Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

Igor Malyushkin <gmalyushkin@gmail.com> Fri, 26 August 2022 22:47 UTC

Return-Path: <gmalyushkin@gmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D7BD5C14F747 for <idr@ietfa.amsl.com>; Fri, 26 Aug 2022 15:47:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.896
X-Spam-Level: **
X-Spam-Status: No, score=2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, GB_SUMOF=5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F-HZsUlx5dj5 for <idr@ietfa.amsl.com>; Fri, 26 Aug 2022 15:47:17 -0700 (PDT)
Received: from mail-io1-xd2a.google.com (mail-io1-xd2a.google.com [IPv6:2607:f8b0:4864:20::d2a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D6CA8C14F72A for <idr@ietf.org>; Fri, 26 Aug 2022 15:47:17 -0700 (PDT)
Received: by mail-io1-xd2a.google.com with SMTP id 62so2315341iov.5 for <idr@ietf.org>; Fri, 26 Aug 2022 15:47:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc; bh=IOZxjFQuMjBal0RdakIZ3VGu4kkzUyTGcTbutBYxURE=; b=dcK2xvYskcoTn34fMKZxPvG/4DDe6209tCixIpaC0jWuHqU+y9qMfKE2aR3RZd6tFU JEPlEE3H1kj1RrKkiAAPPTXSPJ5b4FhbmonHRj7r3dYZLbeyFK//u+BN0cOvl9H7o6hK smBbUpLgnNz/zYRzdhes+gMWcSkLTH4CyEdw1qGK0cHn8bKqPO7eYrVZFizHy4+vbVaf uM3iqrn5JjOdsrMp1EkZ/aITQqe5CgnvXotly//0IuUsGqsBDdI/hqcXDEpb4T3zfLCA 9/8AdIEhGzX8obVmZLMCdU/G5S77mN0B5joLpvIjYifdUlGgZIbjIsSBdMT5mI+Ajckr xqMQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc; bh=IOZxjFQuMjBal0RdakIZ3VGu4kkzUyTGcTbutBYxURE=; b=1UNOZMIRdL7gZCcPrRCW8jklptqUIWH9AG/JE5fZx8qxGbONfLQNf9zCm2kA2SjQKd uh6uwWZ335vQ/1vItaRf3ncXPNW1GtlE570ERY1/l2lnJnJl2eP1FkG3GR0w+/dHZg/G mKmvKiuLAhASdl7/6nsAu26BcaptFIF+RmvSPzrtGY+gJ+vmSv6CjkrxQw/Ayu3kzpt1 YhhkPQjccL9RCUqy22uZo+JWyTzJvwgPQJbvtzQ9cOk10saJIPOGKA6t6bDQrcPry3Ym 8SnxQUgzYwcMXdIG+V6gubvZOKlZiXeLkGFdnil3gme0tGrDLEy6Mi22EIrAwv16COZE uVQQ==
X-Gm-Message-State: ACgBeo3wWmpFz/BVfFq3GIwgHcZJbBjJ/jmgXXi2qbcd4p2/MOkJpySS 3MBE2TRiHEyFR+JePoXOpeCz2ENIy9gBUcNq2QY=
X-Google-Smtp-Source: AA6agR4YUkARdshbeoVvucpGOj4nRxiI05/UdIM6vG/gwiypT2N8GzAD+u/9yJ6U06lqOAy1ZuW0FjsR1BJo/C2bVvw=
X-Received: by 2002:a05:6638:130f:b0:346:b950:cef4 with SMTP id r15-20020a056638130f00b00346b950cef4mr5152005jad.59.1661554036739; Fri, 26 Aug 2022 15:47:16 -0700 (PDT)
MIME-Version: 1.0
References: <CAEfhRrwx+5fh7zx_GPP_v=eq-cuVLW1vyqZpSaKxR=X1haMvyw@mail.gmail.com> <E7E17569-8F37-4A77-87D9-F9825F63AD41@tsinghua.org.cn>
In-Reply-To: <E7E17569-8F37-4A77-87D9-F9825F63AD41@tsinghua.org.cn>
From: Igor Malyushkin <gmalyushkin@gmail.com>
Date: Sat, 27 Aug 2022 00:47:04 +0200
Message-ID: <CAEfhRrzM6_c7OjEmuD4e1owk2ndKx8o0HaR1LpHNj485KiY9Cg@mail.gmail.com>
To: Aijun Wang <wangaijun@tsinghua.org.cn>
Cc: Wei Wang <weiwang94@foxmail.com>, Susan Hares <shares@ndzh.com>, "idr@ietf. org" <idr@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000022933805e72cb2bc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/bKpVnftUWBWWCrGG6Y7kU-omiBU>
Subject: Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Aug 2022 22:47:19 -0000

Hi Aijun,

Thanks for a more detailed explanation. It is really helpful.

