Re: [Idr] AD Review of draft-ietf-idr-bgp-gr-notification-13

"John G. Scudder" <jgs@juniper.net> Tue, 03 April 2018 21:02 UTC

Return-Path: <jgs@juniper.net>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A695412D879; Tue, 3 Apr 2018 14:02:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4puMftJ_ZJcH; Tue, 3 Apr 2018 14:02:50 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE7BF126FDC; Tue, 3 Apr 2018 14:02:50 -0700 (PDT)
Received: from pps.filterd (m0108162.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w33L1TVo017125; Tue, 3 Apr 2018 14:02:44 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=PPS1017; bh=aa+rZgWPrq6cC/2PBNmiJkADknzFuT0MHSOnPOIigxs=; b=vB4IjXqp+Ji9bO3HUd6pUYfcDshGHlGNa36Vp1znOBtqX9gQPTAdLoQ/5d+5q3xtGm9C yyQu9fo+sVMjmptbxkwAwCBUF5TpvcdUuQ4Uob1xzJ2RKJCdlADiQw8N7ztyuaZSL3Zy WMj2LPmSHDrE1qTGslsrBtmn41ix/Zo96DyQuKamQ6Mh95nZPt3SVIWXlMXPoLjGx9NS TtiZBy22IVYLOgaRon8foHXuimm9C3yCc91aJ/pPD1NeYMAhQkMniaVRGxKorPyfu3KI vOVDCAcnsXzygHgzOKks7Cfb7rQi8jk33tAyOHH90KlO9ji5yed0wX6JUzrghcmCyn2W Hg==
Received: from nam01-bn3-obe.outbound.protection.outlook.com (mail-bn3nam01lp0178.outbound.protection.outlook.com [216.32.180.178]) by mx0b-00273201.pphosted.com with ESMTP id 2h4gh40216-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Tue, 03 Apr 2018 14:02:44 -0700
Received: from [172.29.34.63] (66.129.241.13) by BLUPR0501MB2067.namprd05.prod.outlook.com (2a01:111:e400:c475::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.653.5; Tue, 3 Apr 2018 21:02:41 +0000
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
From: "John G. Scudder" <jgs@juniper.net>
In-Reply-To: <03AE36E3-F18B-4F34-9A6C-242AA1CAB4EC@juniper.net>
Date: Tue, 3 Apr 2018 17:02:31 -0400
Cc: draft-ietf-idr-bgp-gr-notification@ietf.org, idr-chairs@ietf.org, Jie Dong <jie.dong@huawei.com>
Content-Transfer-Encoding: quoted-printable
Message-Id: <CFB6905F-8A09-494E-B7C5-500D15027844@juniper.net>
References: <CAMMESszAe0avmcX0X95uOwRu29cTvbx_t7ewBwU-Hig20SD9pg@mail.gmail.com> <03AE36E3-F18B-4F34-9A6C-242AA1CAB4EC@juniper.net>
To: Alvaro Retana <aretana.ietf@gmail.com>, "idr@ietf. org" <idr@ietf.org>
X-Mailer: Apple Mail (2.3273)
X-Originating-IP: [66.129.241.13]
X-ClientProxiedBy: SN2PR01CA0076.prod.exchangelabs.com (2603:10b6:800::44) To BLUPR0501MB2067.namprd05.prod.outlook.com (2a01:111:e400:c475::25)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7bdff0d8-d507-4063-a671-08d599a63ded
X-MS-Office365-Filtering-HT: Tenant
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:BLUPR0501MB2067;
