[Idr] Re: AD Evaluation of draft-ietf-idr-vpn-prefix-orf-23
Ketan Talaulikar <ketant.ietf@gmail.com> Wed, 24 December 2025 15:03 UTC
Return-Path: <ketant.ietf@gmail.com>
X-Original-To: idr@mail2.ietf.org
Delivered-To: idr@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 6B0B99EFA9C8 for <idr@mail2.ietf.org>; Wed, 24 Dec 2025 07:03:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.098
X-Spam-Level:
X-Spam-Status: No, score=-1.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, FREEMAIL_REPLY=1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Dr0NKMg6jZZ for <idr@mail2.ietf.org>; Wed, 24 Dec 2025 07:03:05 -0800 (PST)
Received: from mail-pl1-x630.google.com (mail-pl1-x630.google.com [IPv6:2607:f8b0:4864:20::630]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id EC8E49EFA9AE for <idr@ietf.org>; Wed, 24 Dec 2025 07:03:04 -0800 (PST)
Received: by mail-pl1-x630.google.com with SMTP id d9443c01a7336-2a0d06ffa2aso73224175ad.3 for <idr@ietf.org>; Wed, 24 Dec 2025 07:03:04 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1766588584; x=1767193384; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=0gPZnLUquyQRcr8pHiGilxq7eWqMV4eZuK8i11LDSJ8=; b=bE0QV1HEQvPrYBP3DQENoTzchYOcOmA5YODNm2G2RWqlOmYtBGdTKSR6hZbSDttb24 0JhRHreMoMop9NBtfRYcV8TjTWQsjyLcH4lmZCkfsNtuTvAr3IRvXJGZNT7eq1YCPUW7 KBNNxiXafJa4H2MGEFHNSAWIj29qYOyBHWZJTdMVShXJ3FoQt5M3rd0xXbOj9V29rZOF 8HYaQtjLyNpd8QnZxORo50kzw7AGcuwBt+CbnB6VI7gZNs7JZHy02TiKCRZkGb4pkNCZ 4qkSNbIxtZlgIcBGlOU5ChVElNIKDDp/lS9PLIEG4/JAxTPMvBEiBPzt/1Ciq7/Nryd1 Exfg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1766588584; x=1767193384; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=0gPZnLUquyQRcr8pHiGilxq7eWqMV4eZuK8i11LDSJ8=; b=jqoxMOHpXwqlYygL1U+/Lhcu0IbKe1oaym6AQeiMJCj4bog5mwJqpWw4mSoF6WLLiE WP8zoD4cga6nuqn/g9PtaAXw6On2jDMCsZ7WEh8BlCTGNdRrHSXzGAsNoiI0bHVeuXa1 IGV/rvpGHcrBnz0eLrvkaGW34I6spkjK40rk1VvXvrTs3Psm05eEoBECkrObcThPSceu ZXJ9hECuOx7WI9iaF0OA+hN/HBbDdMqlK1+imbZwPs/GW8FB0g5xrdDLe1Vy/Bq3gzx+ ZZMDkPqsfhGX5ApYz1phnENF+9WGPvACFO02/R8IgYT1idN3BqUsDxSLJ1gU8C1NbHNa WBhQ==
X-Gm-Message-State: AOJu0YyTfP2xhXCVNcc05exRTercvglJ784UtBaLvA3Mp26xy81+Wi16 VeDZnNRbTAfFwShMmFLDRZWBqOWppBDtdPD9uGUGpGPxchrA4VtGbliVYaF0jgNpNTVCc2HhTIt xPzIgJ5l2/bGZh6uwd6hgYRzwcPoFVoUDdA==
X-Gm-Gg: AY/fxX6hvZWKMc6M3s++Bdk5+RmVL1Kx+ni4HcAHtCWRfzifETjImvWI744TcOWt3fl edrmeOqbsI1OId40shOuBpgMP9ZaQ1aiB4hpuoeYynfRKGKZ8iJ7C5ZYouav4ZYfbcM9mKTLaxp tlL7GQYQuLSl9lkScVxJM9ncqH/FhMtBYAMyjGHc7mYmi4Tr7MvVEY5u/mNzb7jNZWnNG3D4U54 P2I0hTVZnbQf7feQIp+t44CLFp1FhVOKTiR0msS04ItiMo9yZ+n9ZwvLTXMm9x/ZKJmsdk=
X-Google-Smtp-Source: AGHT+IGl5ZGOrqP3FcWNiYtzvfNoKZtDRvbvXAm/gkAwQD9E7+LJOf1K9uzi/hxCd8T7lMyTJ65S8zid+s73JbFifs4=
X-Received: by 2002:a17:902:ef12:b0:295:5da6:600c with SMTP id d9443c01a7336-2a2f2206644mr198732855ad.2.1766588583205; Wed, 24 Dec 2025 07:03:03 -0800 (PST)
MIME-Version: 1.0
References: <CAH6gdPzt3PXUUmzUFBUR=QUmCGAAYVGfjs_z7f04h3DiD0QKtA@mail.gmail.com> <tencent_D9F9D9E432C9A23ADAD4DB3FF52CE692E709@qq.com> <CAH6gdPxPxfnh5ro6WBAf0=9=t_DNC5+ufu0z29s5pH=OFyW7ug@mail.gmail.com> <tencent_1912B6A44CCA28D1B6A8F640BDF3B9E4F907@qq.com>
In-Reply-To: <tencent_1912B6A44CCA28D1B6A8F640BDF3B9E4F907@qq.com>
From: Ketan Talaulikar <ketant.ietf@gmail.com>
Date: Wed, 24 Dec 2025 20:32:52 +0530
X-Gm-Features: AQt7F2prbzZbtFVdsGfGxCOwlYy2meBJt4f1F68-q2sdm7c2Y9H5GV6FvOD4kXA
Message-ID: <CAH6gdPxxRT-PdL9QyA_tv_yzC23ktVTx11kjoNHK914CKTaB5g@mail.gmail.com>
To: Wei Wang <weiwang94@foxmail.com>
Content-Type: multipart/alternative; boundary="000000000000f75ed20646b3f476"
Message-ID-Hash: DEHLB7RBJYKVBDPCEYD5SDBJXZTRI5HG
X-Message-ID-Hash: DEHLB7RBJYKVBDPCEYD5SDBJXZTRI5HG
X-MailFrom: ketant.ietf@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-idr.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: idr <idr@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Idr] Re: AD Evaluation of draft-ietf-idr-vpn-prefix-orf-23
List-Id: Inter-Domain Routing <idr.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/zBUvcYEo5SV1yXq_1rdjDrtkIdY>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Owner: <mailto:idr-owner@ietf.org>
List-Post: <mailto:idr@ietf.org>
List-Subscribe: <mailto:idr-join@ietf.org>
List-Unsubscribe: <mailto:idr-leave@ietf.org>