Imagine that we have several sources and quotas for them on a destination
PE (DUT). Let's say these quotas are slightly bigger than the actual number
of received routes from every source PE. Also, we have a VRF prefix limit,
which is more than the sum of these quotas (we need to accommodate some
routes from local CEs). At this moment everything is ok. Then some source
PE accidentally sends more routes (for an unknown reason, we identify such
PEs as rogues, thanks for the term!). The number of routes from this rogue
PE is more than its quota on DUT, but less than the difference between the
actual routes inside the VRF of DUT and the VRF prefix limit. In the other
words, we have a space for these routes and we can install them, but we
will drop them. This example shows us that careful calculation and setting
of these quotas are required. As it was previously stated in this thread by
the authors of the draft the situation when someone needs to use these
quotas is exceptional rather than usual. I worry that just setting some
default values for the quotas is dangerous. Thus, we have some operation
burden (lots of new limits that should be carefully selected). Also, I
still don't understand how increasing the number of PEs in a VPN does not
require the renumbering of the quotas` values on every PE of this VPN. It
is also an extra burden (not everybody has a management tool or something
for that).

So, in the end, my question is why we can't stop receiving all routes for
VRF when its prefix limit is reached.  It doesn't require identifying any
source (but requires identifying a VPN), and it doesn't require some quotas
setting. VRF prefix limit is widely used and does not require some extra
configuration.

сб, 27 авг. 2022 г. в 00:09, Aijun Wang <wangaijun@tsinghua.org.cn>:

> Hi, Igor:
>
> If every source behavior normally, there will be no VRF limit exceeds, the
> operator will allocate enough value on the receiving device to accommodate
> the necessary routes.
> The aim of the VPN Prefixes ORF mechanism is to present the side effect
> from the rogue PE.
> In such case, we should identify which source PE or source VRF introduce
> the overwhelming VPN routes(via the predefined Qutoa), then push back only
> these overflowed routes.
> Other routes via the same BGP sessions on the receiving device will not be
> influenced.
> Wish the above explanations can give you more helpful to get the essence
> of this proposal, and also glad to know more of  your suggestions.
>
> Aijun Wang
> China Telecom
>
> On Aug 26, 2022, at 20:03, Igor Malyushkin <gmalyushkin@gmail.com> wrote:
>
> 
> Hi Aijun,
>
> Thanks for the quick response!
> VRF limit does not prevent a receiving router from parsing updates, yes.
> Is my understanding correct that it is the main problem that your draft
> tries to solve?
> Quoting this text I tried to say that it is enough to say other routers to
> push back (with VPN Prefixes ORF for sure) when the VRF limit is reached.
> No need to split the VRF limit further on any quotas.
>
> пт, 26 авг. 2022 г. в 13:55, Aijun Wang <wangaijun@tsinghua.org.cn>:
>
>> Hi, Igor:
>>
>> What you quoted has stated the VRF Limit mechanism is not enough to
>> alleviate the receiving router from parsing the overflowed BGP updates.
>> We need to push back theses overflowed routes via the VPN Prefixes ORFF
>> mechanism, which needs the quota to judge which VPN routes breaks its
>> threshold.