X-Microsoft-Exchange-Diagnostics: 1; BLUPR0501MB2067; 3:X7qajpAHdaIKY6m9RUY/eSrYyfXqhko+0s8QKREjBPCDWXcwB4dzPkpsyczVwD3FvlQ6hH4LiEVwYwEeWL1G/XhK5wXrY1A6ON9GVkxcISZUgbjQ6e5qf6Vz0B8JgNRBeSaWe7rhQd2rqmZCPsWI3BHe+hzz8/p3jyQ0dpEmPvgsmjSMs0LrvmTExmhB4cNPyYEmDfzlCLBUmYTxd6kAGNysWmjVS3gDLCv10QyPfzuotoO9QdNK94fllrokk10O; 25:kS2meeEfgzOYfWgqwq4qWAwpK4MYagg+KzWT8ORIVnD6gmxEhrpOoZx63wYdSR+GFRpcZs3uw+6RTIRoVtPewm7dQaPK9f1IGZ4qEBnPkNKGKlNh5OhiursmoAl10N9KzBWXP9i++jhhLo6REId2Y/J910EJPSewrXcgu3ZNnDrrb5e/WUxShQSusIRyjrMOO1cHQwXL1Y52bprBaxIYGLK9WwqOolURiu0RkWblzp+E3PkcTWE3657/YKWnGA8jTWbXA8EDPIHNj+2WymA26G4EFazjKlrZkQu+sFCNjb+KM/2sQwG0pPFJT5/noJLPu5EJp1z0lAI+5DwzwnfTag==; 31:+Veaj9IWdzml0lA7R9XnOnvlK/uYICbimxR1gBktqcX2e4dDil1nks9a75vJ0ulLhXS/XfJ5HDPApsusMqVc17aik7FiQga4BW0iYmz1+x4YaB8WibgsBUSe7FN0PWYhtSAKjgT78qofAGxQsE9dfU3/JuA5I51aP+0nws9+Lo8RH7N3XCukxqJgYNixaL8aLapmjd6O+VE8VSpCQp/44IzLlLtXgbz8/+xioOr76m8=
X-MS-TrafficTypeDiagnostic: BLUPR0501MB2067:
X-Microsoft-Exchange-Diagnostics: 1; BLUPR0501MB2067; 20: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
X-Microsoft-Antispam-PRVS: <BLUPR0501MB2067FBA2BCA2CFEC7762342EAAA50@BLUPR0501MB2067.namprd05.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(192374486261705)(85827821059158)(100405760836317);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(3002001)(93006095)(93001095)(3231221)(944501327)(52105095)(6055026)(6041310)(20161123564045)(20161123558120)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(6072148)(201708071742011); SRVR:BLUPR0501MB2067; BCL:0; PCL:0; RULEID:; SRVR:BLUPR0501MB2067;
X-Microsoft-Exchange-Diagnostics: 1; BLUPR0501MB2067; 4:JtJVsygVuL9liejsFPTMojl7mFbLxqiPBh0lHEFX+mKwNQ+wN+ao0kWg7Uhaqj1jtzATOkYkYzyMckkHqbmhIaNlrsmt0iPnNfZEVsGV4fYRVfXyXTonn2/jDCIGcKGfFw5sBT6lX0QG8RLEg7uVJfolrF4H2Ns9Fa5tE/de4XYPaYMmjGM3Gb8Df6WLL1IX3Wfm0AAN1mVeIC1MJOPTR7lNjZRKFoTErSU0xp58Ah7fGKSbNNtQC4Xh23dSLjnT69H82Lc/IbCKOS/6nHAFuma4x9bqxZ0K6fD9sQdEr0xVsNGu1FM/uzH565zEE3Y90W9J8GDzMNht5UbIrr2yG5ww45WPRrOfY7GPy3OCiEv2nFkyGhDyBkhwNJ+t3cWo
X-Forefront-PRVS: 0631F0BC3D
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019020)(979002)(6049001)(396003)(376002)(366004)(346002)(39380400002)(39860400002)(69234005)(199004)(51444003)(43544003)(189003)(6486002)(86362001)(53546011)(76176011)(39060400002)(386003)(305945005)(47776003)(57306001)(6306002)(26005)(77096007)(110136005)(97736004)(7736002)(446003)(68736007)(8746002)(81166006)(5660300001)(81156014)(486006)(2616005)(50466002)(50226002)(59450400001)(82746002)(83716003)(6246003)(53936002)(8936002)(11346002)(956004)(52116002)(52146003)(23676004)(8676002)(476003)(2486003)(6116002)(3846002)(36756003)(6666003)(25786009)(478600001)(16526019)(33656002)(2906002)(16576012)(316002)(66066001)(15650500001)(186003)(4326008)(105586002)(106356001)(229853002)(42262002)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1102; SCL:1; SRVR:BLUPR0501MB2067; H:[172.29.34.63]; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
