadersStripped: BN1PEPF0000467F.namprd03.prod.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 19cffe20-ed8e-45e4-148a-08dccc48c09f
X-IPW-GroupMember: False
X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|36860700013|376014|82310400026|35042699022;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:44.224.15.38;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:NAM10-DM6-obe.outbound.protection.outlook.com;PTR:mail-dm6nam10lp2101.outbound.protection.outlook.com;CAT:NONE;SFS:(13230040)(1800799024)(36860700013)(376014)(82310400026)(35042699022);DIR:OUT;SFP:1102;
X-OriginatorOrg: ndzh.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Sep 2024 18:46:48.5340 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 9ffc0f9d-0734-43c3-d67e-08dccc48c491
X-MS-Exchange-CrossTenant-Id: d6c573f1-34ce-4e5a-8411-94cc752db3e5
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d6c573f1-34ce-4e5a-8411-94cc752db3e5;Ip=[44.224.15.38];Helo=[obx-outbound.inkyphishfence.com]
X-MS-Exchange-CrossTenant-AuthSource: BN1PEPF0000467F.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR08MB7606
Message-ID-Hash: OMLFQLG7ZDKDUD6VFMT4FNTMNS33U2Q7
X-Message-ID-Hash: OMLFQLG7ZDKDUD6VFMT4FNTMNS33U2Q7
X-MailFrom: shares@ndzh.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-idr.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "zhuyq8@chinatelecom.cn" <zhuyq8@chinatelecom.cn>, "aelsawaf.c@stc.com.sa" <aelsawaf.c@stc.com.sa>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Idr] Shepherd's review of draft-ietf-idr-sr-policy-path-mtu-09
List-Id: Inter-Domain Routing <idr.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/TGRz8JBBGADNLQTVV9vQ0iVgohY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Owner: <mailto:idr-owner@ietf.org>
List-Post: <mailto:idr@ietf.org>
List-Subscribe: <mailto:idr-join@ietf.org>
List-Unsubscribe: <mailto:idr-leave@ietf.org>

Cheng, YongQing, Ahmed, and Robin:


Below is a Shepherd's Review on draft-ietf-idr-sr-policy-path-mtu-09.
This Shepherd report suggests minor text changes for technical clarity
plus a few minor editorial changes.

Due to the quality of the draft, I have a few questions about the status:



  1.  Do you plan any technical changes?


  1.  Did your implementation calculate the PATH MTU
Based on BGP-LS data or data from other sources?



  1.  Does this WG draft have two implementations?
   I noticed you mentioned one in the text.


  1.  Are you planning WG LC in the next 3 months?

A version (-10) addresses the issue below, and
2 implementations are required before WG LC.

Thank you for your hard work on this draft!

Cheerily, Sue Hares


==============

Shepherd Review for:
draft-ietf-idr-sr-policy-path-mtu-09

status: WG Draft
Status: Proposed Standard
version: revise for -10 suggested
Implementation status: 1 implementation in draft (? Any more)
WG LC:


Technical:

Issue-1: Abstract, Missing link with RFC9012

Old text:/
   An SR policy is a set of candidate SR paths consisting of one or more
   segment lists with necessary path attributes. However, the path
   maximum transmission unit (MTU) information for SR path is not
   available in the SR policy since the SR does not require signaling.
   This document defines extensions to BGP to distribute path MTU
   information within SR policies./

New text:/
   An SR policy is a set of SR Policy candidate paths consisting of one or
   more segments with the appropriate SR path attributes. BGP distributes
   each SR Policy candidate path as combination of an prefix plus a
   the BGP Tunnel Encapsulation(Tunnel-Encaps) attribute containing
   an SR Policy Tunnel TLV with information on the SR Policy candidate
   path as a tunnel.  However, the path maximum
   transmission unit (MTU) information for a segment list for SR path
   is not currently passed in the BGP Tunnel-Encaps attribute. .
   This document defines extensions to BGP to distribute path MTU
   information within SR policies./

