Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

王巍 <weiwang94@foxmail.com> Tue, 23 August 2022 11:39 UTC

Return-Path: <weiwang94@foxmail.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A6E1C1526E6 for <idr@ietfa.amsl.com>; Tue, 23 Aug 2022 04:39:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.079
X-Spam-Level: *
X-Spam-Status: No, score=1.079 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, HELO_DYNAMIC_IPADDR=1.951, HTML_FONT_FACE_BAD=0.001, HTML_MESSAGE=0.001, NO_FM_NAME_IP_HOSTN=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RDNS_DYNAMIC=0.982, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=foxmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0r-wtdvCa1yg for <idr@ietfa.amsl.com>; Tue, 23 Aug 2022 04:39:08 -0700 (PDT)
Received: from out162-62-57-252.mail.qq.com (out162-62-57-252.mail.qq.com [162.62.57.252]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3643C14CF1F for <idr@ietf.org>; Tue, 23 Aug 2022 04:39:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=foxmail.com; s=s201512; t=1661254743; bh=f5pZnz5s5KBKCVZ/KXbpluGKzcwu5jKKkun44Ne3rHo=; h=In-Reply-To:References:From:To:Cc:Subject:Date; b=nmc6i56cPxQ35sP4b2PVHl0wONc/E7nwgEyc3fXPQ42Wnm3pX4vhhI+Wicv2rkgAV em00L36u4v49272bxyHNaHvOMBT22jZFyNqLduQIIAuY9QoSkUc7yntK0DrW342XD8 fBLhlW0gmSrNAe4t2qU70qqYNghniKbTIRXA3KeQ=
X-QQ-FEAT: oHWrrGTW1dCGJEu1CuC8+nIWkvSYK6n9
X-QQ-SSF: 00000000000000F0000000000000
X-QQ-XMAILINFO: MskRIaVvzOlxWU8izcbQSMkFJtBPzkkB8dP6IEy6QN/tHf1ou9mgFEeOKPL8x8 VPBehBAiFoJWLOcRxqdtcPblbKsOR0vS4pxUn99ysL2+HsXaC9iNFlIcJSDoHIfnREAeCHia0TD1x q7Hgqk5BV+Obho7EU0jKL73C5skj1wxcOzrKwDSwK5THbiW9pgrTJJjcbBTZbWI9QIacFHcBW+Aql 9t4maxuuhmlymUCerzjUtGuOfdDamOwwitZfKUG0VLxbByhmNdKRjbrHhabChhzEIwnJUKSgJyQss iGQzIWZNj/BBjzVhOaye0bGytu6yJVW0zH2019UOl95jBsilK+F04EXIvam/mRPspR7f5cBHqKjos HNfiNHo+YOhgkXgQBDB/Y/YQ+eTU4ADhMPwjzRQ0KY/wD8r+j5RaJR74omY0HMQ6TMcEVvlSJ2YC7 YUorcCBBKejEyh2F+24G1PlDlOQ9Rnx+S7KUMUsQFBZo8CLoCOj8aw5MN00RNpqtELIsTyRE0j3oy RXYjRSmPI0diYRjqvq2pDN7ugtSOFucv4doIW/9nFo8OeyVSywwgKpG5UTnfOQZin5hA3q0L/4vqN G9oiRdcjQZsLh6oQZ54HRDRS3fVJemO6mInUJkrUOckIpYDfCVOBFknCInC8+3TO6FrGBidkc6gch g3vYj0HFYMlAc/d1f+D14LtwOKZax06IJnjjUUwizWBkIp9bj8yocMJ4fFiv9Rn/g4qdbouF2efGw 2Aq8CxIswO7lqefXNkb0N0P+CSzV1wBRvIOtbYlt9HuBVqWzs+lw341XATojINXtdqHZNh7WbdJIF 1eXbEDzLkdHIh2+14zs9cQ65V436M15+O7r7PwvvHC2cm+Vac+fW6zxklCgX2UK7BMTsnMuNKAXlS xZ36I3p5bSXLSpPc6odDRy8etpG0u6rNUAFPrOuQF2sOEwp7Sj1RAPhFWyTS+cBnwMuXubRAuM=
X-HAS-ATTACH: no
X-QQ-BUSINESS-ORIGIN: 2
X-Originating-IP: 106.120.43.174
In-Reply-To: <CAOj+MMHmeSUuFy7zKBsDUECje6i-g+9e9qD2=oUkgGdcwL2fpw@mail.gmail.com>
References: <517EF247-76AF-4981-B33B-8A1707E0103B@tsinghua.org.cn> <CAOj+MMGvBKBL__Pk2AuAYWoiBkMeLW3eZkyp_GD-aXjEtZkJkw@mail.gmail.com> <007b01d8b693$92387190$b6a954b0$@tsinghua.org.cn> <CAOj+MMHmeSUuFy7zKBsDUECje6i-g+9e9qD2=oUkgGdcwL2fpw@mail.gmail.com>
X-QQ-STYLE:
X-QQ-mid: webmail812t1661254742t2246924
From: 王巍 <weiwang94@foxmail.com>
To: Robert Raszuk <robert@raszuk.net>, Aijun Wang <wangaijun@tsinghua.org.cn>
Cc: Susan Hares <shares@ndzh.com>, "idr@ietf. org" <idr@ietf.org>, Zhuangshunwan <zhuangshunwan=40huawei.com@dmarc.ietf.org>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_6304BC56_136D4540_2C7D343D"
Content-Transfer-Encoding: 8bit
Date: Tue, 23 Aug 2022 19:39:02 +0800
X-Priority: 3
Message-ID: <tencent_D185B6FFEBB1CDC5CE17B30965D645B5B40A@qq.com>
X-QQ-MIME: TCMime 1.0 by Tencent
X-Mailer: QQMail 2.x
X-QQ-Mailer: QQMail 2.x
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/kpyiOnanWvA6AytdVlMYTkjPOVI>
Subject: Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Aug 2022 11:39:12 -0000