Received-SPF: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCTFVQUjA1MDFNQjIwNjc7MjM6R2llL1ZDQXBROEpjNDBpTUJzRmhhWVEw?= =?utf-8?B?Rm5OTHRaS05NOUpMMHgxb1NoV0UyL1o4eHdzMy8wVlZrMnNQZW1ZSThxUVkr?= =?utf-8?B?QmRnNTYyQ2pUUUh6TWFVZFczVTIzRkRKOENwbk1uWisyMGEzYzAzb2pwb1JS?= =?utf-8?B?aXJQdWJsN1cyelFZdENZQXNzbXIwT003Vmx6WGxpYTcyb1RDY3RPa3pLWnF6?= =?utf-8?B?R2hydlNmTTNOcklwSzk3cm82bFA4RGlrRW4rTFlScEpDOWhtU1RlYndRa2Ur?= =?utf-8?B?bjEwMWY2VjlzcGx4bXlKMy80VXlha3ZsOW5JajMzNE01ei9VblVaWEdISXcy?= =?utf-8?B?QVk3YXpNTTREVExWR0xLdzlpMVkzaG9ZUHUzL2xpMDFzSndWRy9CNzFwa1NR?= =?utf-8?B?WEhrQ3R2VEZyY084RkJvTzMybGF5SnQxVWk5QVFBeDB3UzMvWlQwQmh5cUFz?= =?utf-8?B?anRLZG4wcWxvWkxubDluMjZSQzNMSHM3TlNrOENNU3p5SDJZNVpmVkphZFJR?= =?utf-8?B?YjFZNjVnUXFoU1VMc0tzeFZER0szSlA5cE9KaWsvWCsrTDFGUnF5R2hXblBv?= =?utf-8?B?aThsaUVwY2lGRUdZSXd3YWZBNnR6dHQrOTFINlVSclROeDJvSjFBQTlZbVlj?= =?utf-8?B?M2grV3FTeUE0WUdEMzY5VXh6azlBbjlhc1RDQUpqWDk4SE8xU1NnekVFaE1J?= =?utf-8?B?VlIyUHJBL3dRbkFyY2Job0ZkSjZkRjh1WjdjbkpKV3kvWlA1bHBLWHUzN1Jv?= =?utf-8?B?cWErNldibXltQjRxbnNEd2ZIRUoxUnBsUWxXZDNmM29VTjN2dzJHWld6M0ph?= =?utf-8?B?b0t4Z3dyU2svSVVLcFZnWFFaaUxyNUY0SERkYlhWQkt2YklUVzM3eDdubUVp?= =?utf-8?B?V2FOK2E0NFd5cFF1OEdOaFpBaklUQzNEZHFSZ1lCOUZRakZqcGJYb2I1UUJQ?= =?utf-8?B?bFZSZjBWdDY0cEgzU1plTlhkYkRBWEZ4NE5tNDk0TktHbCsrSlIva3ZPOUZt?= =?utf-8?B?dHg1SmdvMS92YnBrZFdCejdOekhncGdQVEx3RGZCR0ZLUzhHNjRkc1VBLzFx?= =?utf-8?B?NXV5KzhLenhBNnZ3ZEs1TTJwczVobjdFQ1VqclFjVlplclYvbGYwemVoMUY0?= =?utf-8?B?TWQ1ZEZlY293VTBhSEhGUTVoS0h2RXQvZm5xTG51LzB1TWtXWWxpazVGc1VR?= =?utf-8?B?V1lXTC9scnRyc2RSRUErMDZqc3RQazhnU3NLNGVQMWloTlVZL1NoQlFtOE0w?= =?utf-8?B?YXp0Q25HeHpXMXpuMEF2NStKbkJUVXJ1bi9SaUlIV2FFdFlwMTJVcy96alRX?= =?utf-8?B?Wm5McTZiVGV0ZzVpcUtqZEU4Z2NHRHBDRlRka3p1WFp2K3J6dTc1SWdHYnUw?= =?utf-8?B?ZlRsd1Rqdk5NdllsTlFpc3FncHNUS3dvL2E1azJQZVQzM2ZJbXdhWFc3R2JP?= =?utf-8?B?bWZVdFhkOHdtZWNCaGZxVlJQc2ZvdHRYalRFVENibjBIY1hDcFU2a3NxZjNT?= =?utf-8?B?RTBJdlIzdllGZmhOWVdoMHBSUzUxRENDU1R3TVBRQk0rYUJqZU1VS1pGNzhI?= =?utf-8?B?cEFYbng1Mmo2Sm1tWGxXWlJ2TW0vY1dQbThxUTVQQmxXbUY3alB2bFNlVHo4?= =?utf-8?B?eGYvMmVhK3BjTU9ZVHJmRXp1S3NYNzY3SWVmSFZvMVJVYmNiS1A4OENCSUJ4?= =?utf-8?B?cVVGWDJGemd5SWxNVzFEdnJzVXhZWlFDdG9UVWhVWGcvR1ltUUdXcDNCVWdk?