Issue-2: Introduction, paragraph 1,

Old text:/
   In order to distribute SR policies to the headend,
   [I-D.ietf-idr-sr-policy-safi] specifies a mechanism by using BGP./

New text:/
   In order to distribute SR policies to the headend,
   [I-D.ietf-idr-sr-policy-safi] specifies a BGP mechanism
   to pass SR Policies and Candidate SR Policies in BGP UPDATE
   message.  Each SR Candidate Path is passed as combination of a
   specific type of NLRI and BGP Tunnel Encapsulation Attribute (Tunnel-Encaps)
   with SR Policy Tunnel type tunnel.  The NLRI must contain
   either be the IPv4 Unicast AFI with SR Policy SAFI (AFI=1/SAFI=73),
   the IPv6 Unicast AFI with the SR Policy SAFI (AFI=2/SAFI=73)./


2. Introduction, paragraph 4, ingress needs to be ingress router

Old text:/ But the ingress still needs to
   examine the packet size for dropping too large packets to avoid
   malicious traffic or error traffic.  Also, the packet size may
   exceeds the PMTU because of the new encapsulation of SR-MPLS or SRv6
   packet at the ingress. /

New text:/  But the ingress router still needs to
   examine the packet size for dropping too large packets to avoid
   malicious traffic or error traffic.  Also, the packet size may
   exceeds the PMTU because of encapsulation of the original packet in
   SR-MPLS or SRv6 packet at the ingress router./


3. Introduction, paragraph 4, last sentence.

Old text:/
   However, the path maximum transmission unit (MTU)
   information for SR path is not available since the SR does not
   require signaling.

   This document defines extensions to BGP to distribute path MTU
   information within SR policies.  The Link MTU information can be
   obtained via BGP-LS [I-D.ietf-idr-bgp-ls-link-mtu] or some other
   means.  With the Link MTU, the controller can compute the PMTU and
   convey the information via the BGP SR policy./

New text:/
   However, the path maximum transmission unit (MTU)
   information for SR path is not currently distributed in the
   BGP Tunnel-Encaps attribute TLV for the SR Policy Tunnel.
   This document defines a new sub-TLV for the BGP Tunnel-Encaps
   attribute for the SR Policy Tunnel type to specify Maximum Path
   MTU for a Segment list (Sub-TLV)./

   The Maximum Path MTU can be calculated as the maximum of
   individual Link MTU information. The Link MTU information can be
   obtained via BGP-LS [I-D.ietf-idr-bgp-ls-link-mtu] or some other
   means.  based on all Link MTUs, the controller can compute the PMTU and
   convey the information via the BGP SR policy./

 4. Section 3.1, length definition

 Old text:/
   Length: the total length of the value field not including Type and
   Length fields. /

New text:/   Length: the total length in octets the value field not including Type and
   Length fields.  The value must be 6./


5. Please add a security section.

This security section should refer to [draft-ietf-idr-sr-policy-safi].
One addition needs to be made in this text.

This security section should specifically state that the new sub-TLV PATH MTU
contains critical information for the network. Critical information is a place
where modifying the information could cause problems. Care should be taken to
protect the collection of Link MTU, the generation of PATH MTU, and the
distribution of PATH MTU.


Editorial:

  1. Introduction, paragraph 3, English tense + spelling

  current:/
   [RFC3209] specify the mechanism of MTU signaling in RSVP.
   Likewise, SRv6 pakcets will be dropped if the
   packet size is larger than path MTU, since IPv6 packet can not be
   fragmented on transmission [RFC8200] ./


  new:/
  [RFC3209] specifies the mechanism of MTU signaling in RSVP.
  Similarly, the SRv6 packets will be dropped if the packet
  size is larger than the path MTU, since IPv6 packet cannot be
   fragmented on transmission [RFC8200]./