Re: [Idr] FW: [bess] Review of draft-ietf-bess-evpn-ipvpn-interworking-05.txt

"Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com> Wed, 22 September 2021 13:07 UTC

Return-Path: <jorge.rabadan@nokia.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D5D33A1F92; Wed, 22 Sep 2021 06:07:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.352
X-Spam-Level:
X-Spam-Status: No, score=-2.352 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.452, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c4H8pJ7Cvj2P; Wed, 22 Sep 2021 06:07:33 -0700 (PDT)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2119.outbound.protection.outlook.com [40.107.244.119]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4E2323A1F8E; Wed, 22 Sep 2021 06:07:33 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cPAqlwiWJ7XoWUfJpPENHczUixySMompGuNWkZgF2yJpDnpjkbldcPU5pg4j+lALDQ9GVolpXUpxkAd6kT5Ihi0VeoxNlxrq6zDYEDAADv+bEPFk+CQThaYrQUN0rIJ65vFqq378Grk2R6dX1iATTj2VTDW7sOxDk2XQkDn5zBk4bUG9Y9Qo8VPM6ZN+krYxrnVmpRfrooQRHp6insa06OZnlE1HlgJMT9xKBUuGvFj6y8QDO4YFAxWKexrs5x2jEbARzPrLSW7/3RcnmGsTorOhntnV7OHFaWx5CrfODEVuYkbRb1oE1eV7fmybMrdlouMLLivwn5oh+GuH+ISynw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=WhhwAtL9hnD/BPS0TJPa4y3GSxnseAaQW65FUj+YFfI=; b=f2/X9UKJrB2dbK7FuIRs3C7+zx+DMabDw3tlYZ/CMkJA7kVhaoH0gQCp6YgkHw1jAOosl/cl3d7La0USP/L6aUYb9tIEYjsYs/lFnoyajQYre+ZdepJ1CWsOb6nOKGDMyo9p5fxFsj9hPtqr/wL2LUw61C5KZvZ+ZaOgsIGP6sGDFhNybFzEFihH/NFIxTk0dhY+AMgjr83/OrwAlHRfk/7j4QnprrEvyczaKWFikbKO+JxPWZrDf3+8eDONvol8VT0pCwNkpEgF1wUjkRRbiU8quDGlcgkGbwSBSTU2aRFC51DLxXm/GIXbeR4dDh2DJLR/bJut6QhsCOxkRRCkrg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nokia.com; dmarc=pass action=none header.from=nokia.com; dkim=pass header.d=nokia.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=WhhwAtL9hnD/BPS0TJPa4y3GSxnseAaQW65FUj+YFfI=; b=ZcNXwyVKUyoDPsVGJjarerIeEw2Br4NCIgigtQkJBtc9A+2Yo0CwV2QhreWiY+vV0cDorIWnh37krxWNAoY6n6IzF2xtA6taZfU9d5JLMe2dWgVHIQc8bGr9ui3Qm5NJEY343XFYE9Fbkb3AOz+JzCW4hzxMwkyxq5N6HYjhbeg=
Received: from BY3PR08MB7060.namprd08.prod.outlook.com (2603:10b6:a03:36d::19) by BY5PR08MB6342.namprd08.prod.outlook.com (2603:10b6:a03:1ec::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4523.14; Wed, 22 Sep 2021 13:07:31 +0000
Received: from BY3PR08MB7060.namprd08.prod.outlook.com ([fe80::c968:fb2a:1464:e9bb]) by BY3PR08MB7060.namprd08.prod.outlook.com ([fe80::c968:fb2a:1464:e9bb%8]) with mapi id 15.20.4523.020; Wed, 22 Sep 2021 13:07:31 +0000
From: "Rabadan, Jorge (Nokia - US/Mountain View)" <jorge.rabadan@nokia.com>
To: Susan Hares <shares@ndzh.com>, "idr@ietf.org" <idr@ietf.org>, "bess@ietf.org" <bess@ietf.org>
Thread-Topic: [Idr] FW: [bess] Review of draft-ietf-bess-evpn-ipvpn-interworking-05.txt
Thread-Index: AdeC77BK2K+GnAzSSjST/ilxrzSn/wAFAA0AAJWM+Wo=
Date: Wed, 22 Sep 2021 13:07:31 +0000
Message-ID: <BY3PR08MB70609C86408D8BDDD4B15558F7EC9@BY3PR08MB7060.namprd08.prod.outlook.com>
References: <015501d78303$1f88d280$5e9a7780$@ndzh.com>, <016801d78303$b0f38990$12da9cb0$@ndzh.com>
In-Reply-To: <016801d78303$b0f38990$12da9cb0$@ndzh.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: ndzh.com; dkim=none (message not signed) header.d=none;ndzh.com; dmarc=none action=none header.from=nokia.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 68718eff-485a-40b2-7a15-08d97dc9efb4
x-ms-traffictypediagnostic: BY5PR08MB6342:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <BY5PR08MB6342F10914F27FE01164AF88F7A29@BY5PR08MB6342.namprd08.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: L0+NDup6qcrpQoHqa//ptn806Vl9EZrEfWPfTu3+9mjPblWFmwyxA+ifHuDHHIB9BapD9MqNx192kIstorbhOD4ZUltRgyGb37zdfkwaT5onKAuQEeyTq5bCjo1jmXwsHqOe3IT+dWlUy43U+etT8H65aXip/dFNHGtezSun1NTs1FoxKJReEgwOckY6VA5ldVrcOwgxdtrGd5RaAz/MIw2INZYn3w0FoMnvOOdbFpAp4nl727lU/VNjzntPfoPv9c6ok3M+4qD5kSlmwI27oLoiXkeF2HAlKK0oH0fPmlnXoIlAGY7gwq0pJyIxi2zqfHcbfeEuaYG/wzfaYbnXmX241VXF0M51FUs990Lxrb99lyDCQWhbSGFVjJZxzFNOd5BWu/0IMHCGRkyAhr7bo3HeYtpILEnFaPRb9RnrPwJZ/kgZPYEMKXmchxKV7HAFT4TBqzG8QbXq1wL/bWcUYQuPXFo5g95WEHD4s5LRv1J8m56Bs3eOPGXBIOlRBnd/1XxDvPj+DrTabQlEj0Gmoa+yNP9ed//RU0oujZp4dKxiy8TkYMVaMmSSbUTqACZWGpdoSKoVvSKsiCGCqQrETtBP6QL2KVTODLfaxaA4JuJKdEzl9iPU3W++Y9nzi9DlLeaMt7LpQ1oBO6nG9ajmRycQJTxoGnsib8kLEzrxY8//QjGEXcZMbzlhcujm/ySWJ2cM0zkBbudpRHCl9/LNZEEo8onmonrsvGezzWDpGqh22/OIgUcSZ6K1gV8tx/LuIJsKUhf/zDcrF+5wuT/zN4pZW5E/5QLvb87KkPf+STY=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY3PR08MB7060.namprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(76116006)(33656002)(5660300002)(53546011)(83380400001)(186003)(30864003)(38100700002)(26005)(110136005)(91956017)(66556008)(7696005)(66574015)(86362001)(66946007)(122000001)(2906002)(38070700005)(8676002)(55016002)(66476007)(9326002)(52536014)(508600001)(64756008)(8936002)(316002)(71200400001)(166002)(66446008)(9686003)(966005)(6506007); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY3PR08MB70609C86408D8BDDD4B15558F7EC9BY3PR08MB7060namp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY3PR08MB7060.namprd08.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 68718eff-485a-40b2-7a15-08d97dc9efb4
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Sep 2021 13:07:31.1444 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: lYYoTV/Rp3jbMRnCIOP1arDvHrjrHkVPm62q/zzXAyxWOfkI0Ei6R7XqnSz0Gh+Oxp/lfpNG5jCFOFHmNv7aEw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR08MB6342
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/tiyT4jleAt016l5ZcArat7UmewA>
Subject: Re: [Idr] FW: [bess] Review of draft-ietf-bess-evpn-ipvpn-interworking-05.txt
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Sep 2021 13:07:38 -0000

