[Idr] 答复: Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

Aijun Wang <wangaijun@tsinghua.org.cn> Mon, 29 August 2022 15:20 UTC

Return-Path: <wangaijun@tsinghua.org.cn>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38B7DC147930 for <idr@ietfa.amsl.com>; Mon, 29 Aug 2022 08:20:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level:
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0N_Cghm-aigR for <idr@ietfa.amsl.com>; Mon, 29 Aug 2022 08:20:05 -0700 (PDT)
Received: from mail-m121145.qiye.163.com (mail-m121145.qiye.163.com [115.236.121.145]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D887C1524D9 for <idr@ietf.org>; Mon, 29 Aug 2022 08:20:03 -0700 (PDT)
Received: from DESKTOPOSJFVLS (unknown [221.223.103.237]) by mail-m121145.qiye.163.com (Hmail) with ESMTPA id 40EC38000D6; Mon, 29 Aug 2022 23:20:01 +0800 (CST)
From: Aijun Wang <wangaijun@tsinghua.org.cn>
To: 'Igor Malyushkin' <gmalyushkin@gmail.com>, 'Jeffrey Haas' <jhaas@pfrc.org>
Cc: 'idr' <idr@ietf.org>, 'Sue Hares' <shares@ndzh.com>
References: <tencent_3C3279A3B4DAF8DA03F446E7AAE799D8AA09@qq.com> <CAEfhRrz5aAJmy2Ye1gqss2d72nm78n4SfeowO-FU7i4Z6Zpb+A@mail.gmail.com> <0CD78D4C-672F-41AA-8E1B-98CD8A875D21@pfrc.org> <CAEfhRrxkuYMmfcdX=M9PG2mN+D5fCBF5bVxd1bSA2O9PU5G-gA@mail.gmail.com>
In-Reply-To: <CAEfhRrxkuYMmfcdX=M9PG2mN+D5fCBF5bVxd1bSA2O9PU5G-gA@mail.gmail.com>
Date: Mon, 29 Aug 2022 23:20:00 +0800
Message-ID: <000001d8bbba$ceb9e4b0$6c2dae10$@tsinghua.org.cn>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0001_01D8BBFD.DCE0A720"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQK73tOJmpze6rJyNez9SrD9MPek7QK8XtYRAbOLm4wB5fkdqKvNB5nA
Content-Language: zh-cn
X-HM-Spam-Status: e1kfGhgUHx5ZQUpXWQgPGg8OCBgUHx5ZQUlOS1dZFg8aDwILHllBWSg2Ly tZV1koWUFKTEtLSjdXWS1ZQUlXWQ8JGhUIEh9ZQVlDSR9OVkJLT0lMGUoaS08dS1UTARMWGhIXJB QOD1lXWRgSC1lBWUlJSlVJSUhVSktIVUlITFlXWRYaDxIVHRRZQVlPS0hVSkpLSE5PVUpLS1kG
X-HM-Sender-Digest: e1kMHhlZQR0aFwgeV1kSHx4VD1lBWUc6Nj46Mjo6CD06FUorAjxONS4u S01PC09VSlVKTU1KTENNT0tKQ0pCVTMWGhIXVQwaFRwaEhEOFTsPCBIVHBMOGlUUCRxVGBVFWVdZ EgtZQVlJSUpVSUlIVUpLSFVJSExZV1kIAVlBSkxPT0w3Bg++
X-HM-Tid: 0a82ea302a6cb03akuuu40ec38000d6
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/tEyQawnFVBvi4h88Af4cnNauQOw>
Subject: [Idr] 答复: Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Aug 2022 15:20:07 -0000

Hi, Igor:

 

The quota value shouldn't be changed dynamically.

 

In your mentioned scenario(CE is dual homed to two PEs), normally the routes from the first PE and second PE will pass their quotas at the same time first.  Then when the VRF limit is reached, both of them will be withdrawn via the VPN Prefixes ORF message at the same time. 

Then is it rare or impossible that your mentioned scenario will occur?

 

Aijun Wang

China Telecom

 

 

发件人: idr-bounces@ietf.org [mailto:idr-bounces@ietf.org] 代表 Igor Malyushkin
发送时间: 2022年8月29日 21:27
收件人: Jeffrey Haas <jhaas@pfrc.org>
抄送: idr <idr@ietf.org>; Sue Hares <shares@ndzh.com>
主题: Re: [Idr] Adoption and IPR call for draft-wang-idr-vpn-prefix-orf-03.txt (8/16 to 8/30)

 

Hi Jeff,

Thanks for comments.

 

I`m concerned that the suggested solution covers only subset of cases. For example, if a multihomed CE sends us lots of prefixes (that we for unknown reason didn`t drop at ingress), one multihomed PE can distribute them slightly faster than another one. In that case, routes from one multihoming PE will deplet and its quota, and the VRF prefix limit. At the same time routes from the second multihoming PE come. Let`s imagine that RR hasn`t withdrew yet all excessive routes of the first multihoming PE, it is in the process. Here we need to drop locally (due to the old-good prefix limit) almost the same amount of routes (roughly) from the second leg also receive and process withdraws from RR for the fist leg. I believe we will make things with resources even worse. Not to mention if we will free some room for prefixes due to ORF, we will doomed to update RIB/FIB two times in vain.

 

Maybe it`s a good move to count a quote independently of the VRF limit (such mechanic isn`t described in the draft, so I`m not sure how it actually works). In the scenario above despite we locally drop excessive routes from the second multihoming PE due to the VRF prefix limit, we can also reduce its quota at the same time and react much faster.

 

Please also see the inline.

 

пн, 29 авг. 2022 г. в 14:45, Jeffrey Haas <jhaas@pfrc.org <mailto:jhaas@pfrc.org> >:

Igor,

> On Aug 29, 2022, at 8:39 AM, Igor Malyushkin <gmalyushkin@gmail.com <mailto:gmalyushkin@gmail.com> > wrote:
> 
> 
> In the first option, will RR withdraw all PE3`s routes until the number of these routes reaches to the quota of PE3, right? In such way, the described problem can happen only in the second scenario because there will be a room for the routes of PE2. If RR withdraws routes that overflowed the VRF prefix limit only, the described problem will actual for any case.

One observation is that the local systems, when examining their quotas, can use the fact that it knows that a given RD is intended to be mitigated by the ORF or not.

Exactly how the system needs to behave in the implementation would partially depend on the reason for mitigation.  For memory exhaustion, it may need to be more aggressive about discarding routes.  For CPU overload, lesser mitigations may be sufficient.

[IM] Actually overloading of a VRF prefix limit (which starts sending of an ORF message) does not mean that there are any problems with the memory or CPU. It is just a threshold, a device can even locally drop all excessive routes without any starvation of its resources. This threshold (VRF limit) is an only good and reliable trigger for us. We also can`t know beforehand what problem is actual in the case of routes overloading, it may be either a memory problem, or a CPU one, or even both. So I can`t see a way to configure "the aggressiveness mode" for the proposed solution either. Or I didn`t get your point.


I think the critical implementation detail is that once this ORF is triggered, it should require operator intervention to clear to avoid thrashing routes.

[IM] Operator`s intervention should be triggered earlier, when the quota has passed. But I agree that number of excessive routes can be so much so it will run through the quota and the VRF limit almost simultaneously.


-- Jeff