Re: [Idr] AD Review of draft-ietf-idr-bgp-gr-notification-13

"John G. Scudder" <jgs@juniper.net> Tue, 10 April 2018 14:29 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98277129C5D; Tue, 10 Apr 2018 07:29:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WtosSKTQQd-X; Tue, 10 Apr 2018 07:29:13 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A28F7127978; Tue, 10 Apr 2018 07:29:13 -0700 (PDT)
Received: from pps.filterd (m0108163.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w3AER76f031397; Tue, 10 Apr 2018 07:29:11 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=PPS1017; bh=QRLc/dSo1entwe/IPtSE3+DfVO1yH/w2uYphkUZi0nY=; b=v4MnPdmLXw4EJm8pTuSszLrq65N1A5wUYwt4pyWkG313d7EVcKchTZ1JjlpNMyADTnuf qXUf1xKnSL3uGmregBtHaYPqPk/W7Mef2Jn3Dh7ukXBBFVCXCiy/lveJyqhoo28WaffQ JmFW7OHumxSVQxtpEP0ZFbEzBCB7VXTvwDlmZCA3JBQ0AhZ/0GYbouHZTqh0HX1gTwKT qtJe8Xu0z/cicWgb77pi9pSywBqnLPvp6P1ULbHHYvTfVazQjDuEGQAl0IsMw575L7Q3 KDPe5wXGW+Cbc5CYaGCNIJBKHTBIrc6BQ19G0hWtRgxI1cvKYkCl5t4pbYehrwTIu9Ea vQ==
Received: from nam01-bn3-obe.outbound.protection.outlook.com (mail-bn3nam01lp0177.outbound.protection.outlook.com [216.32.180.177]) by mx0b-00273201.pphosted.com with ESMTP id 2h8wyag4yx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Tue, 10 Apr 2018 07:29:10 -0700
Received: from [172.29.36.38] (66.129.241.10) by CY1PR0501MB2073.namprd05.prod.outlook.com (2a01:111:e400:c44d::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.675.3; Tue, 10 Apr 2018 14:29:07 +0000
From: "John G. Scudder" <jgs@juniper.net>
Message-Id: <0F24B194-DF39-490A-9826-458BBACA158D@juniper.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_7539B90B-35AE-445B-8028-71C080D8BC79"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Tue, 10 Apr 2018 10:28:57 -0400
In-Reply-To: <31660_1523350345_5ACC7B49_31660_129_1_53C29892C857584299CBF5D05346208A47A05A21@OPEXCLILM21.corporate.adroot.infra.ftgroup>
Cc: "idr-chairs@ietf.org" <idr-chairs@ietf.org>, "draft-ietf-idr-bgp-gr-notification@ietf.org" <draft-ietf-idr-bgp-gr-notification@ietf.org>, "idr@ietf. org" <idr@ietf.org>, Alvaro Retana <aretana.ietf@gmail.com>
To: "bruno.decraene@orange.com" <bruno.decraene@orange.com>
References: <CAMMESszAe0avmcX0X95uOwRu29cTvbx_t7ewBwU-Hig20SD9pg@mail.gmail.com> <03AE36E3-F18B-4F34-9A6C-242AA1CAB4EC@juniper.net> <25077_1523005047_5AC73677_25077_122_1_53C29892C857584299CBF5D05346208A47A006C8@OPEXCLILM21.corporate.adroot.infra.ftgroup> <3197C941-3EBD-4BE0-B733-9C72A6B3B5FA@juniper.net> <31660_1523350345_5ACC7B49_31660_129_1_53C29892C857584299CBF5D05346208A47A05A21@OPEXCLILM21.corporate.adroot.infra.ftgroup>