Hi Wei, Thanks for your response and for posting the update. I'll get back to this after my holiday break in the first week of January. Thanks, Ketan On Wed, Dec 24, 2025 at 12:08 PM Wei Wang <weiwang94@foxmail.com> wrote: > Hi Ketan, > > The lastest version of draft-ietf-idr-vpn-prefix-orf has been uploaded ( > https://datatracker.ietf.org/doc/draft-ietf-idr-vpn-prefix-orf/) Your > comments have been addressed. And please also see my inline replies with > *[WW].* > > Best Regards, > Wei > Original > ------------------------------ > From: Ketan Talaulikar <ketant.ietf@gmail.com> > Date: 2025-12-22 13:34 > To: Wei Wang <weiwang94@foxmail.com> > Cc: idr <idr@ietf.org> > Subject: Re: [Idr] AD Evaluation of draft-ietf-idr-vpn-prefix-orf-23 > > Hi Wei, > > Thanks for your response. I was waiting for an update to be posted but > perhaps you were waiting for my reply before doing so. > > Please check inline below with KT for some clarifications and follow-ups. > I am only replying to open items and please proceed with your changes for > the ones where we have reached an agreement. > > > On Thu, Dec 4, 2025 at 2:30 PM Wei Wang <*weiwang94@foxmail.com > <weiwang94@foxmail.com>*> wrote: > > Hi Ketan, > > Thanks for your careful review and valuable comments. Please find my > in-line replies with* [WW]*. > > Best Regards, > Wei > > Original > ------------------------------ > From: Ketan Talaulikar <*ketant.ietf@gmail.com <ketant.ietf@gmail.com>*> > Date: 2025-11-22 14:47 > To: draft-ietf-idr-vpn-prefix-orf <*draft-ietf-idr-vpn-prefix-orf@ietf.org > <draft-ietf-idr-vpn-prefix-orf@ietf.org>*> > Cc: idr@ietf. org <*idr@ietf.org <idr@ietf.org>*> > Subject: [Idr] AD Evaluation of draft-ietf-idr-vpn-prefix-orf-23 > > Hello Authors/WG, > > I've done the review as part of AD evaluation > of draft-ietf-idr-vpn-prefix-orf-23 and would like to share the same with > you. > > Summary: The document needs some more work - editorial as well technical - > before it can be progressed further. > > technical tldr: > 1) Mischaracterization of existing solutions in this space > 2) Normative procedures with BCP14 keywords provided as examples instead > of standalone normative text > 3) Allocating one of 5 reserved bits in ORF common header for this new > type specific purpose (and not doing that via IANA registry) > 4) Mix of protocol procedures, operational and deployment considerations > that results in lack of clarity and important details not getting called > out prominently > 5) Procedures specified as pseudocode but missing several conditions and > gaps in logic > 6) Aspects related to manageability considerations for quotas (which might > require provisioning support on routers?) and the requirements on operators > for their management seem under specified > > Please find below my comments in the idnits output of v23 of this > document. The end of the review is marked by the tag <EoRv23> > > Thanks, > Ketan > > 2 IDR Working Group W. Wang > 3 Internet-Draft A. Wang > 4 Intended status: Experimental China Telecom > > <major> The document is missing the rationale for why it is to be > published > on the experimental track as opposed to the proposed standard track. > There > is Appendix A that is describing the experimental topology. I assume that > this > draft is describing an experiment that is to be carried out. Please > correct me > if I am wrong. If it is describing an experiment, then I suggest that > Appendix A > be more generalized to describing the experiment, its goals/motivation, > how it > is desired to be conducted, success criteria, etc. Then, there can be a > sentence > at the end of the introduction section which points to this appendix. > *[WW]: Since no vendor implementations existed when the draft is adopted > as a WG draft, it was approved as an experimental track following > discussions. I have observed that all existing standards defining new ORF > types are under the standard track, and thus I would like to inquire > whether this document can be reclassified into the standard track?* > > > KT> I would bring up this topic after we have completed the changes and > the discussion of this review. For now, as suggested by Keyur, please > retain the track as Experimental and provide the reasons as suggested in an > appendix. > * [WW]: Thank you! This proposal has been added in appendix A.* > > > 16 Abstract > > 18 This draft defines a new type of Outbound Route Filter (ORF), known > > <major> s/a new type/an experimental type ... similar in introduction > *[WW]: Done.* > > 19 as the Virtual Private Network (VPN) Prefix ORF. The VPN Prefix ORF > 20 mechanism is applicable when VPN routes from different Virtual > 21 Routing and Forwardings (VRFs) are exchanged through a single shared > > <minor> s/Forwardings/Forwarding instances ? > *[WW]: Done.* > > 22 Border Gateway Protocol (BGP) session. > > <major> The abstract should also mention the purpose of this experimental > ORF > type. > *[WW]: We will add the purpose in abstract as follows:* > *"The purpose of VPN Prefix ORF mechanism is to control the overload of > VPN routes based on RT. With this mechanism, the overload can be limited > within the minimum range."* > > > 94 which consequently affects the route processing performance of other > 95 normal VRFs (such as route dropping, processing delays, and abnormal > > <minor> what is "normal" here? Suggest omitting that word. > *[WW]: the word "normal" will be deleted.