>> Wish the above explanation can help you get the key motivation of this
>> draft.
>>
>> Aijun Wang
>> China Telecom
>>
>> On Aug 26, 2022, at 19:05, Igor Malyushkin <gmalyushkin@gmail.com> wrote:
>>
>> 
>> Hi Wei,
>>
>> Thanks for your comments.
>>
>> It seems we are going around the same point again and again. I understand
>> what quota gives us, but I don't think that it is necessary (or mandatory)
>> and that it should be a core feature of your solution.
>> Neither draft-wang-idr-vpn-routes-control-analysis
>> nor draft-wang-idr-vpn-prefix-orf gives us a good motivation for that
>> (please point me to it if I'm wrong).
>> Let me quote draft-wang-idr-vpn-prefix-orf:
>>
>> 5) Configure the Maximum Prefix for each VRF on edge nodes
>>
>>  When a VRF overflows, it stops the import of routes and log the extra
>>    VPN routes into its RIB.  However, PEs still need to parse the BGP
>>    updates.  These processes will cost CPU cycles and further burden the
>>    overflowing PE.
>>
>> It does not matter for what reason a VRF`s prefix limit has been
>> overflowed (at least I don't see any discussion in the documents about it).
>> All we need in this case is to stop receiving routes into this VRF
>> whatever the source of them. Maybe it is possible to describe two options
>> in your draft? One is based on the VRF prefix limit solely and another is
>> for its slicing by source PEs (as you see it). The first is mandatory.
>>
>>
>> пт, 26 авг. 2022 г. в 04:27, Wei Wang <weiwang94@foxmail.com>:
>>
>>> Hi Igor,
>>>     We think the quota value should be set based on the resouce limit of
>>> the receiver device and the number of route sources(PEs) within the same
>>> VPN. The aim of the quota is to ensure the resouce is shared/used properly
>>> among the sources.
>>>     The quota value usually be set much higher than PE-CE limit. It will
>>> certainly have enough margin to accomodate the possible future expansion
>>> and need no shrink when one or some the PEs are taken out of the VPN.
>>>
>>> Best Regards,
>>> Wei
>>> ------------------ Original ------------------
>>> *From:* "Igor Malyushkin" <gmalyushkin@gmail.com>;
>>> *Date:* Thu, Aug 25, 2022 05:30 PM
>>> *To:* "Aijun Wang"<wangaijun@tsinghua.org.cn>;
>>> *Cc:* "Robert Raszuk"<robert@raszuk.net>;"Wanghaibo
>>> (Rainsword)"<rainsword.wang=40huawei.com@dmarc.ietf.org>;"Susan Hares"<
>>> shares@ndzh.com>;"idr@ietf. org"<idr@ietf.org>;
>>> *Subject:* Re: [Idr] Adoption and IPR call for
>>> draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)
>>>
>>> Hi Aijun,
>>>
>>> Thanks for the comments, please see the inline below.
>>>
>>> чт, 25 авг. 2022 г. в 08:30, Aijun Wang <wangaijun@tsinghua.org.cn>:
>>>
>>>> Hi, Igor:
>>>>
>>>>
>>>>
>>>> The setting of quota value is the matter of management issue, and
>>>> should be decoupled from the control plane.
>>>>
>>> [IM] From my point of you in your specification, this is the only option.
>>>
>>>> If you select to let the source PEs advertise such value, it is
>>>> possible that they change it along with their overflow VPN routes.
>>>>
>>> [IM] Well, if the limit between a source and destination PEs should be
>>> linked as you are suggesting, increasing some value for one VRF cannot be
>>> made without of review other VRFs among a common VPN. No matter if the
>>> limit is set manually on a destination PE or dynamically synced from a
>>> source. A network design should be consistent.
>>>
>>>> And from the POV of the receiver PE, before you setting the prefix
>>>> limit under each VRF, you should have the well estimated quota/value from
>>>> each PE or each VRF.