X-Mailer: Apple Mail (2.3273)
X-Originating-IP: [66.129.241.10]
X-ClientProxiedBy: BN6PR2201CA0009.namprd22.prod.outlook.com (2603:10b6:405:5e::22) To CY1PR0501MB2073.namprd05.prod.outlook.com (2a01:111:e400:c44d::23)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-HT: Tenant
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(48565401081)(2017052603328)(7153060)(7193020); SRVR:CY1PR0501MB2073;
X-Microsoft-Exchange-Diagnostics: 1; CY1PR0501MB2073; 3:6Pf6YfiRKfXXafhn8w/j5rdKVzszx93jvK1yqU3MLVpQp9InmyOl37hQNwf7nj7OF1XyH6hy/NDpGbj98h1v9JE2K74WBRKPYG8mco7YSccceofvnnaJCJn29YbGswVk8WUo10Jyqctp3GXy4yme/hmWVtb8Ta9CwFz478mP89DHUNrJOLl0JsiBzzB+wnOIJQUzhjvMpKZtp6CKBcHV1Te13LHzoo0JhOmk3P6PSI8Fyzn1NZwqEpbQ/GcD7d/O; 25:u+MStWvBt8dOvKdZSDZHK4J/KJyAoT0Epb3DK/O34eiSy/bexf2RmkcdDUNi4dqzx3MQsfKnHQS0U4zreuX+h1TJ5RaQlcVRaNBGaw9AQ1r+tuBkhC1NemB9BmpeeFa4iCcrIh6svP0Q4WjI253d/+lhGdkX8OK4Qao8WNXncqwzpP3QiAj9r+0+jZI1dRtXvXNMuXNIHQwLfGfcgIoBnZvGmUPhPAJhLmUYTNzJpwXkn4mt9xAhCGJptpA9FuH9aNjLlv4VyJqbw5VezfzcG3dO8eabu4HMV8myf93xKCcBd6Gne1FVE2af1pg0C59H3IJv/3gnp+XWxOe1Jl3qhQ==; 31:PYT67cZzjX8S7EFOwVsXqT0L6DWCc0sdsrxjK2pz8lc/eYOpEDDRmp8Jx+dKXWfMrwki+EXDF2zhaz6V/l473hxEnZplAdTo3j7Ne98niz2yd+1xgagtbBrYpNJpNC1BNHN5oYZzL7nQmAQhD2cXvQW3wjvrUIJW41KLM9SQPOPrh7Awvs29NQgXmqgpG1DQ1bmqVtwcCP4Z18Y59iqQo/sAXZMXbrUils9FSGxsosg=
X-MS-TrafficTypeDiagnostic: CY1PR0501MB2073:
X-Microsoft-Exchange-Diagnostics: 1; CY1PR0501MB2073; 20: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
X-Microsoft-Antispam-PRVS: <CY1PR0501MB20732DBA0DC710167E10B984AABE0@CY1PR0501MB2073.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(138986009662008)(18271650672692)(211171220733660);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231221)(944501327)(52105095)(10201501046)(93006095)(93001095)(3002001)(6055026)(6041310)(20161123562045)(20161123558120)(20161123560045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:CY1PR0501MB2073; BCL:0; PCL:0; RULEID:; SRVR:CY1PR0501MB2073;
X-Microsoft-Exchange-Diagnostics: 1; CY1PR0501MB2073; 4:m1Ok6x2lVBZ5UeAOJPu48Q0YpzGTRZap6BGBKCC4tDxb20R1v/9x5Y5SjEaR/Ij3HftO3JWhbI6A0TVDViSVZlEPLNUBxskK0j4rX28nyKj40/hWEJk/PQWfUDUXM+AEvMAjw7LilsrPRrD+1DinU7yLi+QTMuT2Th+h9mViqbXCwF3wvKDZlHA0LttoyPzR+YgKKE6HsKh4bj4KmP+R8yN6w5xNHGb+nPH6r6p6sIuecg0fyJ8PTk3NbleQLNgfm9GTKuNOGepcOLOMcKLxWCc9dWHv1C5YVJH73iaiBht42Ya7cVDa2hBcfjRVsPCZy1HTi007BlglPVeOx+PezlMthAdRyZzRodI5/ThVQprzaP2MMSfpYH1uCKlK9ixF