Hi Robert,


The offending VPN routes are dropped because they pass the predefined quota threshold, it’s the similar behavior for “BGP maximum prefixes” mechanism.
Before dropping, the device can also send the alarm signal to operator.


Dropping them can assure the offending VPN routes does not affect the receiving and parsing of routes belong to other VPNs.
The updated VPN Prefixes ORF mechanism filter the routes not solely based on RD or prefix.



Best Regards,
Wei
------------------&nbsp;Original&nbsp;------------------
From:                                                                                                                        "Robert Raszuk"                                                                                    <robert@raszuk.net&gt;;
Date:&nbsp;Tue, Aug 23, 2022 04:46 PM
To:&nbsp;"Aijun Wang"<wangaijun@tsinghua.org.cn&gt;;
Cc:&nbsp;"Susan Hares"<shares@ndzh.com&gt;;"idr@ietf. org"<idr@ietf.org&gt;;"Zhuangshunwan"<zhuangshunwan=40huawei.com@dmarc.ietf.org&gt;;
Subject:&nbsp;Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)



Aijun,

&gt; Wish it can help for you to flip the page.



I recall this thread, but it did not "flip the page".&nbsp;


See dropping VPN routes when CE points default to a PE (very common case) will just result in less specific forwarding (potential loops as IBGP becomes inconsistent now) or at best silent drops at the PEs. Authors somehow forgot that it is a really bad idea and very unsafe to drop valid routes on IBGP.&nbsp;


Note that non intersecting RT based drop is safe. But not per prefix or per RD&nbsp;drops !&nbsp;


Besides if we are talking at scale to do what you are describing requires lots of real time per path per vrf stats. That's a CPU burden which is completely unnecessary.&nbsp;


&gt; And, the deny-focusing mechanism (VPN Prefixes ORF) acts differently from the allow-focus mechanism (RTC).



You missed my point.&nbsp;


While RTC today indeed expresses the list of required RTs nothing stops you to define RTC-like AF based propagation with deny semantics.&nbsp;


Thx,
Robert.




On Tue, Aug 23, 2022 at 3:56 AM Aijun Wang <wangaijun@tsinghua.org.cn&gt; wrote:


Hi, Robert:

&nbsp;

For your concerned points regarding to the ordering of path, I recommend that you review again our discussion with Jeffrey Haas on various scenarios at https://mailarchive.ietf.org/arch/msg/idr/uoQO8vqSA82UCrfXppFjwNbMg1A/. Wish it can help for you to flip the page.

&nbsp;

And, the deny-focusing mechanism (VPN Prefixes ORF) acts differently from the allow-focus mechanism (RTC). The former should be decided based on each hop itself, and should not be propagated further unconditionally, as that done in RTC mechanism. We don’t want to repeat the discussed points again.