= =?utf-8?B?c01vRHh2SDVkSG5XVXVkZDI3N1FjNGJJOG9VRFo1aDRwOVR6dENpaWFTdDR1?= =?utf-8?B?dkIxSm5McUFhZS9tMGRXbitKVTl2ZEtNRXRzOElsbHR5Tm4rZGFvc2ZuVnF3?= =?utf-8?B?MXNjaUs3T2E4MFRiSktZMFhZT0UrVUIzSDhOVlMrOGZQMkNvUHNzaUYxYTVx?= =?utf-8?B?M2Z6Ymh4M0xnVDNiL0VoMGRRd1BwUTFnczBHZk9sR0Z6TWhPTzI1UjJWbXVH?= =?utf-8?B?ZHFBOGhXT0FwY01oN2toQnZvMlliTjh3TkRxaGdmS2wwbGlxQ1RUb3dqbzhi?= =?utf-8?B?UEt4aTgyVUpXUHVadG5IYTM3WFYrdG1jMmtiRm9uazZpeEtlQXJmVzBpenk2?= =?utf-8?B?WEhiMEtEQkFEWmhVMVB3ZERESStiQ1hDQWpQYnIvUUt4OW5LL0lFM3MvcmJM?= =?utf-8?B?c1VOWHZHa0I1dHdSN2RTSnByU3ZVL2s0VzZHekdLZk53TlRsOUpWSDJFeG95?= =?utf-8?Q?UwhYF01rGbnUGkcl89e+?=
X-Microsoft-Antispam-Message-Info: VlZReTY63XL7lZ8QZ0IPaQ+1Ps+UWlw3CYzrRlE+IxB93uLYBHtPPHyvAXpyB6YLEcAtHl+f8wCi9WwO9u6BAYQ7LnMm48cFjuIBxQsntjF9dsmgtEtI7DEY0vfdrjmunp41UDYQGiXxPA+5LdXgIH6wAOBIFzVVYhJmOsB66BR09XeHWKn6YinMkRknqxMH
X-Microsoft-Exchange-Diagnostics: 1; BLUPR0501MB2067; 6:aIjN5skYfQJtTVgEbTTL/PcCwHaA0rX6i2gnhSOsRhwsI1cyP0U5K0EOPSur9g7rSPN6YGtnyJb9VJkbH9ASgpa6Lr5cxl+R+lH1PlHKMtVXNXZRIK+2GPOjpyRFz/2ZmGk5Ar3pssdJpUYp4SZRzsoh+TkkKVOJwCdWH9uLzDmW/MW5czfHyhEKkFWAnCKbqp/fPKadhbX0mkoTbo2iIyfWs3ixUcQND0vP7yG4x+qs6EX5sr/P2i2lBt5q+hU9K38rCkyYf62pFbNLsQTl79a5nTjZ9xMmTpFLopm5TGPBlNYCkF2mHLc6P09HQ+s+XDj/xDlZaQQhe+qyL9v1A8hNamAZXEtX9gSijKx7pWycZscFv4hNPL6UFN5rtVM9RJK6OvBvPH/39F82wK2uG2KsdmtdZHrui72WDEKkF3zl1CIBts8BRWu6Dzf3GT0zbkzIr2bwG8L2qxcLV1ohAQ==; 5:375UpQGB+vDvLLbmQ+MUpOD50KWOZrauj9SUC2Qxzbk+B52fr03KjrS6a3G/HJl9Mt4pawHT1Wk7nqBr92SAm0bpqhXbVXHa4zm07uWe8icu2pm/za1GMntGOCmv1I8P/58Up6hm38TUN+eFx/8A6G1hsRXwtx1i/LC0L/cZzYA=; 24:UtbCRyWoaQIk4Qm8rUlEyvHdmHz8ZS7CxAwpXtKBI7wLLcLRoMFsNG4VhzyjLEJUbO0wE+k/WP9GuMbFpJkC/0F6Jw/JdRThF02PBMd0ZRw=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; BLUPR0501MB2067; 7:idfN5nWqHylW3TPELExGfe0f8Ede41GYVWrTv0nrFvqPRZkbwhpIt/t/dLxLQ3BzhDU7aQD9uzoZFVMAQBW92RNAVUykslGVb5S5YcjGuYRcShkQU4ThqiuywfGyjAJS4LUO3ZwLchTQAe0ghMgXhj244yoonWJAvaqmgFexKPuQYdRblvOtIWgjvrWvuwRXTNSrUt8TRWaGS2zCTIXGc3OJk0U2zBsGLABhrU/bEvWVCMB7hqbo1LONPIAP0xJu
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Apr 2018 21:02:41.2877 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7bdff0d8-d507-4063-a671-08d599a63ded
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR0501MB2067
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2018-04-03_09:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1804030210
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/soRtuaVRqjJgpFzgHWin0udw7pU>
Subject: Re: [Idr] AD Review of draft-ietf-idr-bgp-gr-notification-13
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Apr 2018 21:02:54 -0000

