Re: [Idr] RFC 4684 pedantry - routes with no Route Target

"Dongjie (Jimmy)" <jie.dong@huawei.com> Mon, 16 June 2014 03:51 UTC

Return-Path: <jie.dong@huawei.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB62D1B2BF1 for <idr@ietfa.amsl.com>; Sun, 15 Jun 2014 20:51:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.852
X-Spam-Level:
X-Spam-Status: No, score=-4.852 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tSUG4aIdhDLz for <idr@ietfa.amsl.com>; Sun, 15 Jun 2014 20:51:41 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9CC991B29A8 for <idr@ietf.org>; Sun, 15 Jun 2014 20:51:40 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml405-hub.china.huawei.com) ([172.18.7.190]) by lhrrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BIL33657; Mon, 16 Jun 2014 03:51:38 +0000 (GMT)
Received: from NKGEML404-HUB.china.huawei.com (10.98.56.35) by lhreml405-hub.china.huawei.com (10.201.5.242) with Microsoft SMTP Server (TLS) id 14.3.158.1; Mon, 16 Jun 2014 04:51:38 +0100
Received: from NKGEML512-MBX.china.huawei.com ([169.254.7.68]) by nkgeml404-hub.china.huawei.com ([10.98.56.35]) with mapi id 14.03.0158.001; Mon, 16 Jun 2014 11:51:34 +0800
From: "Dongjie (Jimmy)" <jie.dong@huawei.com>
To: Jeffrey Haas <jhaas@pfrc.org>, Robert Raszuk <robert@raszuk.net>
Thread-Topic: [Idr] RFC 4684 pedantry - routes with no Route Target
Thread-Index: AQHPdQhfSdt6mgQZTkKmeoaf0TXRm5tKsR4AgAAETYCAAACwgIAAAgWAgBZCFoCAEkASsA==
Date: Mon, 16 Jun 2014 03:51:33 +0000
Message-ID: <76CD132C3ADEF848BD84D028D243C9273367B9FE@nkgeml512-mbx.china.huawei.com>
References: <20140521124753.GC5675@pfrc> <8540.1400685704@erosen-lnx> <CA+b+ERnwBqV8zgeSju_KiMEw_mnfOca8ZSiAuzMZt_U=Dd-r+g@mail.gmail.com> <20140521163621.GF9789@pfrc> <CA+b+ER=JoyPF9wFnFPUOA+4edJNshEjmv2OJY8tcM7KCaNQwSw@mail.gmail.com> <CA+b+ER=fuEMz-axYMma7Bw1cq-ddRS-23kM4uSbQwJNzLiDY7w@mail.gmail.com> <20140604204017.GB13606@pfrc>
In-Reply-To: <20140604204017.GB13606@pfrc>
Accept-Language: en-US, zh-CN
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.111.96.76]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: http://mailarchive.ietf.org/arch/msg/idr/abiPDCqR1_3C6ckAckPj6A7twjc
Cc: idr wg <idr@ietf.org>, "erosen@cisco.com" <erosen@cisco.com>
Subject: Re: [Idr] RFC 4684 pedantry - routes with no Route Target
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Jun 2014 03:51:42 -0000

Hi Jeff, 

> This suggests the behavior we want may be:
> - Permit a per-peer, per-AFI/SAFI knob to enable/disable RT-C processing.
>   JUNOS, e.g., filters VPN families by default.

Agree that this way we can solve some problem without modifying the RTC protocol, a.k.a backward compatibility is maintained.

> - Provide for exceptions to the rule and document them.
> That second point covers the MDT scenario.  It also suggests that IDR should
> probably make sure the other WGs using BGP as a transport for their VPNs or
> otherwise using RTs should be reminded that RT-C exists and their extensions
> had best document their interaction with it if they inconsistently RT tag their
> routes.

Fully agree that for different VPNs which may use RTC, the possible interaction and extensions should be documented somewhere. Then RFC 4684 may need to be updated by many newly defined VPN specifications.

This reminds me of the MP-BGP (RFC 4760), which keeps stable while can support lots of new VPNs. I'm thinking whether we should make RTC a scalable and stable mechanism in a similar way.

Thoughts?

Best regards,
Jie