>>>>
>>> [IM] That is where we do not agree with each other. From my perspective,
>>> if we are talking about local PE protection then setting a limit under a
>>> VRF is a matter of the number of all VRFs under the PE and some memory
>>> limits of the PE. And the VRF limit, in this case, does not be the same as
>>> the sum of all incoming routes, it can be slightly bigger. If we see
>>> warnings (say, we've just exceeded 80%) we are considering increasing this
>>> value (if the memory limit allows it) or updating the hardware. Your
>>> suggestion requires reviewing the limits for all VRFs every time we add or
>>> remove a VRF-PE pair (not to mention configuring of these limits). And at
>>> the end of the day, you actually reach the same local memory limit. I want
>>> to remember that the solution you are suggesting actually does not depend
>>> on how we set the prefix limit for the VRF. When it is reached we just
>>> signal to stop sending.
>>>
>>>> As stated before, in most of the situation, the per <PE> or per <RD,
>>>> PE> quota will be the same value, the operator will not let the design of
>>>> its network too complex to operate, but the standard should provide the
>>>> finer control capabilities.
>>>>
>>>  [IM] I believe the standard should provide finer control for a reason.
>>> Let's imagine that without these quotas the solution will not work, but it
>>> will.
>>>
>>>>  This is same as the usage of RD within the network. There is no
>>>> scenario that the operator to allocate different RDs for one VPN on the
>>>> same PE. What we often do is that we allocate different RDs for the same
>>>> VPN on different PEs. Then RD is the right value to distinguish the VPNs on
>>>> one PE.
>>>>
>>>  [IM] All I wanted is to point to the authors that from the parent
>>> standards POV an RD is not a unique ID for a VRF (under a single PE). Some
>>> scenarios may emerge in the future.
>>>
>>>>
>>>>
>>>>
>>>>
>>>> Best Regards
>>>>
>>>>
>>>>
>>>> Aijun Wang
>>>>
>>>> China Telecom
>>>>
>>>>
>>>>
>>>> *From:* idr-bounces@ietf.org <idr-bounces@ietf.org> *On Behalf Of *Igor
>>>> Malyushkin
>>>> *Sent:* Thursday, August 25, 2022 3:14 AM
>>>> *To:* Robert Raszuk <robert@raszuk.net>
>>>> *Cc:* Wanghaibo (Rainsword) <rainsword.wang=40huawei.com@dmarc.ietf.org>;
>>>> Susan Hares <shares@ndzh.com>; idr@ietf.org
>>>> *Subject:* Re: [Idr] Adoption and IPR call for
>>>> draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)
>>>>
>>>>
>>>>
>>>> For sure it is design-depended. If every VRF has its own RT it will
>>>> work. But I think if we have a mechanism that allows us to attach several
>>>> RTs to a route we are in a trouble. Guys are just typing to cover this case.
>>>>
>>>>
>>>>
>>>> If we talk in general about a whole solution I also think that the way
>>>> with the new AFI/SAFI is much better. I also don't understand the benefits
>>>> behind quotas per VRF-PE pair, but if it is really worth the time I expect
>>>> to see the propagation of these quotas from source PEs instead of a manual
>>>> configuration. I think it can be easily introduced into a solution with the
>>>> new AFI/SAFI.
>>>>
>>>>
>>>>
>>>> ср, 24 авг. 2022 г. в 21:05, Robert Raszuk <robert@raszuk.net>:
>>>>
>>>> Igor,
>>>>
>>>>
>>>>
>>>> RT can uniquely distinguish src vrf. It is simply a matter of
>>>> proper configuration. No ned protocol extension is required.
>>>>
>>>>
>>>>
>>>> Thx,
>>>>
>>>> R.
>>>>
>>>>
>>>>
>>>> On Wed, Aug 24, 2022 at 9:03 PM Igor Malyushkin <gmalyushkin@gmail.com>
>>>> wrote:
>>>>
>>>> Hi Haibo,
>>>>
>>>>
>>>>
>>>> 2) It is unpractical to set the quota value for <RT>, or <RT, PE> under
>>>> VRF, because RT can't uniquely distinguish one VRF on one PE.
