Re: [Idr] Document shepherd review for draft-ietf-idr-rfc7752bis

"Ketan Talaulikar (ketant)" <ketant@cisco.com> Mon, 25 October 2021 11:56 UTC

Return-Path: <ketant@cisco.com>
X-Original-To: idr@ietfa.amsl.com
Delivered-To: idr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6123D3A085C; Mon, 25 Oct 2021 04:56:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.599
X-Spam-Level:
X-Spam-Status: No, score=-9.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Ui6NPMCT; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=tHNNHtjy
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h85ifBumwfEr; Mon, 25 Oct 2021 04:56:35 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 049E03A083F; Mon, 25 Oct 2021 04:56:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=30727; q=dns/txt; s=iport; t=1635162995; x=1636372595; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=z1KulgKsu1X2z25cqTv5QLUGAAnVqbwr5NUUy5ImEvs=; b=Ui6NPMCTGzyosDob91ObiyquysYVqWdII/MSkbx87ZNhpGo5tIh2xbAJ sXW5q+ujmVm6qm94qvMX/k1AFtwELFMVsWK9UE7LipHrBlmuZaNPmphwp kgyDXmG5AKVGdRmVpUYgg6TYpWPqWBNRGYCzV0ivQdQoksx7l5U/50lBD k=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:wZteBxIKI7tyQlqortmcuX0yDhhOgF28FhYb8JFhjKhBIeyv/JXna UrY4/glzFrERp7S5P8Mje3K+7vhVmoN7dfk0jgCfZVAWgVDhZAQmAotU9aLE0a9K+TlPGQ2G c1YXwpj+He2eUFeBMf5YQjUpXu/pT4fExnyL0x7POPwT4XTlM+wkeu1/s67Xg==
IronPort-Data: A9a23:I8N91KNntMoYI7jvrR2Jl8FynXyQoLVcMsEvi/4bfWQNrUorgjAPx 2UYUTyDbPaPYWf8c950a9/i8E0Av5/WxtJjTHM5pCpnJ55oRWUpJjg4wmPYZX76whjrFRo/h ykmh1qpwPkcFhcwnD/1WlTahSQ6hf7gqobUUraeY3kpH1I8EU/NtDo68wIHqt8w6TSGK1vlV ePa+6Uz73f8hlaYmkpNg06ygEsHUMba4Vv0jXRiDRx/h2IyolFOZH4pyQ5dGFOjKmVcNrbSq +8uV9hV9EuBl/smIovNfroW7iTmT5aKVTVihEa6VIC9i0dEiw0z6Jw7bqUyTWQMhhOJme9+n YAlWZyYEW/FP4XFnOAbFhJfCSw7betN+aTMJj60tsn7I0/uKiS3ha4wShhte9REo46bAkkWn RAcADMAchmFm8q9wamwTa9ngcFLwMzDY91P4yExlGqFZRogaZH5TY7Iudxx4Bpqq+1IQeSdW upJNTU6OXwsZDUWagtIV/rShtyAh3XlWzxVtFzTorA4i0Df1gV/zP3sPcbbP92GX4BPkE3H+ T+c9WXiKhAXKNLZziCKmlquhubGhgvjVpgZUrqi+ZZXbEa7z2gXDlgdUkG25Kn/gU+lUNUZI EsRksYzkUQs3FOiEd/QfhyCmn7e4TA4eIFdNe081w7Yn8I4/D2lLmQDSzdAbvkvu8k3WSEm2 ze1czXBWGQHXFq9FC/1y1uEkd+hEXNOdDZdO0foWSNAsoe9/9Bq5v7aZos7eJNZmOEZDt0ZL 9qihSw6irN7YSUjiPjjpAuvb95BWvH0ouMd7wHTWCeu6Rl0Id7jbI2z4l+d5vFFRGp4crVjl CVa8yR9xLlTZX1oqMBraL9QdF1Oz63cWAAweXY1Q/EcG82FohZPh7x47jBkP1tOOc0ZYzLva 0K7kVoPv8IKZCPwNfUpON7Z5yEWIU7ISImNuhf8M4omX3SNXFPvENxGPBTJhDm9zCDAb4lmZ M3GGSpTMZrqIf03kGXpLwvs+bQq3Ss5jXjCXoz2yg/P7FZtTCD9dFvxC3PXNrpRxPrd+G39q o8DX+PXmk43eLCvPUH/r9VJRXhUdidTOHwDg5EOHgJ1ClE+SD9J5j646e5JRrGJaIwMx7eWp SnmAREJoLc97FWeQTi3hrlYQOuHdf5CQbgTZHNE0YqAs5T7XbuS0Q==