* > > 96 customer services). That is to say, the excessive VPN routes > 97 advertisement SHOULD be controlled individually for each VRF in such > 98 shared BGP session. > > <major> This looks like an incorrect usage of a BCP14 keyword. How about: > > Therefore, it is desirable that the excessive VPN routes advertisement be > controlled individually for each VRF in such a shared BGP session. > *[WW]: Done.* > > 114 However, there are limitations to existing solutions: > > <major-editorial> Suggest to introduce a new top-level section called > "Existing > Solutions" and in there create sub-sections where each of the solution is > identified (the bullet list above) along with its limitation (the text > under > each numbered item below). This section can be just before the new > mechanism is > described (i.e., current section 4). I believe this would improve the > readability > of this document. > *[WW]: We will added a new section to describe the limitations of the > existing solutions.* > > 116 1) Route Target Constraint > > 118 RTC can only filter the VPN routes from any uninterested VRFs, if the > 119 "offending routes (prefixes)" come from an interested VRF, the RTC > 120 mechanism can't filter them. > > <major> Suggest to rephrase to avoid use of "offending" throughout this > document. > How about "route overload" or something like that which describes the > nature of > these routes in a more technical manner? "Offending" is not a technical > term. > *[WW]: We will modify the descriptions in -v24.* > > 122 2) Address Prefix ORF > > 124 Using Address Prefix ORF to filter VPN routes requires a pre- > 125 configuration, but it is impossible to know in advance which prefix > 126 MAY exceed the predefined threshold. > > <major> Incorrect use of BCP14 keyword. s/MAY/may > *[WW]: Done.* > > 135 CP-ORF is applicable in Virtual Hub-and-Spoke[RFC7024] VPN and also > 136 BGP/MPLS Ethernet VPN (EVPN)[RFC7432] networks, but its primary > 137 function is to retrieve interested VPN prefixes and it cannot be used > 138 to filter overwhelmed VPN prefixes dynamically. > > <minor> s/overwhelmed/overload of ? > *[WW]: Done.* > > 140 4) PE-CE edge peer Maximum Prefix > 141 The BGP Maximum-Prefix feature is used to control how many prefixes > 142 can be received from a neighbor. By default, this feature allows a > 143 router to bring down a peer when the number of received prefixes from > > <major> This is a mischaracterization. Peer down is not the only solution. > You > can check various implementations from major vendors. You can also refer to > *https://www.rfc-editor.org/rfc/rfc4271.html#section-6.7 > <https://www.rfc-editor.org/rfc/rfc4271.html#section-6.7>* > > When the upper bound is reached, the > speaker, under control of local configuration, either (a) discards > new address prefixes from the neighbor (while maintaining the BGP > connection with the neighbor), or (b) terminates the BGP connection > with the neighbor. > > *[WW]: Thanks for your information! We will modified the content as > follows:"The BGP Maximum-Prefix feature is used to control how many > prefixes can be received from a neighbor. By default, this feature allows a > router to drop overloading routes or bring down a peer when the number of > received prefixes from that peer exceeds the configured Maximum-Prefix > limit. "* > > > KT> Sure but that is not sufficient by itself since it does not mention > the part about discarding newer prefixes. So, please reword to include that > behavior and then explain why the new ORF type is better than this feature. > *[WW]: We have added more explainations in Section 3.4.* > > > > 147 from different VRFs will share the common fate. If the number of VPN > 148 routes of a certain VPN exceeds the configured Maximum-Prefix limit, > 149 the BGP session will be shut down, which will affect the operation of > 150 other VPN routes transmitted via this BGP session. > > <major> There also seems to be a mischaracterization here. I had the > impression > that this option was about putting the limit on the PE towards the CE > (which > is an eBGP IPv4/IPv6 unicast afi/safi session) and is for a specific > VRF/VPN. > *[WW]: Actually, within this draft, the VPN Prefix ORF primarily operates > between PEs and RRs, which affects routes across multiple VPNs.* > > > KT> I understand that. However, the document in this subsection claims > that the max-prefix limit (which is between PE and CE) is insufficient. > Please correct the text in this section and then explain why the new ORF > type is better. > *[WW]: We have modified the contents of Section 3.5.* > > > > > 152 5) Configuring the Maximum Prefix for each VRF on edge nodes > > 154 When a VRF overflows, it stops the import of routes. Any additional > 155 VPN routes are held into its Routing Information Base (RIB). > > <major> This is implementation specific and may not always be the case. > Perhaps > fix this text to say "... some implementations may ...". > *[WW]: Done.