X-Forefront-PRVS: 0638FD5066
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(6049001)(396003)(346002)(366004)(39380400002)(376002)(39860400002)(69234005)(199004)(189003)(93886005)(2501003)(57306001)(68736007)(16586007)(316002)(54906003)(106356001)(86362001)(386003)(345774005)(33964004)(105586002)(76176011)(5660300001)(53546011)(52116002)(59450400001)(53946003)(39060400002)(236005)(4326008)(82746002)(6246003)(2906002)(229853002)(53936002)(6916009)(5640700003)(2351001)(6666003)(6486002)(3846002)(6116002)(66066001)(15650500001)(36756003)(97736004)(478600001)(69556001)(25786009)(16576012)(33656002)(8676002)(11346002)(50226002)(26005)(446003)(186003)(956004)(83716003)(77096007)(8936002)(84326002)(2616005)(476003)(81156014)(16526019)(81166006)(486006)(7736002)(42262002)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:CY1PR0501MB2073; H:[172.29.36.38]; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
Received-SPF: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: 1; CY1PR0501MB2073; 23:LEz+IpMseCN+B57ep+MHaCqrDQhII8VinI94mGdh+PK7jNGe27m10vfYXz3XKV2o18fauEqZ+dRG9H3kUyBgqx5FGJSD95JXzSJyACZhiyIM1udIjr9T7mTJPheQDqPB5R40kAFKjTh8O6FCFHzvFTqzl5oejwG/dNq8uvgfNm9bXsN6Dpha9gXyTSF4T4aWvgd3fA/xQvHxsPcNT3FxvsMnBBEz2O3I4lE4FUi6KXz4a1UHB869K98cR/NKw6yfGQNZncZDiVhDBYmi6hCSSqDNOjs67dU+i573PUgOibz2OvzGUxGr9dJDIA27nesNQWhoAnNghviEadWIpeb84O8fkZGtzt6oPyHcsBY2Ln1qwmBwr5Q7WBgiY4CoM/rUVKBByklwnM45B3Do+oIfJgcoYowb+F0pwvmVwkOTATPpxUSwLYiiX7jODGrIw8dHFXUSeeC9et1fNktf6t+eBKYbrH6fFoQwKdrGI5mDVa39K37sBHFTRtxeo+vgHiyOzl0WRBhAZiS+T6j02IWnz/TA4Sh5p3XOeZ4ki58RXJFBvP/6gZDu8o1nZeQeA6+UoWd/QV9k2xoyRrMwBYAwDboPrKwQswUdCwWh67mEj3Xroev0CYC77ESm33dLQ7oLfcXvv1w4OmYuKfEzxI8d4I7FeDjhoBp947mfYCG+kPHRc/OSMcQecJBMTftm21cq1ZQ/HOFbeg4oW3hbI/oGrtVWDS70nb5gXYlgg9xDwADH2xqYoRM1FPrhOyQPcr+GIJEZ8lggW9NQbZBh07e/GMaovY98GY9RHeohcRdNkW5yPlWiw9s3TGenzh3qzICiTM5eJ9MUXU0Wb2X1uSGDPJ34yfmRyEH+wH2EJzuRiZX9XNZQzCq9/6pfBxOiDDyxFuHR/X8Rm/EFZQUV4kWYG6AdgwkyFyMcBJrWJJr1kNrPqURZAdlei9YHaZiNh9xCJUM0qTBqU5kYfjP25/C6NHXG+TuuOpEV7rr3WRDVlFdiQ/NAuAE5oBQwrsujKhJvrttOh5wvQCFTADAh2kE6EY8xR8CuZ0aibkJ8TwFsrrQ9Ky3EZsGTqevnGlv0bD5T95HeEEZsJq2UxVRzaVPGwwSKULzUVgeAEwdWWUdCY1g+0W9E8DvyCOnPQvoRwyysUqUsU453EwjCTGU73JQ8GqNjaHKATUyWkDhi69w1OhYgE0a7liRNjcpqgaQuPAEKRcodq9/tibRKDTx/N1HG30kPxPYFKKS5dpLubLknSfdk6Db1q6J4Aky1r0FjpPO52BbQGPKd9tayoMvBNuDvp0uMp/9aZoa+h1zBqhIP16NiqIYeIR753IJCQfB9827V6VaYD81srdOeDqm5FXtq+rNiPt6jgTK8c58vFTsw4fIecvOLQ6r0lcbEi2WT2oJZoCYdPtOxQ0JfKGfaaCcS3I0W5fPvOvM0ei2dicr35jzV+GUaZAr2hQuvFwHLKK8o1V8lUdzc+AgxrHAKiIKRwSBv0D701h+U/nZCTRIv4fp3jhy0L4nR3yEfY9QGf14XIjiui9iaqz86nD74M0OJOj2tRbXj2IGdboImqnXaCGU/NyIqDjtuljiBqqyT51MXRVVIxJAj49SP4YMy2vpTqw==
X-Microsoft-Antispam-Message-Info: QxQZkH+TDEIYa9g5in1u6Mpn5CznWMRiWji2ApZsh5EbNV2jNJwawzI+sArSBsUN5eycWum8UZbMkfuI6WyOVWhJvCXDf7saFWkKZ9HYPOtCik9Jf5H0AGM48+lQpgPxD7lq/71Q81e2EAX/iGU2iIGVCBSMGkRPF4WTRQdAzBiY73nIXj0pP0ja7z+MqR9a
X-Microsoft-Exchange-Diagnostics: 1; CY1PR0501MB2073; 6:AeFf97XAn3vNexObg4MOIp1bHtluRhlOQQVt76NBLXrr8RVToMBNSYLk+g2bQLkRwV7on/GvY71nDCRwoDbpfb1GuIhYsH99rsne3XuLP/+8NDxTbzHLoUzwsdTKPAoBluTkJxj2fRMmhoEfZoIoakRaz8Fkkr4MJaD7qU332y4CSc4ZjAmOFWX7DgbtJ7Uft9fSg/VzoAcdcCGj/OMZpaq/PfXtjGHOqIeELFRzuIQQ8oBEXcZIhoAMSwZ/AcxK/Fn9/ofnqK+uettf02AaPav0dK6JjvzH2/xId6L4IRUwvjkIaLrI30DgN/MUhEQyl9xyfDjCZLMWA1Z4OsqvkymUXoZSvDyUaBcsXV9pb09GG0oasj6rdZMt55FW/qcES6Ga2jhzPet0qpubL5ovBBzMLZc0QwSKGoR9NdTHImWh+hHKHf5Cjs943rHv6TK6+NCLKlWvEyWSDebgS4nIYA==; 5:FqIiBJaPZfg5dZJLQa6OSrRsSkrVqPjpdL8UaAfT6R/dmDRI9EAh2+LYNDXbaNKYi0ULbqWdsI2jZAH7b7xoWoijG8760KCH81mKnK75x6Qz27pneJrm+MWANGcev2UdpHbgNwNOPcebiJqwZTWHXzWbFzkSV8c+Auoxs/P4NH0=; 24:yZDbGS9wEfI4fbOow/mAM4ycczZETfLdTWICGv385+xbYsCV427nhwAT7mcPXmcIYUdrXWrlR2jOQiQFGnsB+cWtVUgALYs83jJHEVGWQBE=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; CY1PR0501MB2073; 7:Rzf3w2n2mMLsNTt7Kcrwwb1DzW5fh7pCgtelfP9LqsAyPwcz7/J0te+FUQsr4WBN/UU6sacbpzYlJv+0XQ5gRHj0G3XrRWcKthpcarRFH09aXFuwbTSWS9gV7hGV9J/u/++UQsbzbpyzDEyDtYy+tToOORUvVz/2DAztBk9jo0/gh7oU+/Og0Q1lREN5mPxE34uBlyblukOrxoxYuRb3uD4VbMEDlsBtqbJIb7ixMAaTKJZUiu9WPP/aSFTdYX5i
X-MS-Office365-Filtering-Correlation-Id: 07af6bd5-351f-4066-1355-08d59eef6bfc
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Apr 2018 14:29:07.9179 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 07af6bd5-351f-4066-1355-08d59eef6bfc
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR0501MB2073
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-04-10_05:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1804100142
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/jjb5y0NIrXAM80llJxvPWn1JAz0>
Subject: Re: [Idr] AD Review of draft-ietf-idr-bgp-gr-notification-13
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Apr 2018 14:29:18 -0000