IronPort-HdrOrdr: A9a23:w894I6sypVbEcAUKFHLHvvxu7skC3YMji2hC6mlwRA09TyXGra GTdaUguyMc1gx/ZJh5o6H9BEDyewKiyXcT2/heAV7CZniohILMFuFfBOTZskXd8kHFh4tgPO JbAtVD4b7LfBlHZKTBkXKF+r8bqbHtms3F9ISurUuFDzsaEZ2IhD0JbTpzZ3cGPTWucqBJcq Z0iPA3wwaISDAyVICWF3MFV+/Mq5ngj5T9eyMLABYh9U2nkS6owKSSKWnZ4j4uFxd0hZsy+2 nMlAL0oo+5teug9xPa32jPq7xLhdrazMdZDsDksLlXFtyssHfrWG1SYczHgNkHmpDp1L/sqq iLn/4UBbU315oWRBDtnfKi4Xi57N9k0Q6d9bbRuwqTnSW+fkNgNyKE7rgpLycwLCEbzYtBOe twrhKknosSAhXakCvn4d/UExlsi0qvuHIn1fUelnpFTOIlGfVsRKEkjQto+a07bWnHAUEcYZ 1TJdCZ4OwTfUKRbnjfsGUqyNuwXm4rFhPDRkQZoMSa3zVfgXg8liIjtYAit2ZF8Ih4R4hP5u zCPKgtnLZSTtUOZaY4AOsaW8O4BmHEXBqJOmOPJlbsEr0BJhv22tPKyaRw4PvvdI0DzZM0lp iEWFREtXQqc0arEsGK1I0jyGGFfIx8Z0Wa9ihz3ekKhlTMfsudDcTYciFcryKJmYRrPvHm
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.87,180,1631577600"; d="scan'208";a="768189134"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Oct 2021 11:56:24 +0000
Received: from mail.cisco.com (xbe-rcd-007.cisco.com [173.37.102.22]) by alln-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 19PBuOVd029978 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Mon, 25 Oct 2021 11:56:24 GMT
Received: from xfe-rcd-004.cisco.com (173.37.227.252) by xbe-rcd-007.cisco.com (173.37.102.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Mon, 25 Oct 2021 06:56:24 -0500
Received: from xfe-rtp-005.cisco.com (64.101.210.235) by xfe-rcd-004.cisco.com (173.37.227.252) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15; Mon, 25 Oct 2021 06:56:23 -0500
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-005.cisco.com (64.101.210.235) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.15 via Frontend Transport; Mon, 25 Oct 2021 07:56:23 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NSydFNcW+7ccs+l1RBoOZMQO/OlzqRty8JWXv7ks7Ve8fGVVpg+2rvoE4o9GkcTTqK/5TDvt922by6Jo36prEa9wnorPOwZ7xl6upafIuWm9tIIxCv5HGdYmPXjbaxpHPBtGbcq5Xvkvvu5roFHWBEkCiU4kek6y1pc+a6c0QPP4hujRKMBWLWkeQkRzUCGTTCtrW0c5OX7SfKPaIL32HP/blCid7JmKuBV5+kbQKAglqfn15ZeE5FyoMyDg1kfARoHp1FUvdFuBTIGhdXTrlzJWoof0OxERKHnqdfLfvy4ZDwZ5hTC+smAEcK0CZJdO0wBiwb85/DDl/WuEmeudKA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=SHVlQhiYX5LGNSK7rHGpWDBvGafHm0uu0KjzZZXvhbI=; b=AShKFr4/LLjpJrWTd6bS8tzKFaGF9SVyaerRgBAunTWH+HcrThwBJFQyFrV9M92Bnxib7vtrJAW16thIUZUhU0WNA0P9WmglfRNvEGfDYydNAasU5yNhOCuyA9L3WjtE/+BWdhtj5Z0LbHifJ2HmkXxN4N9E7vnPe25eUUazjC2qFGOVW4TH4WNzOiP+z+MskJ0O+bGGXBNWkfQinR+udKVuEHXOPnGsMyLTSKQCyHkcH1yWeYFHU82taExbDWsCtjkPAicxt5ZC5XGPBhlIe1KbW4nW+tgC4LMOcaisV2nvnEeG7PrZPjvcpT7cAfqgW9nEbbkzlRsTKivbJ8XR0g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SHVlQhiYX5LGNSK7rHGpWDBvGafHm0uu0KjzZZXvhbI=; b=tHNNHtjy01graCuJpt5j2/LKKBdv4BpujIas0AlCYaq/FdFdu/6T1CaYZK0aLzis7T+j+ztdUpgQiKZZOFjSPSX1IqtFzZ6UhPVLE7ec0lQsima34dXG1Yd2PNnIQCkEKvZj6AmQZm7jmH6Av0hHWo6OJnOUA8oetjXrr1RMr3Y=
Received: from MW3PR11MB4570.namprd11.prod.outlook.com (2603:10b6:303:5f::22) by CO1PR11MB4962.namprd11.prod.outlook.com (2603:10b6:303:99::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4628.15; Mon, 25 Oct 2021 11:56:22 +0000