* > > 156 However, PEs still need to parse the incoming BGP messages. This > 157 will cost CPU cycles and further burden the overflowed PE. > > <major-editorial> In continuation of a previous comment, the rest of this > section > below belongs in the introduction. You could also put a forward reference > to > the new section where analysis of existing solutions is provided. > *[WW]: Done.* > > 169 The purpose of this mechanism is to control the outage within the > > <minor> perhaps s/outage/overload ? > *[WW]: Done.* > > 176 2. Conventions used in this document > > 178 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", > 179 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this > 180 document are to be interpreted as described in [RFC2119] . > > <major> Please update to the latest BCP14 template and consider > introducing as a > section 1.1 "Requirements Language" or something like that. > *[WW]: Done.* > > 190 * BGP: Border Gateway Protocol, defined in [RFC4760] > > <major> It should be RFC4271 > *[WW]: Done.* > > 215 4. The general procedures of VPN Prefix ORF mechanism > > <major-editorial> I see an issue with the organization of sections 4, 7, > 8, and > 10. First, there are the protocol procedures - Tx side how ORF entries are > triggered, encoded and sent, Rx side how ORF entries are handled and > corresponding actions taken for the route-refresh processing and subsequent > propagation of the VPN routes. Second, there are deployment considerations, > same/unique RD, RT usage, intra-AS, inter-AS, etc. - those can be captured > in its own section. Finally, there are the operational considerations which > is what the operator needs to bear in mind on how to provision (e.g., > quotas), > design, manage (manual clearing of ORF entries), and monitor (looking at > alerts). > *[WW]: The structure will be adjusted in -v24.* > > 289 For intra-AS VPN deployment, there are three scenarios: > > 291 * RD is allocated per VPN per PE, each VRF only import one RT (see > 292 Section 4.1.1). > > 294 * RD is allocated per VPN per PE. Multiple RTs are associated with > 295 such VPN routes, and are imported into different VRFs in other > 296 devices(see Section 4.1.2). > > 298 * RD is allocated per VPN, each VRF imports one/multiple RTs (see > 299 Section 4.1.3). > > <minor> Can this be simplified to say that there are 2 main RD allocation > schemes - unique RD (per VPN, per PE) and the same RD (per VPN, same on > all PEs)? > *[WW]: Yes. We will simplify the schemes in -v24.* > > 304 4.1.1. Scenario-1 and Solution (Unique RD, One RT) > > <major> Sections 4.1.1, 4.1.2 and 4.1.3 are all examples but contain > normative > text with BCP14 languages. This is not appropriate. Normative text on > procedures > need to stand on their own. The examples can be described in an informal > language > and moved into the appendix. When working on the normative text for all 3 > of these > sections, I am hoping that you would see the commonalities and that there > can be > a single normative procedure that is independent of the RD and RT design. > After > all, in the BGP code, I am assuming there won't be any checks on whether > the > deployment design is using same or unique RD and how RTs are used? > *[WW]: We will modify the descriptions and move them into the appendix.* > > > 339 If quota value is not set on PE1, and each VRF has a prefix limit on > > <major> What is this quota value? It is used in several places in this > document > but not formally defined (closest match is in the operational > considerations). > Perhaps this can be added in the Terminology section? Then, this quota > mechanism > needs to be specified in this document along with its > provisioning/manageability > requirements - perhaps as its own separate section and before this quota > starts > to get used in the procedures section. > *[WW]: The definition of quota is described in Operational Considerations > as:"Quota is a threshold to limit the number of VPN routes under specific > granularities (such as <PE>, <RD, Source AS>)."* > *We will move this definition in Terminology.* > > 607 5. Source PE Extended Community > > 609 We usually use next hop to identify the source, but it MAY NOT be > 610 useful in the following scenarios: > > <major> MAY NOT is not a valid BCP14 keyword. Perhaps s/it MAY NOT be/it > is not > Also, that claim/statement is incorrect - perhaps say ... Next hop does not > always identify the source ...? > *[WW]: Done.* > > 627 The AS number of source PE can be conveyed by Source AS Extended > 628 Community, as defined in [RFC6514] > > <major> Is the Source AS EC always required to be included along with the > Source PE EC? Or is it only required in multi-AS deployments where BGP > RIDs are > not unique? > *[WW]: Source AS EC is only required in inter-domain scenario.