Re: [Idr] AD Review of draft-ietf-idr-bgpls-segment-routing-epe-17
Alvaro Retana <aretana.ietf@gmail.com> Wed, 03 April 2019 15:22 UTC
Return-Path: <aretana.ietf@gmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4936B12010D; Wed, 3 Apr 2019 08:22:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.097
X-Spam-Level:
X-Spam-Status: No, score=-0.097 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zxnc3qKIR6Dd; Wed, 3 Apr 2019 08:22:18 -0700 (PDT)
Received: from mail-ot1-x336.google.com (mail-ot1-x336.google.com [IPv6:2607:f8b0:4864:20::336]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68979120104; Wed, 3 Apr 2019 08:22:18 -0700 (PDT)
Received: by mail-ot1-x336.google.com with SMTP id o74so15844661ota.3; Wed, 03 Apr 2019 08:22:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:in-reply-to:references:mime-version:date:message-id:subject:to :cc; bh=mK0Acq87xcSEW36HuYS32af9gwy0+qT7exKt4ajYEr8=; b=A8i62BI4kdotlgnn/OaonFrNpguxja69TLcQQ0Cfw4Y25SgK1h52ZRg0KC+jvo3+HJ th1wtY4pRjONhYNLttDHqj2cWcPHoGFcqG7Z5AP/Z85NMooBot47sF0ySiNboHmHoaV+ s64jmBcPtuiUc6OI7arjmLY3jxy3/THpAOi1sbrxWaWic5g3EaS2pC5O27weWPi2Gzw6 Z2brPGVSLo+Ds7hjxpTtk3PVz/5u01SbVqEwful31YN3qo7MA5/c9dkKGp1eec++UiE1 j+svhvo3uiiF8qawwDkB65opqU0SMabTaxx3RXP5tenu2RVJrFwl1+iyC9x6dwWFjqOM PwOA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:in-reply-to:references:mime-version:date :message-id:subject:to:cc; bh=mK0Acq87xcSEW36HuYS32af9gwy0+qT7exKt4ajYEr8=; b=n2udaSeJb9Nl2M9hcvKfp6PCKCGxh4hiT+tfV0q7KfBe7jVdSqevRs5VOCv0uLFoZE K5VMMkNKVOki+JpLTMxoKR3DBhHDecX0VIsFs5Uo6uJBU8hQ8W3WQ1wVC8Cy8SVtMvGX oWwpxy6aDKgb2y5+UA1VMGVWaRGJC0R2jmzSxgi18lRLzbuZtxOJF5bvxwH0R1ZwjwWq wudjz5o10hYf0wfnq86nHOKcoML9TuDiVqKRu/OG7TfphM8CGilkbsXvsEGdTxwjUWOX D9lK34SGtSRD/1JWkunf2r5CO1ikNRci4Et+NhoEplgEidCjuSdqoIr+5bxPBKXXUJgU sGdQ==
X-Gm-Message-State: APjAAAXoHPXDNqJur3NOzvzrhryEghRu15riNSfUBWLOOvL4rTrvHw29 nd5HxEc1yGs8sM+axQnDrZpIEyHt0AtSkrqA4mI=
X-Google-Smtp-Source: APXvYqz+c4a+cBJnAlYNuFA1G+sbwU5I5Y0bt0ACsZ5lpgBBxkz38NgfQmT9XCJKYj3E1XFcLV+pFTZUWjC/37lwqSU=
X-Received: by 2002:a05:6830:1103:: with SMTP id w3mr217091otq.28.1554304937692; Wed, 03 Apr 2019 08:22:17 -0700 (PDT)
Received: from 1058052472880 named unknown by gmailapi.google.com with HTTPREST; Wed, 3 Apr 2019 08:22:16 -0700
From: Alvaro Retana <aretana.ietf@gmail.com>
In-Reply-To: <SN6PR11MB2845B881F9911DE0745EF259C15D0@SN6PR11MB2845.namprd11.prod.outlook.com>
References: <CAMMESsw-8R=+K7CH-rkZVWXXYTA_iNXLG2SVJexCUs7g795Jdw@mail.gmail.com> <SN6PR11MB28459C76158F5E7832107FCAC1710@SN6PR11MB2845.namprd11.prod.outlook.com> <SN6PR11MB2845BD0B75C5EEEC9E53DEF6C14D0@SN6PR11MB2845.namprd11.prod.outlook.com> <CAMMESszf7POyp92Bpeb--Z4UgQ_7QJ0UWyyOjOTqphEfN2SeOQ@mail.gmail.com> <SN6PR11MB2845B881F9911DE0745EF259C15D0@SN6PR11MB2845.namprd11.prod.outlook.com>
MIME-Version: 1.0
Date: Wed, 03 Apr 2019 08:22:16 -0700
Message-ID: <CAMMESsyWt051WnH+avo_Q18Z0yb+0q33_x1W4zuXkB+rv51b-A@mail.gmail.com>
To: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
Cc: Hares Susan <shares@ndzh.com>, "idr-chairs@ietf.org" <idr-chairs@ietf.org>, "draft-ietf-idr-bgpls-segment-routing-epe@ietf.org" <draft-ietf-idr-bgpls-segment-routing-epe@ietf.org>, "idr@ietf.org" <idr@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000af12980585a1d144"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/Y56muiAWoHAzLLC05NPw6mMeyFk>
Subject: Re: [Idr] AD Review of draft-ietf-idr-bgpls-segment-routing-epe-17
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Apr 2019 15:22:21 -0000
On March 24, 2019 at 11:43:02 AM, Ketan Talaulikar (ketant) ( ketant@cisco.com) wrote: Ketan: Hi! Thanks for your work on this document! I still have a couple of comments, specially related to Manageability/Security…and a couple of new nits. I am starting the IETF LC as I think these can be addressed with any other incoming comments. Thanks! Alvaro. ... 316 o Member-ASN, which contains the ASN of the confederation member, if 317 BGP confederations are used, of the local BGP node. [major] This description matches the definition of the TLV (§4.1), but it also matches the description of the ASN descriptor in §4.2. What is the difference? What if the contents are different? [Same question applies below.] [KT] With ref to rfc5065, in the case of confederations, the TLV 512 carries the AS Confederation Identifier while the TLV 517 carries the Member-AS Number. I’ve fixed the terminologies to more accurately reflect those from rfc5065 and also included additional reference to rfc5056 in TLV 512 use description. Ok. I think we may need a reference to rfc7752 when TLV 512 is mentioned because that is where it is defined. ... 860 9. Manageability Considerations ... 