Received: from MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::5855:1d90:e596:d998]) by MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::5855:1d90:e596:d998%6]) with mapi id 15.20.4628.020; Mon, 25 Oct 2021 11:56:22 +0000
From: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
To: Jeffrey Haas <jhaas@pfrc.org>, "draft-ietf-idr-rfc7752bis@ietf.org" <draft-ietf-idr-rfc7752bis@ietf.org>, "idr@ietf.org" <idr@ietf.org>
Thread-Topic: Document shepherd review for draft-ietf-idr-rfc7752bis
Thread-Index: AQHXm35sZDRc9wWm9Uy5SD+Bf+Sj/avdjR2wgAZo0FA=
Date: Mon, 25 Oct 2021 11:56:22 +0000
Message-ID: <MW3PR11MB4570E3235BC31E9D1FDBE9CBC1839@MW3PR11MB4570.namprd11.prod.outlook.com>
References: <20210827200116.GJ19054@pfrc.org> <MW3PR11MB45701D09EF6D4483BAE06226C1BF9@MW3PR11MB4570.namprd11.prod.outlook.com>
In-Reply-To: <MW3PR11MB45701D09EF6D4483BAE06226C1BF9@MW3PR11MB4570.namprd11.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: pfrc.org; dkim=none (message not signed) header.d=none;pfrc.org; dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d3c657b3-967b-4da7-8b87-08d997ae76aa
x-ms-traffictypediagnostic: CO1PR11MB4962:
x-microsoft-antispam-prvs: <CO1PR11MB4962A55B28FEE791BB9D74F5C1839@CO1PR11MB4962.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW3PR11MB4570.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(76116006)(64756008)(66556008)(66574015)(66446008)(86362001)(966005)(110136005)(52536014)(33656002)(30864003)(66946007)(66476007)(316002)(55016002)(8936002)(9686003)(8676002)(38070700005)(122000001)(71200400001)(38100700002)(7696005)(2906002)(83380400001)(6506007)(5660300002)(508600001)(53546011)(186003)(579004)(559001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW3PR11MB4570.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d3c657b3-967b-4da7-8b87-08d997ae76aa
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Oct 2021 11:56:22.0139 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: +fWXghDkXM3cNlg44kj+Ctf94ddnxf49YVNDsLitmSKAsKsxUkEUP0kHSrcVmMvrDvwcxsk2lI+gKOgTmPH++w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR11MB4962
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.22, xbe-rcd-007.cisco.com
X-Outbound-Node: alln-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/idr/z_0r9eTTqn2S_M-yo0XTpkPjSzA>
Subject: Re: [Idr] Document shepherd review for draft-ietf-idr-rfc7752bis
X-BeenThere: idr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Inter-Domain Routing <idr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/idr>, <mailto:idr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/idr/>
List-Post: <mailto:idr@ietf.org>
List-Help: <mailto:idr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/idr>, <mailto:idr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Oct 2021 11:56:41 -0000

