Re: [Idr] WG Adoption call for draft-wang-idr-rd-orf-05.txt (2/4/2021 to 2/18/2021)

"Jakob Heitz (jheitz)" <jheitz@cisco.com> Mon, 15 February 2021 21:05 UTC

Return-Path: <jheitz@cisco.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE03D3A1171 for <idr@ietfa.amsl.com>; Mon, 15 Feb 2021 13:05:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.7
X-Spam-Level:
X-Spam-Status: No, score=-7.7 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=fumMwWSj; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=pjXVWy/q
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5K0NClty6VLY for <idr@ietfa.amsl.com>; Mon, 15 Feb 2021 13:05:30 -0800 (PST)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C5C993A1172 for <idr@ietf.org>; Mon, 15 Feb 2021 13:05:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=58086; q=dns/txt; s=iport; t=1613423129; x=1614632729; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=1b05kyPzi86BwPPUEE7O5p8xs2TuS6ik4ghfqPebxyk=; b=fumMwWSj8UOnpPOdAnSXB4if3qA7YH0epmMHxkxVlSOiA3BZQYXz9wVE MZhHXg/tDcQoQNCDdkfE/h3dKJTToGSWIB0UZFIvEQIQdbYZ1R78EDFdp SXsiBeoALTqLdvL/74d8AUUhIAbZNEm1QYBidg7aftWTnVciqVTVC6gES Y=;
X-IPAS-Result: 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
IronPort-PHdr: 9a23:B1GZhhfrJ16O8k1FCiP/yyKFlGMj4e+mNxMJ6pchl7NFe7ii+JKnJkHE+PFxlwaTA9fH8PNChOrLuubnQ2NG6pDS+HwBcZkZURgDhI1WmgE7G8eKBAX9K+KidC01GslOFToHt3G2OERYAoDyMlvVpHDh8SUTHBr/KAMzIf76XIXU3Iy70umo8MjVZANFzDO2fbJ1KkCwqgPc/skbiIdvMOA/0BzM93BJYO9Rg2hvIAGe
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.81,181,1610409600"; d="scan'208,217";a="667086483"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 15 Feb 2021 21:05:28 +0000
Received: from XCH-ALN-002.cisco.com (xch-aln-002.cisco.com [173.36.7.12]) by alln-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 11FL5SSB014758 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 15 Feb 2021 21:05:28 GMT
Received: from xhs-aln-002.cisco.com (173.37.135.119) by XCH-ALN-002.cisco.com (173.36.7.12) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 15 Feb 2021 15:05:28 -0600
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-aln-002.cisco.com (173.37.135.119) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 15 Feb 2021 15:05:27 -0600
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Mon, 15 Feb 2021 16:05:27 