* > > > KT> Please clarify that. > *[WW]: Done.* > > > > 660 The SPE EC SHOULD be attached by source PE, or else the RR SHOULD > 661 attach it, with the value set as the router-id of source PE. When > 662 none of them attach the SPE EC, the ASBR SHOULD attach it when the > 663 packet leaves the source AS, with the value set as the ORIGINATOR_ID. > > <minor> The above paragraph is duplicating the bullet list above it. > Please > consider consolidating both? > *[WW]: We think bullet list is more clear and easy to understand, so we > will delete the text below the bullets.* > > 665 This section updates route reflection procedures, which means > 666 [RFC4456] needs to be updated. > > <major> I don't think the above statement is correct. If you agree, please > remove > it. Please let me know if I am missing something and if you really want > this > document to update that standards track RFC. > *[WW]: The behavior of RR is defined in RFC 4456. SPE EC is a new type of > information that RRs are required to carry, which is not specified in RFC > 4456. Therefore, we think an update to RFC 4456 is necessary.* > > > KT> It is not "updating" but "extending" the RR behavior i.e., there is > nothing wrong with the RR behavior in RFC4456 but if someone wants this new > feature extension then the RR needs to do something additional. Please > clarify as otherwise, this document would need to have the "updates" > metadata tag for RFC4456 and I don't think that is needed. > *[WW]: The contents of this part has been reworded.* > > > > > > 668 6. VPN Prefix ORF Encoding > > <major-editorial> I would recommend that this section (as well section 5) > before > section 4 so the reader has seen and understood the ORF type before they > start > reading the procedures. Also, this will avoid repetition of the same > information > (e.g., take the default ORF entry) that is repeated in both the sections. > *[WW]: We will do this modification in -v24.* > > 670 In this section, we defined a new ORF type called VPN Prefix Outbound > 671 Route Filter (VPN Prefix ORF). The ORF entries are carried in the > 672 BGP ROUTE-REFRESH message as defined in [RFC5291]. A BGP ROUTE- > 673 REFRESH message can carry one or more ORF entries. The ROUTE-REFRESH > 674 message which carries ORF entries contains the following fields: > > <minor> Can you please rephrase the above to indicate that none of this is > new > and the description below is how the VPN Prefix ORF is encoded in the > refresh > message format of RFC5291. > *[WW]: The descriptions will be changed to:* > *"In this section, we describe the encoding of VPN Prefix ORF entries. > The VPN Prefix ORF entries are carried in the BGP ROUTE-REFRESH message as > defined in [RFC5291]. A BGP ROUTE-REFRESH message can carry one or more > ORF entries. The format of a ROUTE-REFRESH message which carries VPN > Prefix ORF entries are as follows:"* > > 676 * AFI (2 octets) > > 678 * SAFI (1 octet) > > <minor> Some of the settings of these fields are repeated further below in > this > section itself. Please update that text here so that everything is in one > place. > *[WW]: Done.* > > > 686 A VPN Prefix ORF entry contains a common part and type-specific part. > 687 The common part is encoded as follows: > > 689 * Action (2 bits): the value is ADD, REMOVE or REMOVE-ALL > > 691 * Match (1 bit): the value is PERMIT or DENY > > 693 * Offending VPN routes process method (1 bit): if the value is set > 694 to 0, it means all offending VPN routes on the sender of VPN > 695 Prefix ORF message SHOULD be withdrawn; if the value is set to 1, > 696 it means the sender of VPN Prefix ORF message refuse to receive > 697 new offending VPN routes. The default value is 0. > > <major> Looks like this document is allocating one of the reserved bits > from > the common part of the ORF container that would be applicable not just for > this > new ORF type but all ORF types. Now RFC5291 did not create an IANA registry > for these reserved bits, but perhaps there is now a need to create an IANA > registry for this 8-bit field to perform this allocation. This is going to > take > some work and might be challenging given the experimental status of this > document. Another option is to do this via signaling in the type-specific > portion below since I don't see the technical merit of burning a common > bit for something type-specific. The authors and WG will need to decide > this. > *[WW]: We prefer to change this draft to standard track, and create an > IANA registry for this field.* > > > KT> Please create an IANA registry for this field for now. We can discuss > the change to standards track further down the line as discussed above. > *[WW]: Done.* > > > > 699 * Reserved (4 bits) > > <minor> It would be very helpful if there was a figure showing all of the > above > fields just like the Figure 5 below. > *[WW]: Done.