Re: [Idr] shepherd review of draft-ietf-idr-bgp-ls-segment-routing-ext-08.txt

"Ketan Talaulikar (ketant)" <ketant@cisco.com> Thu, 11 October 2018 02:15 UTC

Return-Path: <ketant@cisco.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E473C130DFB; Wed, 10 Oct 2018 19:15:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pL7okcabFwAe; Wed, 10 Oct 2018 19:15:07 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F6D2130DFD; Wed, 10 Oct 2018 19:15:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=35201; q=dns/txt; s=iport; t=1539224107; x=1540433707; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=GlCAXVCXk4/htvZoYTui12YMByugOu2VdBbuMA8uyDo=; b=SsDbXYq2eKzAKP8Tcbnnz55Yp0Mr1X7fdf7czUu3y08jEePeSMFs/yyD IbU8OKXhEGetvX35crI/7fG01fVUgZ4rjG1xzXBU+r3Ucx35pTJyOnESI 1o7z5kUbq7GnjKlOtIVKjyHhpCoS55o7dvNnHgVRuNHEMGyV9k6bP3how U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ADAABIsb5b/4ENJK1ZChkBAQEBAQEBAQEBAQEHAQEBAQEBgVEEAQEBAQELAYEMSC9mfygKjAGMN4INeod4jg2BegsBASeERQKEUCE0DQ0BAwEBAgEBAm0cDIU5AQEBBC06EhACAQgOAwEDAQEhAQ0hERcGCAEBBAENBQgTgweBHUwDFQ+nTIc8DYITBYs7F4FBP4ERAYJdNYJWRQEBAgGBMwUQPIUyAohNDgEDhT2GB4k5LQkChlCDE4NMgxkfgU+EaolUjDJ0iEECERSBJR04gVVwFYMngiYXiFqFPm8BixaBLYEfAQE
X-IronPort-AV: E=Sophos;i="5.54,366,1534809600"; d="scan'208,217";a="464567611"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 11 Oct 2018 02:15:05 +0000
Received: from XCH-RCD-006.cisco.com (xch-rcd-006.cisco.com [173.37.102.16]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id w9B2F4En016933 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 11 Oct 2018 02:15:04 GMT
Received: from xch-aln-008.cisco.com (173.36.7.18) by XCH-RCD-006.cisco.com (173.37.102.16) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Wed, 10 Oct 2018 21:15:03 -0500
Received: from xch-aln-008.cisco.com ([173.36.7.18]) by XCH-ALN-008.cisco.com ([173.36.7.18]) with mapi id 15.00.1395.000; Wed, 10 Oct 2018 21:15:03 -0500
From: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
To: Susan Hares <shares@ndzh.com>, "idr@ietf.org" <idr@ietf.org>
CC: "draft-ietf-idr-bgp-ls-segment-routing-ext@ietf.org" <draft-ietf-idr-bgp-ls-segment-routing-ext@ietf.org>, 'John Scudder' <jgs@juniper.net>, 'Alvaro Retana' <aretana.ietf@gmail.com>
Thread-Topic: shepherd review of draft-ietf-idr-bgp-ls-segment-routing-ext-08.txt
Thread-Index: AdQGL5Y5fZ5Ztu4KQ9G6IFTdx3l20xa2Hnkg
Date: Thu, 11 Oct 2018 02:15:03 +0000
Message-ID: <8af69b30f2134ffd8111a88f04e0df7d@XCH-ALN-008.cisco.com>
References: <016d01d40637$ac404c90$04c0e5b0$@ndzh.com>
In-Reply-To: <016d01d40637$ac404c90$04c0e5b0$@ndzh.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.65.64.156]
Content-Type: multipart/alternative; boundary="_000_8af69b30f2134ffd8111a88f04e0df7dXCHALN008ciscocom_"
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.37.102.16, xch-rcd-006.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/lLVznPaJrVUNQKDzK84SNkLg0VU>
Subject: Re: [Idr] shepherd review of draft-ietf-idr-bgp-ls-segment-routing-ext-08.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Oct 2018 02:15:10 -0000

Hi Susan,

The v9 of the draft which addresses your comments has just been posted.

Thanks,
Ketan

From: Susan Hares <shares@ndzh.com>
Sent: 17 June 2018 18:05
To: idr@ietf.org
Cc: draft-ietf-idr-bgp-ls-segment-routing-ext@ietf.org; 'John Scudder' <jgs@juniper.net>; 'Alvaro Retana' <aretana.ietf@gmail.com>; Ketan Talaulikar (ketant) <ketant@cisco.com>
Subject: shepherd review of draft-ietf-idr-bgp-ls-segment-routing-ext-08.txt

This is a shepherds review after WG LC, RTG-DIR QA review, and OPS QA Review.

Summary: I have minor issues and editorial comments on this document. The minor issues will need to be resolved before this document is sent to the IESG. The minors issues arise out of the shepherd's review of the document and the two QA Reviews.


Thanks:
I want to thank the WG for its active review during WG LC, and following people who provided specific early reviews on this document:

1)  Robert Raszuk and Tony Li - during WG LC

2)  Jeff Hass - during WG LC

3)  Aijun Wang - during WG LC

4)  Victoria Pritchard - RTG-DIR QA review

5)  Joel Jaeggli - OPS QA review

I want to thank the authors for a well written draft and productive dialogues with the reviewers.