Hi Jeff,

Given the cut-off date today, I've posted the update as per the proposals in this thread to give you and the WG an opportunity to review/comment.

https://datatracker.ietf.org/doc/html/draft-ietf-idr-rfc7752bis-09

Will look forward to your inputs.

Thanks,
Ketan

-----Original Message-----
From: Ketan Talaulikar (ketant) 
Sent: 21 October 2021 22:18
To: Jeffrey Haas <jhaas@pfrc.org>; draft-ietf-idr-rfc7752bis@ietf.org; idr@ietf.org
Subject: RE: Document shepherd review for draft-ietf-idr-rfc7752bis

Hi Jeff,

Thanks for your detailed review and apologies again for the delay in response.

Please check inline below.

-----Original Message-----
From: Jeffrey Haas <jhaas@pfrc.org> 
Sent: 28 August 2021 01:31
To: draft-ietf-idr-rfc7752bis@ietf.org; idr@ietf.org
Subject: Document shepherd review for draft-ietf-idr-rfc7752bis

Ketan and Working Group,

Here's my document shepherd review for RFC7752-bis.  

General assessment: Generally good shape, some concerns on error handling and consistency on NLRI keying.

-- Jeff


---

NLRI keying consistency:
There are a number of TLVs that are optional.  Some of these optional fields may be present in the NLRI.  These include:
- Autonomous System
- BGP-LS Identifier (deprecated)
- Multi-Topology ID

Additional optional TLVs may be distributed in the protocol in the future.

Consider two BGP-LS Producers.  Producer 1 emits no optional fields for a given piece of link state.  Producer 2 emits all of the optional fields.

A BGP-LS Consumer may receive two distinct pieces of information for the same topology data.  

There is no discussion in the document as to how such inconsistencies could be handled by the Consumer.
[KT] I agree with your point. How about we add the follow text towards the end of Sec 4.1 for both this one and the next comment? We want to cover this aspect but not really try to specify the behavior of a BGP-LS Consumer as that is outside the scope of this document.

<NEW>
When there are multiple BGP-LS Producers originating the same link-state information, implementation variations of BGP-LS Producers may result in the generation of different and inconsistent BGP-LS updates for the same link-state object based on the inclusion or exclusion of optional TLVs. An inconsistency between BGP-LS Producers with regards to the inclusion of optional TLVs in the NLRI results in multiple NLRIs being generated for the same link-state object. A BGP-LS Consumer would need the ability to merge such duplicate updates to handle such situations. An inconsistency between BGP-LS Producers with regards to the inclusion of optional TLVs in the BGP-LS Attribute results in one of them being delivered to a BGP-LS Consumer as part the BGP propagation and best-path selection procedures in most typical deployments. This can result in a BGP-LS Consumer missing out on some of the information in a potentially unpredictable manner. The use of BGP-LS Producers that have a consistent support for the origination of optional TLVs between them can help mitigate such situations for the BGP-LS Consumers.
</NEW> 

---

BGP-LS Attribute consistency:

Consider two BGP-LS Producers.  Producer 1 emits no optional fields for a given piece of link state.  Producer 2 emits all of the optional fields.
(This is a simplified example.  The critical detail is that the Path Attributes are not identical.)