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UydsHzwyr/rlhFc+DTaQ/GKV9x8/zvx25FKI/e1vzT880A2Z82COBqBBEIhVgHVnw/WIXZklhxCuxUY8uAwvimF+Oci5Kk4aq83xkmfMS8Ux6aeaLL87JKnkUAmQ3qXjON6tOtKfOWkdwzT4aWgcHmEMIiJXPhQytvspybmttFRBqk1Kb716ZrxYYttaDRXwZX1Qi5d4uW4FDIyctb4hqadninp9Il2wyBDn87BYhlWreXqnSm3s7QBcLiNegvKsjK/8uLnRn5LoNU/P1suYT+e3AhHmZR5lS8ahlSfZuJj1tSr8UCYgUQujV2EuFNQKoX8bXTwTGmMuxiOVC0vM7Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1b05kyPzi86BwPPUEE7O5p8xs2TuS6ik4ghfqPebxyk=; b=OeUbeak7+ZkTg4bka9mTLXIESsWng+1sRHfucqmFU1ITS7JEiopFaTyiRuRBLJl/rZSEwmdALQ28lL4FTosL6YSrPBPRNTTgtmkYCyD4uylOjw9HI8qa0mSXn1c3HyYlYViGy85I+TOiWnKp9kjhC9IBqByqh2v9Qr6pmKF1SdBTgZtn0r2LfEb/PijvzSdXcJ2I179inkhLBdGkGD/43qZ36NfFePBMGUOgbMeH0oejxUccLNXM/GPKjDyGRFlPs/DCXxzZa3/qQRx8K7hb/n/NBvsySDGBohimMioErSRcbNyTSRtbqk8oIPgg1DpRKlTF9QrtFnizsK5XeY6KuQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1b05kyPzi86BwPPUEE7O5p8xs2TuS6ik4ghfqPebxyk=; b=pjXVWy/qhNVF864sVKd0lF5T8IM7jFO3vwN1iWZhxXP6yOCD7MIBVxmOzYTX+TfBSm3/n/KLncPeTout7tC9akPC3PqmPKC4N+g9cfj5m+HRDlHu82rg0kxlJ1D5sXp99T3I5fJ1dxrRH6b+4sC5C6Bca/yvt0CscNrw0J9OQS0=
Received: from BYAPR11MB3207.namprd11.prod.outlook.com (2603:10b6:a03:7c::14) by BYAPR11MB3703.namprd11.prod.outlook.com (2603:10b6:a03:b2::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.23; Mon, 15 Feb 2021 21:05:26 +0000
Received: from BYAPR11MB3207.namprd11.prod.outlook.com ([fe80::c951:3ae4:1aca:9daf]) by BYAPR11MB3207.namprd11.prod.outlook.com ([fe80::c951:3ae4:1aca:9daf%3]) with mapi id 15.20.3846.035; Mon, 15 Feb 2021 21:05:26 +0000
From: "Jakob Heitz (jheitz)" <jheitz@cisco.com>
To: Aijun Wang <wangaijun@tsinghua.org.cn>, Robert Raszuk <robert@raszuk.net>
CC: Gyan Mishra <hayabusagsm@gmail.com>, Susan Hares <shares@ndzh.com>, "idr@ietf.org" <idr@ietf.org>
Thread-Topic: [Idr] WG Adoption call for draft-wang-idr-rd-orf-05.txt (2/4/2021 to 2/18/2021)
Thread-Index: Adb7C8Tapzr6LUQXS7CFnBh8kC9NpgErJwcAAA2IX4AABtfh4AADGMsAABAsvAAABQFagAABoDAAAAYO6gAAAJ++AAABFeiAAAg1DPAAANgVgAAHWbiAAAAbuIAAAO5rgAAB0DSRAAFo3wAAAKBhkAADDAmAAAjE3AAAB14KgAAG5E2AAACWNIAAAPA1gAAYm+mAABGrZoAAAj0/AAB1PdjA
Date: Mon, 15 Feb 2021 21:05:26 +0000
Message-ID: <BYAPR11MB32074D07524472026F6E1E62C0889@BYAPR11MB3207.namprd11.prod.outlook.com>
References: <CAOj+MMEbp3JtC9Mh4Uf6g2VPFbCmkrEuXQdd8C70J88XesTOUg@mail.gmail.com> <250BB47C-8DC3-4CBD-9574-CDF5A39E18F1@tsinghua.org.cn>
In-Reply-To: <250BB47C-8DC3-4CBD-9574-CDF5A39E18F1@tsinghua.org.cn>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: tsinghua.org.cn; dkim=none (message not signed) header.d=none;tsinghua.org.cn; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [2601:647:5701:46e0:c908:e7e4:1534:523e]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a1b12e70-9fab-4667-b784-08d8d1f56adb
x-ms-traffictypediagnostic: BYAPR11MB3703:
x-microsoft-antispam-prvs: <BYAPR11MB37030CC844732CF0D21E85DBC0889@BYAPR11MB3703.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB3207.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(346002)(366004)(39860400002)(376002)(136003)(66476007)(478600001)(76116006)(66946007)(64756008)(53546011)(6506007)(66556008)(66446008)(86362001)(7696005)(55016002)(186003)(5660300002)(4326008)(166002)(66574015)(966005)(8676002)(2906002)(9686003)(54906003)(110136005)(71200400001)(52536014)(33656002)(316002)(8936002)(83380400001)(30864003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: e/vtX0kBvb8/NIqyc3B/6hkwUBmrA6XRMJYPQjwuZS32or23qvoO251DmLuNq3XcmwuNM3FfIjuFBXoRs1qTKm+8BKpD9Obi8BpSwH9Ycj1rggOEcCYfWmSzH+GvYSlnX6smHOCWoalR97H8jCd/N9MBiLABMdGZFKnI/weRqQsMXQJnTX2EWRjlKzmH7M+wWUtq4nAhpuxyUSXYigyRlt4luYxf1MjilQ2Gs9EFj43Sy1BMqyZOJQyRh1sUetRlDpPHoi3K3QMRGR7WOtkE8TT0Qlo6XbnFgjU+cn+gzeLl5XNIolsbh1PjpflKrUvRWFdX+bP6bf0EtetLHID8CjCzM69u6861ZYK0v0mG4bEtw8fkymE7x7aBkN+QinJhM2+n86yVNVf+HeyuQw7Caf6qjH2+U5R/FpvPRUQl/AHDsUC0WUjEWW0AxxkSQaamdDuYA7Jog4G2PPfA+w3r14rwgtI5A/kkNvSTrpEAJ5+bnwMiESKOSxh/Rs4AspfgqYdmP1lp51lpPClPLOcP/oYGW1nEEwPN1wFCA+8xIMxbKEvWdByo0FIRon825YARIQ/4jl0/V+ODbkLaFiT0sz/5zDcgL2qZRPrAtVcWHa5/fVqHC+KVeFNwMcoSz9av15RyxL3WjmJNi78Ml5+GhZuPgcZZbAFh3RLuxYB+hSTqavsD3K+RRlk9FI3o2wqz2uZbSQ0BXWdrOP0Vw0MvXq0f5k6Af0BSccjJoAmnRMl02Y/fwsevqft2KR5Q+i8yRbe5U84UpK9BwWHxToZbdbyp8FdyuAWs0YMDUIwPhDmaGFLuu7hDKDkOzTDPsFOeusZ+jKvodPUJvldZZHO5SjLOVAie4xpCPRzcUe6o/FeUNftLfEhIsa02sB5V10nt8liqye+uKAkwpFDebzEgj1OYptK0Kb2ivKpLLxunGMXs0vHC8NH1vb/szxkAZQKtAB10ASRmZI2rLDPGMxGqGyji5mp+IrVZ8IQLB27VaSbacMM1jltPdM8+cQyVgIE34nyjHNQBCjZBKOTYzHk8f7ox9ezjp5ZwiYpUD5s+SSX6jf8two6xNcyAbW0kYbEj7Qur2+GjWUcBN6SyKGg1kQjwgBEiPt7k8pzVFRMMNUm2//N9sa1IgN1qPmaB1v5ytt1HOvor9l8kwSWpcNWE8bhi2HfdHCbcnV7hDNCWMN4xpffuKz8rP3dmoObMIfwfcuY3b0ExM/LntxVIicgMRop8m597v2c0gBKhf2E6ud07h2EzFJpIEbLtkzCEI6XHWRixOdjF7AX3+3vQWvKkjP2oInMwPmfTguQXHl7sF4BPCZaamWqAwQRQRobPocg0gDEGE4eQbfA0ODUobSs+3u6T/+cxMvlr68CJ12DSYxTpcNvErah4CnGbfSSztFan
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BYAPR11MB32074D07524472026F6E1E62C0889BYAPR11MB3207namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB3207.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a1b12e70-9fab-4667-b784-08d8d1f56adb
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Feb 2021 21:05:26.1902 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: T87GRhufKsyKtyIG0f+bZqJ+1EROwcsjr3YND3TFz27b0FQsnaCKOA5Jh3hFjPB8aj9djz55KyiOudD6IEKh3A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB3703
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.12, xch-aln-002.cisco.com
X-Outbound-Node: alln-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/wcBqVsQ_MdNGtrZDPP1VcVYJu7Q>
Subject: Re: [Idr] WG Adoption call for draft-wang-idr-rd-orf-05.txt (2/4/2021 to 2/18/2021)
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Feb 2021 21:05:34 -0000