* > > 762 * If the AFI is set to L2VPN, the SAFI MUST be set to BGP EVPN. > > <major> The document does not specify which EVPN Route Types this ORF type > is > applicable for. > *[WW]: This is just an example. SAFI cannot specify the EVPN Route Types.* > > > KT> Since the document is specifying the use of this extension for EVPN, > it is required to specify which of the current route types this is > applicable for. e.g., is it only applicable for RT5 or also for RT2 and to > specify that it only applies to the specific IP prefix fields in the NLRI > for those types? > *[WW]: VPN Prefix ORF mechanism is applicable for all types of EVPN routes > as defined in RFC7432. This is also clarified in -v24.* > > > > 782 Source PE TLV is defined to identify the source of the VPN routes. > 783 For the sender of VPN Prefix ORF, it will check the existence of SPE > 784 EC. If it exists, the sender will put it into Source PE TLV. > > <minor> Perhaps ... check the existence of SPE EC on the VPN route being > matched. > *[WW]: Done.* > > 788 The Source PE TLV SHOULD only appear once within an individual ORF > 789 entry. If one ORF entry contains multiple Source PE TLVs, it SHOULD > 790 be ignored. > > <major> all should be ignored? first considered and rest ignored? > *[WW]: Multiple Source PE TLV appear in one VPN Prefix ORF entry is an > error. And it's hard to determine which one shoud be considered. So we > think it's better to ignore all of them.* > > > KT> Sure - either option works. I am just asking that this be clarified - > e.g., perhaps ... s/it SHOULD be ignore/all MUST be ignored > *[WW]: Done.* > > > > > 792 The source PE TLV contains the following types: > > <major> What is meant by "contains" here? Are these sub-TLVs? I assume > there are > 3 types of TLVs used for identifying the "source". If so, please clarify > this > entire section starting with the title. > *[WW]: Done.* > > 794 * IPv4 Source PE TLV: Type = 1 (suggested), Length = 4 octets, value > 795 = next hop address in IPv4 format. > > <minor> Since this is a new TLV space, there is no need to say "suggested" > next > to each entry. This applies to all the TLVs and also in the IANA > considerations. > *[WW]: Done.* > > 797 * IPv6 Source PE TLV: Type = 2 (suggested), Length = 16 octets, > 798 value = next hop address in IPv6 format. > > <major> Only global IPv6 addresses allowed? > *[WW]: All IPv6 addresses are allowed.* > > > KT> How would link-local or multicast addresses work? Does ULA work? > *[WW]: We think we can constraint it to global IPv6 address.* > > > > > 800 * Source PE identifier TLV: Type = 3 (suggested), Length = 4 octets, > 801 value = the value of ORIGINATOR_ID in Source PE Extended > 802 Community. > > <question> At this point, the document is experimental. I don't see any > implementation reporting support for any of the Source PE TLVs. And I > already > find 3 types of TLVs! Seems complicated to me. Why not just have the > Source PE identifier TLV alone in this experiment? If/when this becomes > standard > track, you may add the other types if they are really determined to be > necessary? > *[WW]: This is related to the first question. Maybe we can discuss about > whether this draft can be changed to standard track before we put it > forward.* > > > KT> It is not really related. The question was if all these types were > found to be necessary in the experimentation done so far? If yes, it is ok > to keep them. But I see no one has implemented even one of these types and > hence the question if 3 types are needed. > *[WW]: Since different types of address has different length (e.g. ipv4 > address vs ipv6 address). I'm not sure how can we merge them into one type? > To define a type with a variable lenth?* > > > > 818 6.3. Route Target TLV > > 820 Route Target TLV is defined to identify the RT of the offending VPN > 821 routes. RT and RD can be used together to filter VPN routes when the > 822 source VRF contains multiple RTs, and the VPN routes with different > 823 RTs MAY be assigned to different VRFs on the receiver. The Route > 824 Target TLV contains the following types: > > 826 Type = 5 (suggested), Length = 8*n (n is the number of RTs that > 827 the offending VPN routes attached) octets, value = the RT of the > 828 offending VPN routes. If multiple RTs are included, there MUST be > 829 an exact match. > > <major> And if only one RT is present in this TLV and there are multiple > RTs on > the VPN route? Please clarify. > *[WW]: If this TLV contains only one RT but multiple RTs are configured on > the VPN route, the device should check whether the RT included in this TLV > exists among the multiple RTs configured on the VPN route. If it exists, > the device should filter out the VPN route.