Hi Sue,

My apologies for the delay.

Thank you very much for your review!
We’ve just published rev 06 which addresses some of your comments.

Please see below in-line with [jorge].

Thanks.
Jorge


From: BESS [mailto:bess-bounces@ietf.org] On Behalf Of Susan Hares
Sent: Tuesday, July 27, 2021 12:19 PM
To: bess@ietf.org
Cc: 'idr-chairs'; bess-chairs@ietf.org
Subject: [bess] Review of draft-ietf-bess-evpn-ipvpn-interworking-05.txt

Bess chairs reminded me that IDR WG was requested at IETF 110 to review draft-ietf-bess-evpn-ipvpn-interworking-05.txt. Since we did not receive reviews from the IDR WG, the IDR chairs have taken on the task of reviewing this document.

Full review is at:
https://trac.ietf.org/trac/idr/wiki/Hares-review-draft-ietf-bess-evpn-ipvpn-internetworking-05
High level points at:
https://trac.ietf.org/trac/idr/wiki/draft-ietf-bess-evpn-ipvpn-interworking

Summary Review:
========
The desire of users to have gateways between EVPNs and IPVPNs is evident due to the deployment of these technologies in the market place.  The BESS chairs request is due to the changes made to BGP in addition of a BGP Attribute and changes to RFC4271’s route selection.  In addition, the IDR and BESS chairs have begun to discuss additional BGP error handling for embedded NRLIs beyond RFC7606.