868 Specifically, the malformed NLRI attribute tests for syntactic checks 869 in the Fault Management section of [RFC7752] now apply to the TLVs 870 for the BGP-LS NLRI TLVs defined in this document. The semantic or 871 content checking for the TLVs specified in this document and their 872 association with the BGP-LS NLRI types or their associated BGP-LS 873 Attributes is left to the consumer of the BGP-LS information (e.g. an 874 application or a controller) and not the BGP protocol. [nit] s/the malformed NLRI attribute tests/the malformed attribute tests [KT] Fixed to read “Link-State NLRI and BGP-LS Attribute” rfc7752 doesn’t cover the NLRI in the Fault Management section. ... [minor] "...retrieving this information...over a BGP-LS session, via some APIs or a data model (refer Section 1 and 2 of [RFC7752])." I think that even mentioning that an API or data model can be used instead of BGP-LS is a stretch -- that is not how I interpret the initial sections in rfc7752 (which are just background sections), and there are no formal API/data model definition. [KT] How else would Alto Server or a PCE component get access to the BGP-LS information? There would be some APIs or a model. It may not be formal but there needs to be one? We talked about this (rfc7752 refers to BGP-LS) while in Prague. [major] "...an error detected in the NLRI descriptor TLVs would result in that specific NLRI update being unusable and hence its update to be discarded along with an error log." According to rfc7752, this statement is true only for syntactic errors, not semantic ones. [KT] This is about the TLV validation by the consumer – which can also perform semantic checks. This aspect is one that needs clarification in the fault management section of RFC7752. The text on validation by consumer was added to this draft to prevent gating it on this gap in RFC7752. I rather that is addressed in rfc7752bis. I think that the new text at the end of this section covers enough. Semantic errors ("left to the consumer", as mentioned above) means that the BGP-LS session can be used to transport trash (trash-in-trash-out). This issue is bigger than this document -- but (because we don't have a current solution) I would like to see it mentioned somewhere as a potential issue (maybe in the Management or Security Considerations sections, your choice). [major] "...an error detected in the NLRI descriptor TLVs would result in that specific NLRI update being unusable and hence its update to be discarded..." This text says that an error in a TLV results in the whole update (not just the TLV or the BGL-LS attribute) being discarded. This action goes beyond what is specified in rfc7752, which doesn't really specify what do to in those cases. If that is what is expected here, then please make this behavior more prominent...use Normative language, etc.. [KT] I agree. As mentioned above, this was an interim text as mentioned above. I am open to suggestions. My concern is that multiple BGP-LS extensions don’t need to do this and I would rather have the normative language in an update to RFC7752. Agreed — as we discussed in Prague. Same comment as above. ... ... 895 BGP Peering Segments are associated with the normal BGP routing 896 peering sessions. However, the BGP peering information along with 897 these Peering Segments themselves are advertised via a distinct BGP- 898 LS peering session. It is expected that this isolation as described 899 in [RFC7752] is followed when advertising BGP peering topology 900 information via BGP-LS. [major] rfc7752 doesn't talk about this type of isolation (it only talks about isolation through dedicated RRs). See also comment in the Security Considerations section related to isolation. [KT] Agree – this is the outcome of the discussions in the IDR WG and shepherd review. Ideally this should have been captured in RFC7752 and not individual extension documents. Right. The major point was that the reference to rfc7752 is misleading because this type of isolation is not discussed there. ... [major] "...precaution is necessary to ensure that the BGP peering information collected via BGP-LS is limited to specific controllers or applications..." This sounds as if you're referring to information that (once collected) can be shared between controllers -- I think that case is out of scope. [KT] Actually the intention here is to highlight that since EPE can be used to engineer the path out of a domain at the BGP router, this information about the EPE SIDs should be maintained in a secure manner. The knowledge of EPE SIDs may be used to influence traffic flows both within and egressing outside the domain. If you still think this is out of scope and should be taken out then I will do so. I think it is. The SR Architecture already talks about the use inside a domain…so I think that could be opening a can of worms with this that we really don’t want to open. ... §1: [nit] s/Link State NLRI/Link-State NLRI §3: [nit] s/his section/This section [nit]: The length in Figure 2 is not needed.
- [Idr] AD Review of draft-ietf-idr-bgpls-segment-r… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgpls-segme… Ketan Talaulikar (ketant)
- Re: [Idr] AD Review of draft-ietf-idr-bgpls-segme… Ketan Talaulikar (ketant)
- Re: [Idr] AD Review of draft-ietf-idr-bgpls-segme… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgpls-segme… Ketan Talaulikar (ketant)
- Re: [Idr] AD Review of draft-ietf-idr-bgpls-segme… Alvaro Retana
- Re: [Idr] AD Review of draft-ietf-idr-bgpls-segme… Ketan Talaulikar (ketant)