(as co-author and WG member)

Hi Bruno,

Discussion in line below.

> On Apr 10, 2018, at 4:52 AM, bruno.decraene@orange.com wrote:
> 
> Hi John,
>  
> Thank you for the updated draft.
> In general -14 looks good to me, but I have 2 comments below, and more inline [Bruno] in your email.
>  
> 1)
> In case of Hard Reset “encapsulating” another notification, I had a comment about which Error (sub)Code is to be indicated to the network operator (e.g. in Yang, SNMP, Syslog…) I’m not seeing an answer nor clarification in the draft. (I’m not sure there is a good answer, but I’d prefer a consistent answer from all implementations)

Part of my takeaway from the comments Jeff just sent is that there are limits on how much we can specify in this document since the various management layers that might be used have different semantics and constraints. How about something like this, as a new management considerations section?

"When reporting a hard reset to network management, the error code and subcode reported MUST be CEASE, Hard Reset. If the network management layer in use permits it, the information carried in the Data portion SHOULD be reported as well." 

While it would be nice to tell the management layer that it has to report the encapsulated code and subcode in a useful, structured way, I can't see that as being in-scope for this document.
 
> 2) 
> Following the change introduced, I wish that the meaning of the N bit were slightly clarified: does it enable/disable the gr-notification capability for the subsequent/future event (à la BGP capability) or for the past one (à la GR "F" bit)? More below
>  
> §2:
> "   If a BGP speaker which previously advertised the "N" bit opens a new
>    session without advertising that bit, normal BGP Graceful Restart
>    procedures documented in [RFC4724] apply."
>   
> FYI when first reading this new sentence, I have been wondering whether this was meant as aborting the gr-notification procedures underway (a la "F" bit). Then I tough probably not. If so may be :s/apply/will apply      (or apply from this Open till the next Open; or will apply for subsequent Notification). But really up to you.
>  
> But then section 4.1 is changed with the addition of
> "The sentence "To deal with possible consecutive restarts, a route
>    (from the peer) previously marked as stale MUST be deleted" only
>    applies when the "N" bit has not been exchanged with the peer:"
>   
> Which may be understood as saying that not sending the N bit will result in aborting the gr-notification procedure.

These are good points and underscore the subtlety of the problem. You might recall that we introduced the new text and structure to deal with Alvaro's objection to the previous formulation, which said something to the effect of "if the N bit goes away, you shouldn't use that as a trigger to abort a GR in progress". As you point out, the GR capability has two functions -- to say what actions should be applied to routes from the previous session (or potentially previous sessionS in the case of this draft), and what actions should be applied at the termination of the current session. Trying to cover both of these in a way both clear and precise is proving challenging.

As a practical matter, I almost don't care about whether "a route (from the peer) previously marked as stale MUST be deleted" because the difference would only come into force if there were two or more resets in quick succession, *and* the final one removed the N bit. And even then, the difference in behaviors would necessarily be transient. So this is a very edgy edge case. 

However, of course it's still desirable to be clear, which requires us to decide what exactly we want. It seems to me that a desirable way to spec and implement is that up until the GR capability has been exchanged, sans F bit, the previous F bit based semantics should apply, and after it has been exchanged, the new semantics should apply. What this comes down to is,

- Don't try to retrospectively go back and say "oh because the previous session was reset due to a holdtime expiration, and now I don't have the F bit, I'd better act as though it had been hard reset". 
- Do apply the quoted text to any already-stale detritus of previous sessions.

Perhaps a sufficient clarifying change would be:

OLD:
   If a BGP speaker which previously advertised the "N" bit opens a new
   session without advertising that bit, normal BGP Graceful Restart
   procedures documented in [RFC4724] apply."

NEW:
   If a BGP speaker which previously advertised the "N" bit opens a new
   session without advertising that bit, normal BGP Graceful Restart
   procedures documented in [RFC4724] apply once the session has 
   transitioned into ESTABLISHED state".

Unless there's objection or more discussion I'll update the draft accordingly.