In any case where the BGP-LS NLRI is identical, an implementation will use BGP route selection procedures to pick one of the possible paths and select it to forward to its peers.  In the absence of overriding policy features such as LOCAL_PREF or MED, this will often devolve to selecting the IGP distance to the BGP NEXT_HOP.  (Choose closest point of Truth.)

There's no discussion about how inconsistent information may be lost by having multiple producers that do not consistently produce their data.
[KT] Please check if the proposed text for the previous comment addresses this one as well.

---

The remainder of my comments have to do with Error Handling.  My intent is not to re-litigate prior decisions, it's to note that the consequences of those prior decisions are not adequately discussed in the document.

Section 7.2.2 does an admirable job in noting the usual things a BGP developer should look for in a specification. But mostly it says, no matter how bad the contents, move along:

 :    Each TLV MAY indicate the valid and permissible values and their
 :    semantics that can to be used only by a BGP-LS Consumer for its
 :    semantic validation.  However, the handling of any errors may be
 :    specific to the particular application and outside the scope of this
 :    document.  A BGP-LS Consumer should ignore unrecognized and
 :    unexpected TLV types in both the NLRI and BGP-LS Attribute portions
 :    and not consider their presence as an error.

While I must echo a common pithy comment from one of my protocol elders, "BGP is not a dump truck", in this case it is exactly that.  The expectation is that if an implementation has a series of well-formed and nested TLVs that follow their ordering rules, that implementation is to pass things on.

A significant portion of RFC 7606, BGP's Error Handling extensions, was intended to deal with what was called at the time "Optional-Transitive Nonsense".  Much of the motivation for the RFC was preventing a downstream BGP peer from resetting its session because an ignorant upstream router was propagating bad data.  Another portion of the motivation is that once you realize you have bad data, you shouldn't pass it along.

The strict TLV structuring of BGP-LS makes the most types of syntactic errors impossible.  However, BGP-LS describes a number of semantic validations using RFC 2119/8174 keywords without adequately describing what to do when those behaviors are violated at the BGP-LS Consumer.
[KT] The specification of behavior and handling at a BGP-LS Consumer was considered to be out of scope of this draft.

Simple examples of such things are:
- TLVs of fixed length that are not of the proper length.
[KT] This is covered in Section 7.2.2 for BGP-LS Speakers. It would be malformed and then handled differently based on whether that TLV is part of the NLRI or the BGP-LS Attribute.

- TLVs that are mandatory that are absent.
- TLVs that are not appropriate for a given NLRI type present in the attributes;
  e.g. Node properties for a Link NLRI.
- Metrics that are of inappropriate size for their underlying protocol
  semantics.
[KT] These all fall under the category of "semantic" verification and hence outside the scope of this draft - it is left to the specific BGP-LS Consumer application.

While there may be an urge to not address such issues as "this is the Consumer's problem", this misses a common bit of learned BGP wisdom: Such things are the nightmare of interoperability.  If you have two applications that are BGP-LS consumers that are intended to cooperate for implementing an application enabled by BGP-LS, and they have different error handling semantics, you may have incorrect operational behavior.
[KT] You are obviously correct. Given the nature of the protocol, building a system using different implementations that are cooperating in a sort of distributed manner is fraught with challenges. Unless of course, there are specifications written for those systems (i.e. specific BGP-LS Consumer apps) on how they should handle such issues. Therefore out of scope of this document. Let me take an example, a semantic error in a BGP-LS consumer app that is just showing the network visualization may not care as much about a wrong IGP metric while a BGP-LS consumer app such as SR-PCE would have problems with it. While the visualization app may just use whatever is reported or not even care, the SR-PCE implementation might just not consider that link to be "valid" and consider it unavailable. That is why, IMO, it seems to be a correct decision to not get into the BGP-LS Consumer specification. That said, I fully agree with the challenges here.

"Make the same mistakes everywhere" is not a great recipe.

I strongly recommend that this issue be addressed either in section 7.2.2 or in a new section.
[KT] Give, the previous comment, I am open to inputs on what can be incorporated into the document in this respect.