>>>>
>>>> What if a VRF has several RDs for its routes? RFC4364 and RFC4659 don't
>>>> restrict this behavior and even more, it explicitly describes it. So, RD
>>>> also can't uniquely distinguish one VRF. Looks like we need a different
>>>> marker for all routes belonging to the same source VRF. Say, VPN ID
>>>> community or something like that.
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> ср, 24 авг. 2022 г. в 18:26, Wanghaibo (Rainsword) <rainsword.wang=
>>>> 40huawei.com@dmarc.ietf.org>:
>>>>
>>>> Hi Sue and WG,
>>>>
>>>>
>>>>
>>>> I support this adoption.
>>>>
>>>> This draft proposes the mechanism to control the overflow of VPN routes
>>>> within one VRF from influencing other VPNs on the same device
>>>> automatically.
>>>>
>>>>
>>>>
>>>> The updated contents have accommodated the suggestions and addressed
>>>> the comments raised within the WG discussions. Some additional concerns can
>>>> be addressed after the adoption.
>>>>
>>>>
>>>>
>>>> I am not aware of any undisclosed IPR to this draft.
>>>>
>>>>
>>>>
>>>> To make the actual progress of this draft, we should avoid to discuss
>>>> the solved points back and forth. For example, RTC mechanism is not
>>>> suitable for the scenarios that described in this adoption draft, because:
>>>>
>>>> 1) RTC has no any automatic detection mechanism to determine which RT
>>>> should be withdrawn now.
>>>>
>>>> 2) It is unpractical to set the quota value for <RT>, or <RT, PE> under
>>>> VRF, because RT can't uniquely distinguish one VRF on one PE.
>>>>
>>>> 3) It is dangerous to propagate the RT based filter rule
>>>> unconditionally in the intra-domain or inter-domain wide, as that done in
>>>> current RTC mechanism.
>>>>
>>>>
>>>>
>>>> The conclusion, RTC is not the right direction to accomplish the goal.
>>>>
>>>>
>>>>
>>>> Regards,
>>>>
>>>> Haibo
>>>>
>>>>
>>>>
>>>> *From:* Idr [mailto:idr-bounces@ietf.org <idr-bounces@ietf.org>] *On
>>>> Behalf Of *Susan Hares
>>>> *Sent:* Tuesday, August 16, 2022 11:56 PM
>>>> *To:* idr@ietf.org
>>>> *Subject:* [Idr] Adoption and IPR call for
>>>> draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)
>>>>
>>>>
>>>>
>>>> This begins a 2 week WG Adoption call for
>>>> draft-wang-idr-vpn-prefix-orf-03.txt
>>>>
>>>> https://datatracker.ietf.org/doc/draft-wang-idr-vpn-prefix-orf/
>>>>
>>>>
>>>>
>>>> The authors believe that they have addressed the concerns raised in
>>>>
>>>> the previous 2 WG adoption calls.
>>>>
>>>>
>>>>
>>>> The WG should consider if:
>>>>
>>>>
>>>>
>>>> 1) The revised text answers the previous concerns regarding
>>>>
>>>> the scope of this draft?
>>>>
>>>>
>>>>
>>>> 2) Does the revised text provide a useful function for
>>>>
>>>> networks?
>>>>
>>>>
>>>>
>>>> 3) Are there any additional concerns regarding the new text?
>>>>
>>>>
>>>>
>>>> Each of the authors should send an IPR statement for
>>>>
>>>> this version of the draft.
>>>>
>>>>
>>>>
>>>> The adoption call was moved to 8/29 to 8/30 to allow questions
>>>>
>>>> to be asked at the IDR interim meeting on 8/29/2022 (10am – 12pm EDT).
>>>>
>>>>
>>>>
>>>> Cheers, Sue Hares
>>>>
>>>> _______________________________________________
>>>> Idr mailing list
>>>> Idr@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/idr
>>>>
>>>> _______________________________________________
>>>> Idr mailing list
>>>> Idr@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/idr
>>>>
>>>>