(with co-author hat)

Hi Alvaro,

> On Dec 7, 2017, at 4:11 PM, Alvaro Retana <aretana.ietf@gmail.com> wrote:
> 
> Dear authors:
> 
> I just finished reading this document — I have some comments, please see the list below.
> 
> I understand the intent of this document: instead of resetting a BGP session when a NOTIFICATION is received, use Graceful Restart; if the session is going to *really* be reset, then use the new Hard Reset sub-code.  That makes sense to me…but, is that the only code/sub-code for which it makes sense to do a hard reset?  The NOTIFICATION has always had the “stigma” of being something bad, so much that we (idr/IETF) have even worked on ways to reduce its use (rfc7606, for example).  I want to ask the WG to consider whether other code/sub-code NOTIFICATION combinations should also result in a hard reset.  I think there are several cases, for example:
> 
> (1) rfc4486 (Subcodes for BGP Cease Notification Message) defines “Administrative Shutdown” ("a BGP speaker decides to administratively shut down its peering with a neighbor”).  It seems to me that the sender of this NOTIFICATION would not want to "follow the rules for the Receiving Speaker” (as specified in Section 4).
> 
> (2) rfc4486 also defines "Administrative Reset” ("a BGP speaker decides to administratively reset the peering with a neighbor”); no more details are provided, but that sounds like a hard reset to me.
> 
> (3) …there’s probably others...
> 
> Having said all that, I note that Section 3.1. (Sending a Hard Reset) specifies the “encapsulation” (for lack of a better word) of the real reason for the Hard Reset.  If the consensus is to go forward with that, and not call out other exceptions, then I think that the text in 3.1 should expand more on the encapsulation operation and the rationale for doing it this way, and the document should also address other recent work that recommends the use of Administrative Shutdown, for example draft-ietf-grow-bgp-session-culling (a BCP currently in the RFC Editor’s Queue).
> 
> [After I wrote the text above…] I found that some of the points have been discussed on the list already — please include some of that discussion/analysis in the document.