---------------------------------------------------------------------------------

Some comments on the draft text are noted below.  This is from the idnits output.

407	4.1.  TLV Format
[...]
435	   type MUST be in ascending order based on the value field.  Comparison
436	   of the value fields is performed by treating the entire field as an
437	   opaque hexadecimal string.  Standard string comparison rules apply.

I suspect what is intended here is opaque binary data rather than representing it in hexadecimal format.  "Standard string comparison" might make sense if you were doing strcmp() on an actual hexadecimal string.  The intent here is probably lexicographically ordered since "standard string comparison" isn't really defined here.
[KT] Yes, I believe so. How about:

<OLD>
Comparison of the value fields is performed by treating the entire field as an opaque hexadecimal string.  Standard string comparison rules apply. 
</OLD>
<NEW>
Comparison of the value fields is performed by treating the entire field as opaque binary data and ordered lexicographically.
</NEW>

447	   The TLVs within the BGP-LS Attribute MAY be ordered in ascending
448	   order by TLV type.  BGP-LS Attribute with unordered TLVs MUST NOT be
449	   considered malformed.

Probably "SHOULD be ordered"?  If it's MAY be ordered and MUST NOT be malformed, why mention it at all?
[KT] I am happy to drop both the sentences. The current text is more to clarify given the ambiguity in this regards in RFC7752.

451	4.2.  The Link-State NLRI

453	   The MP_REACH_NLRI and MP_UNREACH_NLRI attributes are BGP's containers
454	   for carrying opaque information.  This specification defines three
455	   Link-State NLRI types that describe either a node, a link, and a
456	   prefix.

"either a node, a link, or a prefix"
[KT] Ack
[...]

495	      0                   1                   2                   3
496	      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
497	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
498	     |            NLRI Type          |     Total NLRI Length         |
499	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
500	     |                                                               |
501	     +                       Route Distinguisher                     +
502	     |                                                               |
503	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
504	     |                                                               |
505	     //                  Link-State NLRI (variable)                 //
506	     |                                                               |
507	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

509	         Figure 6: Link-State VPN AFI 16388 / SAFI 72 NLRI Format

I'd suggest mentioning the length of the route distinguisher in the diagram rather than letting it be solely inferred by the text representation.
[KT] Ack

516	                   +------+---------------------------+
517	                   | Type | NLRI Type                 |
518	                   +------+---------------------------+
519	                   |  1   | Node NLRI                 |
520	                   |  2   | Link NLRI                 |
521	                   |  3   | IPv4 Topology Prefix NLRI |
522	                   |  4   | IPv6 Topology Prefix NLRI |
523	                   +------+---------------------------+

525	                            Table 1: NLRI Types

Note that the contents of this table do not match the IANA Considerations section.
[KT] I think you are referring to 0 and the Private Use? Do they need to match since the IANA is more about allocation and this is about listing what is being introduced in the document.


529	   The Node NLRI (NLRI Type = 1) is shown in the following figure.

531	      0                   1                   2                   3
532	      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
533	     +-+-+-+-+-+-+-+-+
534	     |  Protocol-ID  |
535	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
536	     |                           Identifier                          |
537	     |                            (64 bits)                          |
538	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
539	     //                Local Node Descriptors (variable)            //
540	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

542	                      Figure 7: The Node NLRI Format

The ASCII diagram covering Identifier isn't consistent with the multi-row format.  Compare vs. Figure 6's Route Distinguisher.
[KT] Fixed

This issue occurs multiple places further in the document.
[KT] Fixed

The syntax of the Identifier isn't clearly discussed in the document.  Is the intent to be a network-byte ordered uint64 number?
[KT] Yes. Fixed as : s/ The 64-bit Identifier field carries a BGP-LS Instance Identifier (Instance-ID)  / The Identifier field carries a 64-bit BGP-LS Instance Identifier (Instance-ID) number

[...]