I asked you for the facts Aijun.
Show me an outage caused by a PE having to drop incoming routes.
You have not shown me the facts.

Here's a fact:
Some time ago, I was debugging an issue with a customer of a route that went missing in a VRF.
The feed from a route reflector included over a million routes.
I asked them to do a clear bgp soft in to the route reflector.
They were very hesitant, because it might overload the CPU on the PE.
"Do it", I said. "Check the InQ and when it goes to zero, it's done".
Finally, they did it.
"Check the InQ" I asked them.
"It's zero. When will it start?" they replied.
"Check the route. Is it there now?" I asked.
"Hey, there it is".
It finished the million routes before they could check the InQ.
Why so fast?
Because the BGP receiver had very little inbound policy, did not have to process the incoming routes, except one,
because they already existed in the BGP table.
Where we see convergence issues is:
- when BGP has to download incoming routes to FIB (FIB prioritizes forwarding, not programming of routes)
- Heavy inbound route-policies (several MEGABYTES of configuration). It takes some time, but it works.
- Recomputing and changing bestpath and propagating the new paths out to many RR clients.

Receiving and matching on an RD to drop a route is just so trivial in comparison.

In your case, the PE has ALREADY received the excess routes. Your rd-orf just tells the the source not to send ANY MORE.
You know what happens then? The source sends a million withdraws that take similar processing power on the receiver.

Regards,
Jakob.

From: Aijun Wang <wangaijun@tsinghua.org.cn>
Sent: Saturday, February 13, 2021 4:46 AM
To: Robert Raszuk <robert@raszuk.net>
Cc: Gyan Mishra <hayabusagsm@gmail.com>; Jakob Heitz (jheitz) <jheitz@cisco.com>; Susan Hares <shares@ndzh.com>; idr@ietf.org
Subject: Re: [Idr] WG Adoption call for draft-wang-idr-rd-orf-05.txt (2/4/2021 to 2/18/2021)

Hi, Robert:
Let’s discuss based on the facts, not the exaggeration declarations.
Details replying inline below[WAJ]

Aijun Wang
China Telecom


On Feb 13, 2021, at 19:42, Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>> wrote:

All,

>   The problem we are trying to solve is a scenario where you have an offending PE that is flooding routes and a weak PE that is overwhelmed by a flood of routes.

The problem is a valid problem. But the proposed solution to the problem is not. And moreover solutions to this very problem are widely known and used for years.

The problem as a matter of fact has nothing to do with VPNs of any sort.

[WAJ] We have said clearly RD-ORF mechanism applying to the scenarios that inter-AS option B/C scenarios or the scenario within one AS when RR present. All of these situations have the following characteristics:
1. Several VPNs share one BGP sessions, where the BGP max-prefix is too coarse to do the fine-granularity control.
2.Junk VPN routes can’t be known in advance where the RTC and prefix-based ORF are not enough for the potential threats.
3. The network should react automatically/quickly to alleviate the threats, to give the chance for the operators step in before it leads other VPN services disrupted.

So, how you get the conclusion that it has nothing to do with VPN?


If you are ISP offering Internet transport unless you apply proper protection you would be badly exposed. Your clients or peers or upstreams injecting millions of routes and melting your network and perhaps even global Internet (if they would use a registered block).

And yes BGP ingress policy here is used to filter out junk before it enters any network. The same policy must be used in VPN cases too.
[WAJ] RD-ORF doesn’t  preclude the usage of other protection methods. I have said this point several time. Please remember this.


Indeed years have passed and I think I have only seen in a very few cases that operators offering L3VPNs are doing prefix ingress filtering ... Max prefix on ingress is used much more often. Those are the right tools here to work on. I am not saying we should not invent more ... we should.

[WAJ] OK.



Ideas:

* Customise secure BGP to work in VPN cases as example.

* Augment RRs to be a bit more intelligent with pitch of ML - if number of routes with given RD for time Tx is R moment you receive 100*R you suspend those and raise NOC alarm before spraying everywhere

[WAJ] RD-ORF mechanism is just one kind of ML capabilities, not only on RR, but also on other PE devices. We just want the network more intelligent and can cope with some extra situations automatically, not always static configuration.



* Do not put VPN customer routes into your data plane ... just handle next hops. Redefine RFC4364 all together and use IP transport for it.

etc ...

Focus on not allowing the meltdown is the proper solution space ... But here instead we do nothing to prevent the fire to start and instead focus on tools to extinguish it.

[WAJ] As you mentioned, there existing several methods to prevent the fire to start. But there still some chances the fire is ignited. Don’t you agree? RD-ORF can act as the spray system when the fire is beginning.


Wrong approach. And specifically this tool (RD-ORF) does way too much damage when used.

[WAJ] How to get this baseless conclusion? We have explained to your scenarios in previous mail. Do you have others or have still concerns the previous one?



Thx,
R.






On Sat, Feb 13, 2021 at 4:16 AM Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>> wrote:

All

From Susan Hares summary of where we are at with the adoption call let’s start with the problem this draft is trying to solve and gaining consensus.  Once we gain consensus we can get back to RD-ORF solution.  See w

a) the problem this draft is drafting to solve relating to BGP routes,
The problem we are trying to solve is a scenario where you have an offending PE that is flooding routes and a weak PE that is overwhelmed by a flood of routes.  This is not a normal situation and is an outage situation where the weak PE being overwhelmed by a flood of routes.  Do we all agree to the problem statement?

Why and why not?

b) the need for additional mechanisms to solve the problem,
Do other methods exist that can solve the problem and if not do we need a new mechanism to solve this?
RTC, Peer maximum prefix, VPN maximum prefix
c) a clear description of the technology to solve the problem.