This email is about 6 high-level issues in this draft and major editing issues.  It does not consider editorial issues in the text.

Deployment information on this draft draft-ietf-bess-evpn-ipvpn-interworking would help in the consideration of solutions to these high-level issues.  If this specification has 2 implementations, then these implementation teams may be able to quickly fill in the missing pieces of the document.
<<<<<<<<<<<<<<
[jorge] The document has several implementations. In particular, Nokia has a full implementation of this draft. Also interoperability across implementations has been recently demonstrated.
<<<<<<<<<<<<<<

=======
High level technical issues:

1) Lack of error handling for NLRIs which carry semantics beyond prefixes.

RFC7606 focused on the error handling for prefixes accompanied by attributes and
Communities (basic and extended) specified by RFCs 4271, 4360, 4456, 4760,
5543, 5701, 6368.

The embedded prefixes which combine prefixes with external information
(RD, EVI, ET, MPLS label, Domain, SID, and other tags) create a new  class of errors where the packet can be well-formed and invalid.   The handling of this information requires
careful consideration of the error handling.  The technology specified in this draft does
not consider the error cases of well-formed and invalid.

The IDR chairs suggest that this type of error handling should be defined as a general BGP functionality to expand RFC7606 to the embedded prefixes by the IDR WG.  This general functionality will then need to be applied to the handling of embedded prefixes.

This draft and existing RFCs (e.g. RFC7432) would be updated with the new error handling.

<<<<<<<<<<<<<<
[jorge] I fail to see if any action specific to this document is required from the above point. Seems a generic statement that applies to existing standards track documents that define NLRIs in EVPN, but not to this document specifically. This document does not define any new NLRI, and therefore no action related to (1) is needed. Can you please confirm?

<<<<<<<<<<<<<<



2) Domain BGP Path Attribute (section 4) debugging and scaling

Domain Path IDs provide parallel numbering scheme that does not have a universal definition.  Debugging these Domain IDs in the Internet wild without this definition seems difficult at best.  It is unclear why the Domain IDs did settle on ASN (4 byte) plus some identifier.  There are numerous private AS numbers that can be used for DC tenants.

The automatic generation of AS numbers based on the starting point of private as numbers should take care of most Data Center automation tools.  Why does this specification stick with AS numbers?

<<<<<<<<<<<<<<<<<<<<<<
[jorge] the domain-id is really a 6-byte arbitrary number, it does not need to contain an ASN, but the authors thought it could be convenient for the operator give it a structure with a global and a local identifiers, where the global id may or may not match the ASN. Again, only on those cases that it makes sense for the operator, and if it helps the troubleshooting and debugging. If it helps, we can clarify that? For instance, we could make the following change:

OLD:

   o  DOMAIN-ID is a 6-octet field that represents a domain.  It is

      composed of a 4-octet Global Administrator sub-field and a 2-octet

      Local Administrator sub-field.  The Global Administrator sub-field

      MAY be filled with an Autonomous System Number (ASN), an IPv4

      address, or any value that guarantees the uniqueness of the

      DOMAIN-ID when the tenant network is connected to multiple

      Operators.

NEW:



   o  DOMAIN-ID is an arbitrary 6-octet field that represents a domain.  It is

      composed of a 4-octet Global Administrator sub-field and a 2-octet

      Local Administrator sub-field.  The Global Administrator sub-field

      MAY be filled with an Autonomous System Number (ASN), an IPv4

      address, or any value that guarantees the uniqueness of the

      DOMAIN-ID (when the tenant network is connected to multiple

      Operators) and simplifies troubleshooting and debugging.
<<<<<<<<<<<<<<<<<<<<<<



Error handling: (section 4 – pages 11-14)
The error handling of the DPATH seeks to define:
(4.a) add/delete/change conditions for transit routes and locally generated routes
(4.b) malformed DPATH attributes.

It does not define error conditions if the syntax conditions
cause (4.a) to fail.
<<<<<<<<<<<<<<<<<<<<<<
[jorge] not sure if I understand your 4.a. The document specifies under what conditions D-PATH is added, and modified (new domain-id prepended). It also specifies the propagation between ISF SAFIs on Gateways in section 5. Can you please be more specific on what things you are missing so that we can clarify better? Maybe an example would help. Sorry if I’m missing something.
<<<<<<<<<<<<<<<<<<<<<<


3) Route selection process modifies the RFC4271 and may not scale

This draft modifies the RFC4271 to include D-PATH (page 17) without providing a solid
reasoning why it is necessary and why it scales.  Proof of the scalability may be included in another document or by public reports. As the topics of the ANRW indicates, BGP research for scalability of an application is always a “hot” research topic.

The definition of the BGP route selection changes (page 17)  #3 and 4 is not tightly defined using an example rather that specification. Any proposed changes to the BGP route selection should be done in formal language for changes to the text.

