Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

Robert Raszuk <robert@raszuk.net> Thu, 01 September 2022 12:49 UTC

Return-Path: <robert@raszuk.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE8F9C14F743 for <idr@ietfa.amsl.com>; Thu, 1 Sep 2022 05:49:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=raszuk.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sXQP3noYqKze for <idr@ietfa.amsl.com>; Thu, 1 Sep 2022 05:49:40 -0700 (PDT)
Received: from mail-ed1-x536.google.com (mail-ed1-x536.google.com [IPv6:2a00:1450:4864:20::536]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 45FC7C1522D3 for <idr@ietf.org>; Thu, 1 Sep 2022 05:49:40 -0700 (PDT)
Received: by mail-ed1-x536.google.com with SMTP id a36so18605532edf.5 for <idr@ietf.org>; Thu, 01 Sep 2022 05:49:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=raszuk.net; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=0nlzTuuHnX51hSMetSXo2CJTHXapCwKEjE990VjHC9s=; b=UpPhYHWB3s+wGl3eSAVLpuUey64do7JabcWRDGEIVfxyV0f/7Us7MBGPphFOrs4uDG O1xs8pFJj4zdgiO9K2nuT4O2bS3R6nyEC95tt16SRPD9cNemRG3sbLfEUeET9geSX/vw 6CFrUpw+p6WvzHGOIuZwf1nSIZSqvYY5lXR4Zb8ROtzIEBi2Axi9zl+oAmW/6J9ce7B8 UaPLpRQ2auaPUgsSpAWdoFqx+toGUkJye98SRGdqrEDijytHn8NYFJUTxZ6xfAL16pZO pfT+f3MxfshakT4GWp8CXEgSxSONe9FP7hjjZzdzh95LH0lmX/4MR7PcipLZS42eHcuM QPMw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=0nlzTuuHnX51hSMetSXo2CJTHXapCwKEjE990VjHC9s=; b=eUzUjtGeZdLjOwv/R3WxxHCTRm2WNL/LA8GpP+VvFHeaVMUn+MvrpjavzE+TNdDCZF oRmQbOb+M8foOrsbHq7Dz2vQnYmg36DdEbKuHe6uVLfOJVXCqmrUhAJPtORnSliYEZfR xEgpIMsVo/YXV27GJalLzvEBYLgUEFnAp6i0vdSSLbvmkCSEhK7BjvpI3TeojBEtdiDP oiJe9Sa52I3GCvaG4L0hSQyt6T9cCgrW+NxkJXYYpna/I0VNipOuE1qjxii89/98ksSz 4Oz4C+3xNwEgJOo97BkvGwJh2dmRuwvXmHVaEZ+dybcC0K/N2eukYZTix8eg6UlHugOa ZNDw==
X-Gm-Message-State: ACgBeo2JLfzdETQJx2ABlyoC61A5cFL/NesicF55BA7PRlxj0x1AcaWC 2/R55+fi/SWpBJZr1lm7ohqyQTKSWQyoxJMQhCpRUQ==
X-Google-Smtp-Source: AA6agR6c9QBaiWi3u0+QHdjF81Dxs92vyPW24NYEqbWQJLrHndb9Gbv5ajpWGr6nOo8nvkiekSa/F8yT+WHFJwDBfj8=
X-Received: by 2002:aa7:cfcb:0:b0:447:b4e5:22fb with SMTP id r11-20020aa7cfcb000000b00447b4e522fbmr27792238edy.190.1662036578682; Thu, 01 Sep 2022 05:49:38 -0700 (PDT)
MIME-Version: 1.0
References: <tencent_3C3279A3B4DAF8DA03F446E7AAE799D8AA09@qq.com> <CAEfhRrz5aAJmy2Ye1gqss2d72nm78n4SfeowO-FU7i4Z6Zpb+A@mail.gmail.com> <0CD78D4C-672F-41AA-8E1B-98CD8A875D21@pfrc.org> <CAEfhRrxkuYMmfcdX=M9PG2mN+D5fCBF5bVxd1bSA2O9PU5G-gA@mail.gmail.com> <000001d8bbba$ceb9e4b0$6c2dae10$@tsinghua.org.cn> <CAEfhRrwrKJ4A=QQBWRXtLKi-U0udv+zPuWoW0wqbeMQ2U-=JXA@mail.gmail.com> <CAOj+MMGLQ6enLxy36ZcFHh6qaCh7Ba1QFDa5XokccT7wvvU_fg@mail.gmail.com> <010101d8bc1c$da2391e0$8e6ab5a0$@tsinghua.org.cn> <CAOj+MMGuuzLWwMbfuMd-Lu4hZiY_9QUroE9k8fiFZ_uT65aHnw@mail.gmail.com> <CABNhwV1KYddV7htnp_ijPLTV11+4iot1+LET-3ey9FXf7zBNrg@mail.gmail.com> <BY3PR05MB80812C92380A7C25A46FA97AC7799@BY3PR05MB8081.namprd05.prod.outlook.com> <5364E604-6320-40BF-8E37-7D2497980EAC@pfrc.org> <CAOj+MMEqy=phzLzONcWvWUx_JUd=B9cnXS2mhGxFszdoYDVyrA@mail.gmail.com> <6C7D1574-6E03-4B40-BCD4-01109687E936@pfrc.org>
In-Reply-To: <6C7D1574-6E03-4B40-BCD4-01109687E936@pfrc.org>
From: Robert Raszuk <robert@raszuk.net>
Date: Thu, 01 Sep 2022 14:49:27 +0200
Message-ID: <CAOj+MMHh51M62Pn+=0Jic_P418rdzGuBBbpQk_CFNo09aHdqmA@mail.gmail.com>
To: Jeffrey Haas <jhaas@pfrc.org>
Cc: Sue Hares <shares@ndzh.com>, idr <idr@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e05d8305e79d0b7f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/_IEMIlhoItIP-PjYKcSrBfY9sOw>
Subject: Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Sep 2022 12:49:45 -0000

Hi Jeff.