> Especially given that §4 says
> "   When such a BGP speaker has received the "N" bit from its peer, and
>    receives from that peer a BGP NOTIFICATION message other than a Hard
>    Reset, it MUST follow the rules for the Receiving Speaker mentioned
>    in Section 4.1."
>   
> While section 4.1 only explicitly covers "detects termination of the TCP session for a BGP session" which may be understood as only TCP “issues” and not the termination of the BGP session following the reception of a Notification.

Yes, as discussed above, creativity about this clause was largely what the text is trying to prevent.

> From: John G. Scudder [mailto:jgs@juniper.net <mailto:jgs@juniper.net>] 
> Sent: Friday, April 06, 2018 5:16 PM
> To: DECRAENE Bruno IMT/OLN
> Cc: idr-chairs@ietf.org <mailto:idr-chairs@ietf.org>; draft-ietf-idr-bgp-gr-notification@ietf.org <mailto:draft-ietf-idr-bgp-gr-notification@ietf.org>; idr@ietf. org; Alvaro Retana
> Subject: Re: [Idr] AD Review of draft-ietf-idr-bgp-gr-notification-13
>  
> Hi Bruno,
>  
> I've just posted a -14 which I believe addresses all comments so far (yours and Alvaro's) other than this one, for which some discussion below.
>  
> On Apr 6, 2018, at 4:57 AM, bruno.decraene@orange.com <mailto:bruno.decraene@orange.com> wrote:
>  
> Hi John,
>  
> Sorry to turn this thread into a general call for comment while the document is post WGLC…
>  
> Better now than when it gets to IETF Last Call.
>  
> When:
> 1)     a BGP session is established (OPEN1)
> 2)     then GR or draft-ietf-idr-bgp-gr-notification triggers a new BGP open (OPEN2)
> 3)     this BGP OPEN2 triggers a Notification OPEN Message Error
> 4)     draft-ietf-idr-bgp-gr-notification is used to handle this Notification using GR
>  
> It’s not crystal clear to me whether the BGP speakers should behave (in term of OPEN capability/parameters) as per OPEN1 or as per OPEN2.
> Indeed, OPEN2 is the latest but was erroneous and explicitly refused.
> Then again, the answer may be subcode specific… (with “Unacceptable Hold Time” it’s unlikely to accept the (Hold Time) parameter(s) from OPEN2).
>  
> I think if the OPEN2 still exchanges the "N" bit it's already sufficiently specified, or maybe the point is moot.
> [Bruno] To be more specific, at step “4”, does the BGP speaker uses the GR parameters such as “Restart Time”, “GR AFI/SAFI” from OPEN1 or OPEN2? Same question for the “Forwarding State (F) » bits. Same question for parameters in LLGR capability.
> From your answer, you seem so say that the “N” bit from OPEN2 needs to be considered and taken into account. 

That wasn't what I meant to say. Rather I meant that if OPEN1 carried the N bit and OPEN2 also carries the N bit, then it's immaterial whether we're considering the N bit status of OPEN1 or OPEN2 since they're the same anyway. But if pressed, I'd say the status of OPEN1 is the one that applies. Possibly the new text I propose above (that adds "once the session has transitioned into ESTABLISHED state" is sufficient?

> I’d like this to be clarified.  
>  
> OTOH if OPEN2 doesn't exchange the "N" bit (either because it removes the GR capability entirely or because it removes the bit) then maybe there is some clarification required. Unfortunately RFC 5492 doesn't seem to say when a capability is said to have been successfully exchanged, probably because at time of writing (or at least at time of writing the predecessor) the idea of keeping around previous-session state didn't exist. 
> [Bruno] Exactly. That’s why I believe the burden to clarify/specify this falls on draft-ietf-idr-bgp-gr-notification
>  
> Tentatively, my answer is to say "a capability is only considered to have been exchanged when the session carrying it transitions to ESTABLISHED state". In the situation under discussion, that wouldn't happen, so gr-notification type semantics would continue to remain in effect.
> [Bruno] Any answer works for me. I particularly like your proposition being clear and very general. However, it seems to say that the BGP capability advertised in OPEN2 should not be considered. While in your above answer, you seem to take it into consideration (“if the OPEN2 still exchanges the "N"”)

I hope my comments above clarify this point.

[rest trimmed]

Regards,

--John