Susan Hares


----------

Minor issues:

Source: Shepherd
Issue 1: BGP Error handling

Problem:
The BGP Error handling in the document has two types:  malformed TLVs and restrictions on the TLVs which can be inserted in the Node NLRI (section 2.1), Link NLRI (Section 2.2), and Prefix NLRI (section 2.3).  The error handling in RFC5572 does not specifically handle the restrictions on TLVs.

Suggested solution:
Denote these errors as NLRI content errors and specifically indicate how these are treated.

Textual changes:
Section 2.1 on page 6, just before 2.1.1 paragraph
New/
If a BGP Peer supporting BGP-LS incorrectly adds these TLVs to the Link Attribute or the Prefix attribute of the BGP-LS NLRI, this a   content error rather than a malformed NLRI.  See the manageability     section for an explanation of how content errors are handled.
/
Section 2.2 on page 10, after table 2 and the paragraph that ends "TLV/Sub-TLV described below."

New/
If a BGP Peer supporting BGP-LS incorrectly adds these TLVs to the Node Attribute or the Prefix attribute of the BGP-LS NLRI, this a   content error rather than a malformed NLRI.  See the manageability     section for an explanation of how content errors are handled.
/

Section 2.3 on page 14, just before 2.3.1

New
/If a BGP Peer supporting BGP-LS incorrectly adds these TLVs to the Node Attribute or the Link attribute of the BGP-LS NLRI, this content error rather than a malformed NLRI.  See the manageability     section for an explanation of how content errors are handled.
/

Replace the 3rd sentence of the second paragraph of 5. Manageability Considerations

Old/

Specifically the determination of malformed attributes and their

handling follow the base BGP-LS specification [RFC7752<https://tools.ietf.org/html/rfc7752>].
/
New /
Specifically, the malformed NLRIs attribute tests
in the FAULT Management section of [RFC7752<https://tools.ietf.org/html/rfc7752>]
now encompass the new TLVs for the BGP-LS NLRI in this document.

Three content restrictions for TLV insertion are given in sections 2.1, 2.2, and 2.3 to which limit the inclusion of TLVs to certain BGP-LS NLRI attributes. Any BGP-LS NLRI which does not abide by the content restriction will be treated as a malformed BGP-LS NLRI.

If BGP-LS NLRI with these extensions is determined to be malformed
by the receiving BGP peer, the BGP peer receiving the BGP packet
drops the attribute the malformed BGP-LS NLRI was detect in  (either the BGP_MP_REACH_NLRI attribute or the BGP_MP_UNREACH_NLRI attribute).
/

Issue 2:
Source: Shepherd:
Problem:
section 2.1.3 does not indicate where the values come for the 1 octet identifying the algorithm.  If these are configured on a network basis, please identify this point. If these are part of an ISIS or OSPF standard please specify.

Issue 3:
Source: Joel Jaeggli's OPS-DIR review
Problem:  None of the review points from the OPS-DIR QA review have been addressed
Recommended solution: The authors should consider these suggestions and address his 3 points.

Issue 4:
Source: Victoria Pritchard QA review concern
Problem: RTG-QA review issue 7
2.1.5
The SRMS Preference TLV only contains the Preference value, so it was
unclear how this is linked to a mapping server? Is the mapping server some other field in the message?

[KT response] The SRMS Preference TLV indicates the preference value for the node NLRI that it is a part of when that node is a mapping server. One would need to go through the referenced IGPs specs and likely the relevant SR specs to understand the mapping server.

[Shepherd's comment: text in draft-ietf-spring-segment-routing-ldp-interop states:
   We introduce the definition of the Segment Routing Mapping Server
   (SRMS) which consists of an IGP (IS-IS, OSPF and OSPFv3) extension
   allowing an SR capable router to advertise mappings between prefixes
   and Segment Identifiers (SID).  The details on how the mappings are
   encoded and advertised are protocol specific and defined in
   [I-D.ietf-isis-segment-routing-extensions<https://tools.ietf.org/html/draft-ietf-spring-segment-routing-ldp-interop-08#ref-I-D.ietf-isis-segment-routing-extensions>],
   [I-D.ietf-ospf-segment-routing-extensions<https://tools.ietf.org/html/draft-ietf-spring-segment-routing-ldp-interop-08#ref-I-D.ietf-ospf-segment-routing-extensions>] and
   [I-D.ietf-ospf-ospfv3-segment-routing-extensions<https://tools.ietf.org/html/draft-ietf-spring-segment-routing-ldp-interop-08#ref-I-D.ietf-ospf-ospfv3-segment-routing-extensions>].

   The SRMS function of a SR capable router allows distribution of
   mappings for prefixes not locally attached to the advertising router
   and therefore allows advertisement of mappings on behalf of non-SR
   capable routers.

I suggest this definition moves up to the segment routing draft (draft-ietf-spring-segment-routing-16), then draft-ietf-idr-bgp-ls-segment-routing-ext and draft-ietf-spring-segment-routing-ldp-interop can utilize the draft.  In the meantime, put a similar definition in this draft in section with a comment that states it will disappear.

--------------------------

Editorial issues

Issue 1: explaining what capability architecture

Source: from RTG-QA issue 5  (editorial)
(5)2.1.2. The capabilities TLV "advertise the node's SR capabilities and its Segment Routing Global Base (SRGB) range(s)", but the format diagram only contains Segment ID information. What are the capabilities? Or does the presence of this TLV indicate the capability?

[KT Response] The Capabilities are the SRGB and the flags carried in the TLV.
Shepherd: A short explanation on why this is considered "capability" is in order here.