I'll draft something and we can discuss.

Just FYI, the encoding in question was adopted in version -03 as a result of Chris Hall's comments during the WGLC way back in the day (https://www.ietf.org/mail-archive/web/idr/current/msg13205.html)

> I’ll wait until the issue above and ones marked Major (below) are addressed before starting the IETF LC.
> 
> Thanks!
> 
> Alvaro.
> 
> 
> 
> Major:
> 
> M1. Unfortunately, rfc4724 failed to setup a registry for the Restat Flags (or the Flags for Address Family), which means that anyone is able to use the bits in there (assuming the receiver looks at them, of course).  Given that there are only a few bits, and to prevent conflicts, I would really like to see a registry set up.  This document is already tagged to Update rfc4724, so it seems like a good place to establish the registries.  [If for some reason you rather not include that information here, then we can take care of it elsewhere.  IOW, this request is not a requirement.]

I'll do this and while I'm at it, set one up for Flags for Address Family too.

> M2. Section 4.1. (Rules for the Receiving Speaker) has me a little confused.  Are the proposed changes contingent to setting the N bit?  

No.

> The text starts by saying: "As part of this extension, routes from the peer previously marked as stale MUST NOT be deleted, until and unless the optional timer…expires…”…does that mean that the timer is no longer optional?   

No, it's just that we foolishly didn't give the timer a name in the base GR spec. Here's the paragraph from RFC 4272:

   To put an upper bound on the amount of time a router retains the
   stale routes, an implementation MAY support a (configurable) timer
   that imposes this upper bound.

In practice, all implementations have this and call it something like 'stale timer' or whatever. The lack of a defined name for this thing makes it a pain to write about it, which I think is what you've bumped into here. I'll propose a replacement in OLD/NEW style.

> Then you also say: “...if the Graceful Notification ("N") bit is not set in the newly received Graceful Restart Capability, no new actions are triggered on the Receiving Speaker -- in particular, a clear "N” bit does not trigger deletion of stale routes.”  If I understand rfc4724 correctly, stale routes could be deleted — the text indicates changes in the behavior even if the N bit is not set, right?  If you are Updating this section of rfc4724, what would make it crystal clear is an “OLD/NEW” notation of the text (as in, this is the OLD text…and this is the NEW text…).

Oh ouch, I see why you were confused. I believe we meant F bit, not N bit. I'll propose a replacement in OLD/NEW style.

> M3. Security Considerations:  Maybe not a security issue, but something to think about.  Section 4.1 says that “routes...previously marked as stale MUST NOT be deleted, until and unless the optional timer...expires, or unless a Hard Reset is performed.  This supersedes the “consecutive restarts” requirement…”.  Not deleting the stale routes and not making the timer mandatory could result in stale routes that live forever if an attacker manages to create consecutive restarts (by simply sending NOTIFICATIONS before EoR) — stale routes are ok in the short term, but may point in the wrong direction eventually.  Is this an issue?  I think that it would be mitigated if the timer was made mandatory (with a nice default).

That seems like a good idea. While we're at it, we can give it a name. 

> Minor:
> 
> P1. Section 4: “...receive and send BGP NOTIFICATION messages in Graceful mode...” What is “Graceful mode”?

Changed to "according to the procedures of this document".

> Nits:
> 
> N1. In Section 2, please indicate that the first figure corresponds to the GR Capability from rfc4724.

Actually unless someone objects I'll remove the figure entirely. I'm not sure why we put it in. It's not like this document stands alone anyway.

> N2. s/subcode is defined known as/subcode is defined as

OK

> N3. s/Graceful Notification flag/Graceful Notification bit   (For consistency)

OK

> N4. The operation is obviously per-AF; maybe it’s worth saying that somewhere just for completeness.

I don't think I agree -- the extension is NOT per-AF, it applies to all AFs for which GR is enabled (that's why the N flag goes in the Restart Flags field and not the Flags for Address Family field). The underlying operation of GR continues to be per-AF, it's true, but that's not affected by this spec so I think it might be confusing to add words about it?

Thanks,

--John