Language such as “could possible leave” or “by default” is not specific (page 17) is not specific enough.

<<<<<<<<<<<<<<<<<<<<<<
[jorge] About scale:
D-PATH was added to provide visibility and avoid loops in Service Provider networks, where multiple Gateways are deployed, for ISF SAFIs 128 and 70. So VPNs really. We later added SAFI 1, mostly due to PE-CE routes, but this is not envisioned to be used in the wide Internet, so I don’t think scale would be an issue. For SAFI 1 among Providers, the AS-PATH already provides the visibility and loop protection needed. Note that D-PATH is only added or modified in the context of an IP-VRF, and it is NOT modified by a router if no IP-VRF is present. We can add some text about this, if it helps?

About the BGP route selection changes, let me know if the following changes we made in rev 06 remove your concerns:

OLD:

<snip>
   4.  Steps 1-3 could possibly leave Equal Cost Multi-Path (ECMP)
       between non-EVPN and EVPN paths.  By default, the EVPN path is
       considered (and the non-EVPN path removed from consideration).
       However, if ECMP across ISF SAFIs is enabled by policy, and one
       EVPN path and one non-EVPN path remain at the end of step 3, both
       path types will be used.
<snip>

NEW:

<snip>

   4.  If Steps 1-3 leave Equal Cost Multi-Paths (ECMP)
       between non-EVPN and EVPN paths, the EVPN path MUST
       be considered (and the non-EVPN path removed from consideration).
       However, if ECMP across ISF SAFIs is enabled by policy, and one
       EVPN path and one non-EVPN path remain at the end of step 3, both
       path types MUST be used.

The above process modifies the [RFC4271] selection criteria to include
the shortest D-PATH so that operators minimize the number of Gateways
and domains through which packets need to be routed.
<snip>
<<<<<<<<<<<<<<<<<<<<<<



4) Error handling in Gateway PE (section 8)  between different AFI/SAFI prefixes is unclear

This draft defines translation between certain embedded prefixes see table below.  The interworking of the embedded prefix depends the basic error handling working correctly for embedded prefixes (#1) and the Domain Path (#2). Since these two items are unclear AND
I do not see definitions “well-formed but invalid” case is not covered for this draft.

AFI with SAFIs
1 – 1, 128
2 -  1, 128
25 – 70

Section 8 attempts to provide this rules as an example.  However section 8 requires the following syntax validity checks beyond well-formed:
1) It must be a ISF route from AFI/SAFI pairs + allowed by policy (?)
2) for gateway PE advertising ISF routes, must
    a) include a D-PATH attribute
    b) EVPN to other VPNS must append Domain with
2) The domain inside D-PATH must have a specific Domain-ID
3) determination on what Route Distinguisher or Route Targets are valid,
4) determination on what support for import/export of routes with different RD and RTs.

<<<<<<<<<<<<<<<<<<<<<<
[jorge] section 8 has been re-written in rev 06 clarifying the rules based on your feedback. Please let us know if this helps.
<<<<<<<<<<<<<<<<<<<<<<


5) Section 7 – normative or informative

It is unclear if section 7 provides normative details on the Route Reflector or informative.  It is also unclear if the EVPN forwarding constraints are normative or informative.
<<<<<<<<<<<<<<<<<<<<<<
[jorge] section 7 has been re-written in rev 06 to clarify this. Please let us know if this helps.
<<<<<<<<<<<<<<<<<<<<<<

Phrases like “as a consequence of this, the indirection provided by RT’s recursive resolution and its benefits in a scaled network, will not be available in all PEs in the network” (page 20) is worrisome.  If it is normative, then is this solution only partial?
<<<<<<<<<<<<<<<<<<<<<<
[jorge] We modified the text in rev 06. This is informative, and it simply says that if the gateway PE selects an IPVPN route for prefix P instead of an EVPN route, the EVPN specific attributes or NLRI fields are not available. Simply because IPVPN and EVPN routes are different.
<<<<<<<<<<<<<<<<<<<<<<


6) Section 11 security considerations needs to align with document

The proof of phrase “a correct use of the D-PATH will prevent control plane and data plane loops in the network”  exhibits facts not in evidence in the document.

The proof of the phrase “incorrect configuration of the DOMAIN-IDs on the gateway PEs may lead to the detection of false route loops and the blackholing of the traffic”  also exhibits facts not in evidence in the document.

The security considerations need to be based on a revised error handling.

It is appropriate to mention that stripping path attributes at a gateway will cause problems.
<<<<<<<<<<<<<<<<<<<<<<
[jorge] we modified the text to mention that last part in rev 06. I hope the rest is clarified with the modified sections 7 and 8. Let us know otherwise please.
<<<<<<<<<<<<<<<<<<<<<<