Do we all agree that in a normal situation we would never filter on RD as that would partition the VPN which is unwanted and what Robert mentioned.  As this is not a normal situation but a unique situation where a weak PE is overwhelmed by a flood of routes.  How best can this be solved?



On Fri, Feb 12, 2021 at 10:32 AM Aijun Wang <wangaijun@tsinghua.org.cn<mailto:wangaijun@tsinghua.org.cn>> wrote:
Hi, Robert:
Yes, the behavior of the device should be determined. There maybe several factors to be considered for this local behavior, we should describe it more clearly in this section later.
We have discussed the differences between RTC and RD-ORF a lot. As Haibo mentioned, they are not exclusive to each other, and can be used together in some situations. But they are different and can’t replace each other.
Aijun Wang
China Telecom


On Feb 12, 2021, at 23:04, Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>> wrote:

Sorry Aijun,

What you say is just handwaving. There is no room for it in any spec.

When code is written PE must deterministically behave so the RR or any other network element.

Statements "decisions of PE2 to judge" are not acceptable in protocol design.

Just imagine that each PE does what it feels like in a distributed network .... Same for BGP same for IGP etc ....

And all of this is not needed if on ingress between PE1 and HQ1 you apply max prefix of 2 or even 100. It is also not needed if you enable  RTC to send RT:TO_HUB from PE2 to RR.

But I understand - no matter what we say or how much we spend time to explain why this idea is a bad idea you are still going to push this fwd. Oh well ...   If I were you I would spend this time to redefine L3VPN such that customer routes are never needed to be sent to SP core routers.

Thx,
R.


On Fri, Feb 12, 2021 at 3:47 PM Aijun Wang <wangaijun@tsinghua.org.cn<mailto:wangaijun@tsinghua.org.cn>> wrote:
Hi, Robert:

https://datatracker.ietf.org/doc/html/draft-wang-idr-rd-orf-05#section-5.1.1 has described such situations, which will require the additional local decisions of PE2 to judge whether to send the RD-ORF message out.
In your example, if only the HUB VRF exceed but the resources of PE2 is not exhausted, then the PE2 will not send the RD-ORF message. It may just discard the excessive 100000/32 routes.
If the resources of PE2 is nearly exhausted, it must send the RD-ORF message out. Or else not only the Spoke VRF, but also other VPNs on this device can’t be used.

Regarding to RR, it is the same principle: if RR can cope with such flooding, it need not send out RD-ORF to PE1. If RR can’t cope with, it must send out the RD-ORF message, or else not only the VPN that import RD X1 routes can’t work, but also other VPNs that don’t import RD x1 routes.

RD-ORF mechanism just keep the influences as small as possible.

Wish the above explanation can refresh your review of this draft.

We are also hopeful to invite you join us to make RD-ORF mechanism more robust and meet the critical challenges.
Aijun Wang
China Telecom


On Feb 12, 2021, at 19:30, Robert Raszuk <robert@raszuk.net<mailto:robert@raszuk.net>> wrote:

Aijun & Gyan,

Let me try one more (hopefully last time) to explain to both of you - and for that matter to anyone how supported this adoption.

Let's consider very typical Hub and Spoke scenario as illustrated below:

<image.png>


HQ1 is advertising two routes:

- one default with RDX1 with RT TO_SPOKE
- one or more specifics with RDX1 to the other HUBs

Now imagine HQ1 bought a new BGP "Optimizer" and suddenly is starting to advertise 100000 /32 routes just to the other HUB with RT: TO_HUB.

<image.png>



So PE2 detects this as VRF with RDX2 on it got overwhelmed during import with RT TO_HUB and starts pushing RDX1 (original RD) to RR to stop getting those routes.

Well all great except now you are throwing baby with the water as all spokes attached to PE2 which just import default route to HUB HQ1 also can no longer reach their hub site as their default route will be removed. Therefor they will have nothing to import with RT:TO_SPOKE

Further if RR "independently" decided ... oh let's push this ORF to PE1 then all of the spokes attached to perhaps even much more powerful PE3 can also no longer reach their headquarters.

- - -

Summary:

The above clearly illustrates why the proposed solution to use RD for filtering is in fact harmful.

See when you design new protocol extensions the difficulty is to not break any existing protocols and deployments.

Hope this puts this long thread to rest now.


Thx,
Robert

--

[http://ss7.vzw.com/is/image/VerizonWireless/vz-logo-email]<http://www.verizon.com/>

Gyan Mishra

Network Solutions Architect

M 301 502-1347
13101 Columbia Pike
Silver Spring, MD