&nbsp;

Best Regards

&nbsp;

Aijun Wang

China Telecom

&nbsp;

From: Robert Raszuk <robert@raszuk.net&gt; 
Sent: Sunday, August 21, 2022 8:00 PM
To: Aijun Wang <wangaijun@tsinghua.org.cn&gt;
Cc: Susan Hares <shares@ndzh.com&gt;; idr@ietf. org <idr@ietf.org&gt;; Zhuangshunwan <zhuangshunwan=40huawei.com@dmarc.ietf.org&gt;
Subject: Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

&nbsp;

Aijun,

&nbsp;


Actually I did read the -03 version of the draft and changes made actually make it even less attractive.&nbsp;


&nbsp;


Let's first establish what is the format of the ORF message you are proposing to advertise and when those&nbsp;optional TLVs are added ?&nbsp;


&nbsp;


Quote 1 - PE2 triggers the VPN&nbsp; Prefix ORF message (RD1, RT1, comes from PE3).


&nbsp;


Quote 2 -&nbsp;VPN Prefix ORF entry&nbsp;(RD31, RT1, RT2, comes from PE3)


&nbsp;


Your email suggest that "and global allocation(in this case, the source PE will be attached)"


&nbsp;


There is no clear and exhaustive definition when each defined TLV (Source PE or RT) needs to be added&nbsp;by the node generating this new ORF message.&nbsp;


&nbsp;


It is fascinating that you have now added a list of RTs to the spec. We argued from the beginning that a list of RTs offers a good solution for such filtering and&nbsp;RTC RFC4684 can be used instead.&nbsp;


&nbsp;


More inline ...&nbsp;


&nbsp;



#1 - RD allocation can be per VRF or Global in a given VPN. This scheme works only in the case of per VRF allocation.&nbsp;




[WAJ]The proposed mechanism works both in per VRF allocation and global allocation(in this case, the source PE will be attached)



&nbsp;


&nbsp;


How do you handle multipaths ? How do you handle anycast ? How do you determine the src PE ?&nbsp;


&nbsp;


Please observe that during import there is no ordering of paths. So when you are just about to reach the vrf prefix limit and 95% of imported routes come from PE1 suddenly the vrf prefix limit is exceeded when just a few paths arrive from PE2. Are you now going to suppress those few routes as they were unlucky and happened to exceed the prefix limit ?&nbsp;


&nbsp;


&nbsp;


#3 - Use of prefix ORF can be applied where prefix is just /64 RD without any new draft. The draft says:&nbsp;


&nbsp;


&nbsp; &nbsp;Using Address Prefix ORF to filter VPN routes need to pre-
&nbsp; &nbsp;configuration, but it is impossible to know which prefix may cause
&nbsp; &nbsp;overflow in advance.


&nbsp;


&nbsp; &nbsp; .. which clearly is not correct as irrespective on the encoding you need to know what RD to push.&nbsp;


&nbsp; &nbsp; Here in this context&nbsp;of RFC5292 PREFIX == RD == /64 PREFIX





[WAJ] This point has been discussed throughly in the first round discussions. The key answer is that you cannot know in advance which RD will cause the overflow VPN routes. And one more point again, current VPN ORF prefixes doesn’t depend only the automatic extracted RD information.&nbsp;




&nbsp;


No one is saying you need to know this in advance. Sure questionable source PE and RTC like list of RTs will not fit RFC5292.&nbsp;


&nbsp;


While we are at this, asking anyone to configure a list of <src RDs+src PEs&gt; limits on each PE is beyond even commenting on.&nbsp;


&nbsp;


#4 - Change of ORF list results in advertisement of ALL routes of a a given AFI/SAFI to the peer.&nbsp;


&nbsp; &nbsp; &nbsp; &nbsp; That is the same irrespective if IMMEDIATE or DEFER flags are set. That puts burden on the peer especially in&nbsp;


&nbsp; &nbsp; &nbsp; &nbsp; VPN cases when the number of routes may be high.&nbsp;





[WAJ] What you described is the current ORF mechanism. There are some spaces to optimize it.




&nbsp;


&nbsp;


Yes this is how ORF works.&nbsp;


&nbsp;


And I don't think there is any consensus&nbsp;to break it.&nbsp;


&nbsp;


Actually looking at your -03 version I have a suggestion.&nbsp;


&nbsp;


Forget about hacking ORF. Just use new SAFI and push those policies in the new address family. Just like we did with RTC. And please do not try to fix RTC :) Leave it alone and transfer your policy to new AFI/SAFI advertisements.&nbsp;


&nbsp;


It will also be automatically transitive so you should have much better coverage with that.&nbsp;


&nbsp;


Alternatively you may find some traction to add this into Flowspec v2 work.&nbsp;


&nbsp;


Kind regards,


Robert


&nbsp;