Re: [Idr] capability discovery - draft-ietf-idr-segment-routing-te-policy

"Stone, Andrew (Nokia - CA/Ottawa)" <andrew.stone@nokia.com> Tue, 31 July 2018 14:46 UTC

Return-Path: <andrew.stone@nokia.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B3E9130EB3 for <idr@ietfa.amsl.com>; Tue, 31 Jul 2018 07:46:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.01
X-Spam-Level:
X-Spam-Status: No, score=-0.01 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yMQlOi_tLuly for <idr@ietfa.amsl.com>; Tue, 31 Jul 2018 07:46:24 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0095.outbound.protection.outlook.com [104.47.1.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C7B04130EAB for <idr@ietf.org>; Tue, 31 Jul 2018 07:46:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YAWiLKHMmdFCdtmOxGymK8kKq6KzrUDp17WcGRDFxgk=; b=oqdgodUCHGvVbXOE3GB/e1KoUJXWNhaHNKMO6UBXVqAhwCTpyqOysDJ3+Ku6n48wgr76D8NxAR6KHVWA+79nz9ybWDOAvqI10RUfiDv33uZd+f1IbysXONc7f+47y/Y3xcT6TjZpeCq/W0CR+0U69mBNplCoVckKqYDMME4VTmQ=
Received: from AM0PR07MB4417.eurprd07.prod.outlook.com (52.133.52.158) by AM0PR07MB4450.eurprd07.prod.outlook.com (52.135.152.11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1017.10; Tue, 31 Jul 2018 14:46:21 +0000
Received: from AM0PR07MB4417.eurprd07.prod.outlook.com ([fe80::6c9f:58ac:b588:3a3]) by AM0PR07MB4417.eurprd07.prod.outlook.com ([fe80::6c9f:58ac:b588:3a3%3]) with mapi id 15.20.1017.010; Tue, 31 Jul 2018 14:46:21 +0000
From: "Stone, Andrew (Nokia - CA/Ottawa)" <andrew.stone@nokia.com>
To: Rob Shakir <rjs@rob.sh>
CC: "idr@ietf.org" <idr@ietf.org>
Thread-Topic: [Idr] capability discovery - draft-ietf-idr-segment-routing-te-policy
Thread-Index: AQHUIGM5QrDD/itLsE+8CeXIfzXksaSlk+kAgAPlx4A=
Date: Tue, 31 Jul 2018 14:46:21 +0000
Message-ID: <79540401-7032-4A3E-9AD3-E650AD9C1E7D@nokia.com>
References: <C1B70CF3-FBCB-469C-B312-F6CB79D19591@nokia.com> <CAHxMReac074E_ZP1H3sj5Domp4niwTPOJUAsqFHEqe=fQm8WXA@mail.gmail.com>
In-Reply-To: <CAHxMReac074E_ZP1H3sj5Domp4niwTPOJUAsqFHEqe=fQm8WXA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/f.26.0.170902
x-originating-ip: [135.245.48.87]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM0PR07MB4450; 6:aEtMC5p4MPlOG+gMqhtEkp7yFHNl0K7NulRfS0w8QuhPlXUKU8++SNZ6RRuPWGi0qYqzr3Cz6ne1QH2wD1AKX2/iQPZ6isyu03LIOvkTDHMOdmVoQw8eURqQ0PxpOvqYMxdmWt8CSjaVj8yOyG0tHcwRJNuGQyUdtZF7AkYkVS69QHYOeZyqM2QW/iT3ZDo7z1Z2avOlMqpY00TBWp0shupfsO7NRHIesMNOOFXcTphrEZ3fZyO4Fjc0sUnVzfr+EgLxi/DBNI5wxXHx5HCjOp3Syfrzh03HpGqQZQm/WUdu3HWZEDYjBCesqWIbhD63syH97+PNMzYA9kfY4M/m4NgI0ae1p1EqDQPOyYFYCC9J/lt+kO31e4/PQdw9jYqNiNF9AA5VaRz9kd7Hobzm3dgyhBeiKHSejEkkbBv+xHEAOIRIfgkvkyYpCxYKidMINmGwfYqyn0jgdHKR/5UDCg==; 5:KddlGU7esRT4ghgXP8+5oVhWIJdIagaB7OF+OSbcLWEUqqfCyO2S6dj6TNTq4fGCh/DD8RCRxJM0R0xKDHbHAz7JNQwAUCThtQeg0ftaE6iR5CFQYvATBB8oqVgB/N9rHdSneiJvR05YZabJ5oFdCbG9iXIpsxBSQ9SmKFyf5/k=; 7:rfMrSjVDf6rK7aa+qR4KtTAC8B2AXPPCnQX0Z+4gi9QE3z9fAk0wo/XV64txh5qz6hiZTRBbEnjjVyaKSpn+lZrLv2fnEEeZJ4ZRRDLnYFiRFIxe+TpVYfCCAFU6eKfvuOPzCXTcb9bI/FQuUU5QM6uOjwm9EgteVCLZgrx+PVG42fM+aEOuCL9xwd+uc6vRzM9jo5foMTyrhm5EQiaClIW2zrJHc7k7tfsK95y8y8GVqvS0zvVxnjYClvIDaXp5
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 767114a3-fdbd-485c-93ea-08d5f6f46192
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600074)(711020)(4618075)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7193020); SRVR:AM0PR07MB4450;
x-ms-traffictypediagnostic: AM0PR07MB4450:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=andrew.stone@nokia.com;
x-microsoft-antispam-prvs: <AM0PR07MB4450CC85AE2BB19EFEEB12ED912E0@AM0PR07MB4450.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(82608151540597)(109105607167333)(195916259791689)(21748063052155)(17755550239193);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3002001)(3231311)(11241501184)(806099)(944501410)(52105095)(10201501046)(93006095)(93001095)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123562045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:AM0PR07MB4450; BCL:0; PCL:0; RULEID:; SRVR:AM0PR07MB4450;
x-forefront-prvs: 0750463DC9
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(136003)(39860400002)(366004)(396003)(376002)(53754006)(51914003)(199004)(189003)(81166006)(6486002)(53936002)(4326008)(99286004)(186003)(106356001)(105586002)(14454004)(966005)(53546011)(6506007)(76176011)(81156014)(6512007)(8676002)(236005)(8936002)(316002)(5250100002)(6306002)(54896002)(229853002)(68736007)(478600001)(6436002)(606006)(3846002)(6116002)(7736002)(82746002)(2906002)(14444005)(256004)(5660300001)(486006)(2900100001)(83716003)(26005)(25786009)(6916009)(9326002)(476003)(2616005)(446003)(97736004)(6246003)(58126008)(102836004)(11346002)(86362001)(66066001)(36756003)(33656002); DIR:OUT; SFP:1102; SCL:1; SRVR:AM0PR07MB4450; H:AM0PR07MB4417.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: fc5iVo7u7rsXBhToHx2oln5/hkNaJ5i9e6i3Vf4Q0YzKEu9tLVWxOznkWreO8KI2l5CcwP2JTgCAEUZ90oGnLK7akxC6DSiYs/sYqIcKLo3ZJbVTzVDhXMJB4MdziDlWrfFNQ1hfYZuLOvVm/rp/kQXy2B8+PHxgSHs65uNX8X2vidy116wSler5mxX71nZfI+EchiTU4JW5Oj7lAPam7dsXeEtZJSHWpWw+mUJ+Y/AHqJAAzHfPs1p5hqgV3lCbdRebginEBWT1MkwvjXBtI6rKmlkDXUW5+WvvKs2gD6bpr58hG3OKvKcBI5QuWo49XS2wZFamzSJnHxuuGiQ2i0fh1Oej3uzd9U8amgabSM+7BG00WvIX6pnNWtyj3CsdA50CVlJhiSdd9yAYpQYhrQ==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_7954040170324A3E9AD3E650AD9C1E7Dnokiacom_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 767114a3-fdbd-485c-93ea-08d5f6f46192
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Jul 2018 14:46:21.1431 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR07MB4450
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/qoHu88-LUPBBKlobStqQStUKwJ8>
Subject: Re: [Idr] capability discovery - draft-ietf-idr-segment-routing-te-policy
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Jul 2018 14:46:28 -0000