* > > > KT> Please clarify this in the text. > *[WW]: Done.* > > > > 831 7. Operation process of VPN Prefix ORF mechanism on receiver > > <major> This isn't an operational process but more like a protocol > procedure > on the router receiving these ORF entries. The title is misleading. More > importantly, what are the similar procedures on the sending side? > > *[WW]: We will change the title of this section to "Protocol > procedures".The procedure of the sender is described based on three > scenarios in Section 4. * > > 833 The VPN Prefix ORF is used mainly to block the unwanted BGP updates. > 834 When the receiver receives VPN Prefix ORF entry, it SHOULD check > 835 first whether the "Match" bit is "DENY" or not. > > 837 If the "Match" bit is "PERMIT", and is the "default" entry (the > 838 offending VPN routes process method equal to 0, sequence equal to > 839 0xFFFFFFFF, length is equal to 8, and Route Distinguisher is equal to > 840 0), the entry SHOULD be installed. Otherwise, if the "Match" bit is > > <major> Why SHOULD and not MUST? Isn't this essential? > *[WW]: Will be changed to "MUST".* > > 841 "PERMIT", the entry SHOULD be discarded and a warning SHOULD be sent > 842 to the operator. > > <major> Why SHOULD and not MUST? > *[WW]: Will be changed to "MUST".* > > 844 The following procedures will only be evaluated when the "Match" bit > 845 is "DENY". > > 847 The receiver of VPN Prefix ORF entries, which MAY be a RR, ASBR or > > <major> s/MAY/may > *[WW]: Done.* > > 848 PE, when receives VPN Prefix ORF entry from its BGP peer, it does the > 849 following: > > 851 S01. The receiver checks the combination of <AFI/SAFI, ORF-Type, > 852 Sequence, Route Distinguisher> of the received VPN Prefix > 853 ORF entry. > 854 S02. If (the combination does not already exist in the ORF-Policy > 855 table) { > 856 S03. The receiver adds the VPN Prefix ORF entry to the > 857 ORF-Policy table. > > <major> This seems odd - what if the action was REMOVE? > *[WW]: We will adjust this procedure. If the action is REMOVE, the > corresponding VPN Prefix ORF entry should be removed from the ORF-Policy > table.* > > 858 S04. } else { > 859 S05. If (Action is ADD) { > 860 S06. Overwrite the old VPN Prefix ORF entry with the new > 861 one. > 862 S07. else { > 863 Remove the corresponding VPN Prefix ORF entry. > > <major> What about REMOVE-ALL handling? > *[WW]: If the action is REMOVE-ALL, all VPN Prefix ORF entries should be > removed from the ORF-Policy table.* > > > KT> Ok - please clarify in this pseudocode. > *[WW]: Done.* > > > > 866 The filtering conditions for the stored VPN Prefix ORF entries > 867 contain the RD and RT of the source PE. > > <major> You mean the contents of the TLVs are stored? If so, please state > it > that way. > *[WW]: Do you mean we should state it in the encoding section?* > > > KT> I would think this would be part of the procedures on the receiver > side? > *[WW]: This has been contained in pseudocode in Section 5.2.* > > > > 869 If the SPE EC is not attached to the BGP Update message of the VPN > 870 prefixes, the receiver SHOULD use NEXT_HOP or ORIGINATOR_ID as the > > <major> Why not MUST? > *[WW]: Will be changed to "MUST".* > > 873 After installing the filter entries for the outbound VPN prefixes, > 874 the RR or ASBR does the following before sending VPN routes: > > <major> It is not clear if the steps below are related to the route refresh > processing after getting the ORF update, or the usual VPN route > propagation, > or both. The processing is different in those cases and so please clarify. > *[WW]: This procedure is used for both.* > > > KT> Please clarify in the text. Change in the ORF prefixes will result in > a "re-scan" followed by a "refresh" while regular individual VPN route > updates will just be checked against the ORF rules. > *[WW]: This has been clarified in Section 5.2.* > > > > > > 896 8. Withdraw of VPN Prefix ORF entries > > <major> Is "withdraw" the same as REMOVE or REMOVE-ALL? I am very confused. > Seems like this entire section needs to go into the operational > considerations > section. This has nothing to do with protocol procedures. > *[WW]: We will move this part to the operational considerations section.* > > 931 9. Applicability > > <major> This is not applicability. Feels more like examples to me. > However, there > is some normative text in this section which is confusing. For all > normative > aspects, please move the text into the sections where either the encoding > or > procedures are specified. If these examples need to be retained, please > move them > into an informative appendix section. > *[WW]: We will delete the normative texts and move this section to > informative appendix.