> Or even don't do rt-constrain.

No that is bad interpretation of my text. RTC is a useful optimisation, but
many years before it got implemented and deployed (many networks still do
not use it) local drop of uninterested routes is still in place and works
without any issues. Please do not extend my text to more then what was
intended to be stated.

My text said UPDATES have been sent. They are not coming again unless
session resets or refresh is sent. They were full processed at the
receiving PE. Then filter got created. If PE is still alive
nothing prevents to install such filters locally and notify NOC.

No need to send it anywhere.

With regard to negative operational impact, there already exist vendor
> features that deal with dropping excess routes in a VRF and thus have all
> of the "woe is me" problems you are wringing your hands over:
>
> https://supportportal.juniper.net/s/article/How-to-individually-limit-IPv4-and-IPv6-routes-in-a-VPN-scenario?language=en_US
>
>
> https://www.cisco.com/c/en/us/td/docs/ios/mtr/command/reference/mtr_book/mtr_01.html -
> see "maximum routes"
>
>
> https://infocenter.nokia.com/public/7750SR140R4/index.jsp?topic=%2Fcom.sr.l3%2Fhtml%2Fvprn.html&anchor=i8701838
> <https://infocenter.nokia.com/public/7750SR140R4/index.jsp?topic=/com.sr.l3/html/vprn.html&anchor=i8701838>
>
> It is already operational practice to generate an alarm when the soft and
> hard limits have been exceeded.  See documentation for each of the above.
>

And that is actually sufficient.

The operational consequences of the proposal in the VRF are NO DIFFERENT
> than an upstream CE connection prefix limit dropping a session.
>

I do not agree with this statement.

Such strategies work great if the network is under single administrative
> control.  In the absence of such single administrative control, local
> mitigation becomes something that requires consideration.
>

On that one I think if there is a missing feature across all major vendors
is per RD prefix limnit on eBGP VPNv4/v6 sessions.

Regards,
R.





>
> -- Jeff
>
>
> On Sep 1, 2022, at 4:33 AM, Robert Raszuk <robert@raszuk.net> wrote:
>
> Dear Sue & Jeff,
>
> I completely agree with you on the point below.
>
> Furthermore I would like to suggest the following text to be added to the
> shepherd's review:
>
> "The proposed functionality creates a set of filters
> after receiving and parsing BGP UPDATE messages. The document suggests that
> pushing such list of filters to upstream IBGP peer is a helpful and sound
> operation.
>
> However in practice BGP UPDATES to construct the filter have already been
> received, parsed, best path run and even import action (or its simulation)
> executed. Therefore such excessive routes can be dropped on the impacted PE
> locally without any need for upstream signalling. BGP does not resend full
> table periodically so only upon session reset or route refresh triggered
> dump the same NLRIs (with the same or possibly different paths) may arrive
> at the affected PEs. If paths are different then it is likely that
> previously sent filters in the form of <RD, RT list, NH> will not be
> effective.
>
> The VPN route local drops due to non-intersecting RTs is a very low cost
> operation and has been an integral part of BGP VPN deployments in all
> Provider Edge nodes since day one. Orders of magnitude more routes are
> being dropped on the receiving PEs then those which will be subject to
> action described as the hypothetical problem.  Such drop does not require
> running local best path nor import and can be highly optimised by local
> implementation.
>
> While dropping such excessive routes an alarm MUST be triggered to the
> operator to take action.
>
> Another advantage for local drops is that such a solution does not impact
> existing VPN connectivity. While the subject document does. Imagine the
> situation presented by one of the WG members where an existing VPN with
> 1000 routes works correctly on the receiving PE. For simplicity assume that
> those 1000 routes come from single hub src PE's VRF with one RT.
>
> So what the draft proposed when receiving even 10 excessive routes is to
> construct the filter <RD, RT, NH of src PE> and send it to Route Reflector.
> The effect of such action would be the withdrawal of all 1010 routes !
> That's a harmful and not helpful model. Instead, locally receiving PE
> can drop those 10 routes and notify NOC."
>
> Kind regards,
> Robert Raszuk
>
>
>
>
> On Thu, Sep 1, 2022 at 2:44 AM Jeffrey Haas <jhaas@pfrc.org> wrote:
>
>>
>>
>> On Aug 30, 2022, at 10:12 AM, John E Drake <
>> jdrake=40juniper.net@dmarc.ietf.org> wrote:
>> I think Robert’s approach is a much better solution to the problem and it
>> obviates the need for the subject draft.
>>
>>
>> The approach of running the procedures on the route reflector are
>> problematic for the original scenario in multiple respects:
>> - The point of measurement for the quota is the receiving VRF.
>> - The reflector would have to proxy all VRF receive policies to see if
>> the route should be applied vs. the quota.
>>
>> Never mind that many providers prefer to avoid any specific provisioning
>> of VPN behaviors on route reflectors.
>>
>> -- Jeff
>>
>>
>>
>