Hi Rob,

Thanks for the reply. Agreed, this is not a new problem for BGP, but I still think it’s an important shortcoming that should be addressed in some manner.

Agreed, understanding session liveliness is important and whether or not a given route was received (or will be received) should be solved generically. There are a number of options to make that happen, I think the important thing would be for SR-TE Policy draft to describe a recommended way in which that could be performed (whatever that mechanism suggestion may be).

Thanks!
Andrew

From: Rob Shakir <rjs@rob.sh>
Date: Saturday, July 28, 2018 at 11:15 PM
To: "Stone, Andrew (Nokia - CA/Ottawa)" <andrew.stone@nokia.com>
Cc: "idr@ietf.org" <idr@ietf.org>
Subject: Re: [Idr] capability discovery - draft-ietf-idr-segment-routing-te-policy

Andrew,

I'm not sure this is a new problem. For example, if I am performing route injection from some external source to an RR, I have no knowledge that the downstream systems that I wish to advertise it to support the <AFI,SAFI> that I'm injecting for. There must be some other means of discovery.

There are other problems with injecting SR-TE policies via an RR infrastructure -- consider that even session failure is undetectable in this scenario (the remote device might have gone away entirely, or not have a session to the RR). To me, this is simply something that we need to consider the deployment scenarios for (a good use for the "Operational Considerations" of this draft), rather than adding protocol machinery in BGP for. The mechanism to discover liveliness, and whether a policy is programmed on the target node should be solved generically.

Cheers,
r.

On Fri, 20 Jul 2018 at 12:54 Stone, Andrew (Nokia - CA/Ottawa) <andrew.stone@nokia.com<mailto:andrew.stone@nokia.com>> wrote:
Hi all,

Comment raised in IDR meeting regarding draft-ietf-idr-segment-routing-te-policy:

Assuming an architecture deployment where a controller is peered to a RR supporting address families bgp-ls and sr-te-policies, how does the controller know which downstream routers in the network support BGP advertised SR-TE Policies? as this information (peer session address families) is being masked by the RR? For example, if the controller wanted to install a BSID on a transient node in the middle of the network, how will the controller know that:

1) node in network is currently talking BGP
2) node supports sr-te-policy address family

Comparatively to PCEP, the PCEP session and its capability TLVs informs the controller of this.

Advertising SR-TE policy via BGP needs a similar ability or a description on how best to address this.

Some suggestions could include:


  *   perhaps advertising capability inside of BGP-LS

     *   But this means router needs to talk BGP-LS or have to relay it through IGP to reach the BGP-LS speaker, similar to draft-ietf-idr-bgp-ls-segment-routing-msd and draft-ietf-isis-segment-routing-msd

  *   Transient downstream router advertises the capability into using same SAFI as sr-te-policy but a different NLRI with a target of one, many or all controllers
  *   external learning such as via BMP, netconf, statically defined on controller… etc?

Thoughts?

Thanks
Andrew
_______________________________________________
Idr mailing list
Idr@ietf.org<mailto:Idr@ietf.org>
https://www.ietf.org/mailman/listinfo/idr