* > > 1004 10. Operational Considerations > > 1006 10.1. Quota value calculation > > 1008 Quota is a threshold to limit the number of VPN routes under > specific > 1009 granularities (such as <PE>, <RD, Source AS>). > > <major> It is not very clear if the operator specifying these quotas via > their > NMS is a prerequisite for this feature to work. There is a need for an > applicability section in this document (just before the encodings and > procedures) > that describes where this feature can be deployed, for which types of VPNs, > what are the things that operators need to do (e.g., this quota > provisioning), and > any other requirements and limitations. > *[WW]: We will do this in -v24.* > > 1029 11. Implementation Consideration > > <major-editorial> This section does not contain any implementation > considerations. > Please remove it. The implementation status should be captured in the > report > on the IDR wiki as is the WG norm. The Experimental topology can be moved > into > the Appendix section describing the experiment. > *[WW]: We will delete this section.* > > 1068 13. IANA Considerations > > <minor> There are 3 actions below. Suggest to create 3 sub-sections and in > each > list precisely the IANA actions requested or done. > *[WW]: We will do this adjustment in -v24.* > > 1073 We would want to refer to the text from [RFC5291]: This new ORF is > 1074 exchanged using outbound route filtering capability defined in > 1075 [RFC5291] (for the sake of completeness). > > 1077 under "BGP Outbound Route Filtering (ORF) Types" > 1078 Registry: "VPN Prefix Outbound Route Filter (VPN Prefix ORF)" > 1079 Registration Procedure(s): First Come, First Served > 1080 Value: 66 > > <major> I am not able to follow the above two paragraphs. The allocation > for value > 66 for the new type has already been done by IANA. Simply state that. Next, > it seems like a request for creation of a new IANA registry - please say > that clearly. > *[WW]: We have communicated with IANA staff regarding this part of the > content before the WGLC and revised it to the current version.* > > > KT> IANA team is not able to technically review specifications. Can you > please clarify the text as suggested? > *[WW]: Done.* > > > > > 1095 +=====================+=============+===========================+ > 1096 | Registry | Type | Meaning | > 1097 +=====================+=============+===========================+ > 1098 |Reserved | 0(suggested)|Reserved | > 1099 +---------------------+-------------+---------------------------+ > 1100 |IPv4 Source PE TLV | 1(suggested)|IPv4 address for source PE.| > 1101 +---------------------+-------------+---------------------------+ > 1102 |IPv6 Source PE TLV | 2(suggested)|IPv6 address for source PE.| > 1103 +---------------------+-------------+---------------------------+ > 1104 |Source PE Identifier | 3(suggested)|ORIGINATOR_ID in Source PE | > 1105 |TLV | |Extended Community for | > 1106 | | |source PE | > 1107 +---------------------+-------------+---------------------------+ > 1108 |Source AS TLV | 4(suggested)|Source AS for source PE | > 1109 +---------------------+-------------+---------------------------+ > 1110 |Route Target TLV | 5(suggested)|Route Target of the | > 1111 | | |offending VPN routes | > 1112 +---------------------+-------------+---------------------------+ > > <major> The above table has initial allocations which can be done straight > away. > So the "suggested" is not required. I don't think the "meaning" column is > necessary. What is required is the reference column that points to this > document. > *[WW]: We will do this modification in -v24.* > > 1114 This document also requests a new Transitive Extended Community > Type. > 1115 The new Transitive Extended Community Type name SHALL be "Source PE > 1116 Extended Community". > > 1118 Under "BGP Transitive Extended Community Types:" > 1119 Registry: "Source PE Extended Community" type > 1120 0x0d(suggested) Source PE Extended Community > > <major> The above is not clear to me - exactly which registry the > allocation is to > be made under and under which registry-group. You cannot make suggestions > here. > If required, allocations can be done with IANA under FCFS - what is being > done > here is problematic (squatting on code points?). > *[WW]: This section proposes registering the "Source PE Extended > Community" Registry-Group in the "BGP Transitive Extended Community Types" > Registry. The Registration Procedure(s) is set to FCFS, and the suggestions > on value assignments will be removed.* > > > KT> OK. > > Thanks, > Ketan > > > > <EoRv23> > > > >
- [Idr] AD Evaluation of draft-ietf-idr-vpn-prefix-… Ketan Talaulikar
- [Idr] Re: AD Evaluation of draft-ietf-idr-vpn-pre… Wei Wang
- [Idr] Re: AD Evaluation of draft-ietf-idr-vpn-pre… Keyur Patel
- [Idr] Re: AD Evaluation of draft-ietf-idr-vpn-pre… Ketan Talaulikar
- [Idr] Re: AD Evaluation of draft-ietf-idr-vpn-pre… Wei Wang
- [Idr] Re: AD Evaluation of draft-ietf-idr-vpn-pre… Ketan Talaulikar