753	   Autonomous System:  Opaque value (32-bit AS Number).  This is an
754	      optional TLV.  The value SHOULD be set to the AS Number associated
755	      with the BGP process originating the link-state information.  An
756	      implementation MAY provide a configuration option on the BGP-LS
757	      Producer to use a different value.

Some text discussing private AS numbers would be helpful.  The item of concern is when BGP-LS is used between cooperating ASes not under a single administrative control.  In such cases, avoiding private AS collisions is an edge case.
[KT] I am not sure if I've understood your point correctly, but how about add the following at the end of the current text. Please clarify or suggest text if you meant something different.

E.g., to avoid collisions when using private AS numbers.

[...]

795	      There can be at most one instance of each sub-TLV type present in
796	      any Node Descriptor.  The sub-TLVs within a Node Descriptor MUST
797	      be arranged in ascending order by sub-TLV type.  This needs to be
798	      done to compare NLRIs, even when an implementation encounters an
799	      unknown sub-TLV.  Using stable sorting, an implementation can do a
800	      binary comparison of NLRIs and hence allow incremental deployment
801	      of new key sub-TLVs.

I believe this section is intended to be outdented one level?
[KT] Yes. Fixed.

[...]

895	   The TLVs/sub-TLVs corresponding to the interface addresses and/or the
896	   local/remote identifiers may not always be signaled in the IGPs
897	   unless their advertisement is enabled specifically.  In such cases,
898	   it is valid to advertise a BGP-LS Link NLRI without any of these
899	   identifiers.

If there are multiple BGP-LS producers, can this happen if one producer is configured with this option and another is not?

If so, the same Link Descriptor may be generated with different NLRI representation.
[KT] The "advertisement is enabled" is referring to the IGP configuration. Once received, all BGP-LS producers will work the same with whatever they are able to get from the underlying IGPs. To provide more context, IGPs do not always advertise some of these identifiers unless features like TE or SR are enabled.

901	4.2.2.1.  Multi-Topology ID

903	   The Multi-Topology ID (MT-ID) TLV carries one or more IS-IS or OSPF
904	   Multi-Topology IDs for a link, node, or prefix.

906	   The semantics of the IS-IS MT-ID are defined in Section 7.1 and 7.2
907	   of RFC 5120 [RFC5120].  The semantics of the OSPF MT-ID are defined
908	   in Section 3.7 of RFC 4915 [RFC4915].  If the value in the MT-ID TLV
909	   is derived from OSPF, then the upper 5 bits of the MT-ID field MUST
910	   be set to 0.

912	   The format of the MT-ID TLV is shown in the following figure.

914	      0                   1                   2                   3
915	      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
916	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
917	     |              Type             |          Length=2*n           |
918	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
919	     |R R R R|  Multi-Topology ID 1  |             ....             //
920	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
921	     //             ....             |R R R R|  Multi-Topology ID n  |
922	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

924	                  Figure 12: Multi-Topology ID TLV Format

926	   where Type is 263, Length is 2*n, and n is the number of MT-IDs
927	   carried in the TLV.

929	   The MT-ID TLV MAY be present in a Link Descriptor, a Prefix
930	   Descriptor, or the BGP-LS attribute of a Node NLRI.  In a Link or
931	   Prefix Descriptor, only a single MT-ID TLV containing the MT-ID of
932	   the topology where the link or the prefix is reachable is allowed.
933	   In case one wants to advertise multiple topologies for a given Link
934	   Descriptor or Prefix Descriptor, multiple NLRIs MUST be generated
935	   where each NLRI contains a single unique MT-ID.  When used in the
936	   Link or Prefix Descriptor TLV for IS-IS, the Bits R are reserved and
937	   MUST be set to 0 (as per Section 7.2 of RFC 5120 [RFC5120]) when
938	   originated and ignored on receipt.

940	   In the BGP-LS attribute of a Node NLRI, one MT-ID TLV containing the
941	   array of MT-IDs of all topologies where the node is reachable is
942	   allowed.  When used in the Node Attribute TLV for IS-IS, the Bits R
943	   are set as per Section 7.1 of RFC 5120 [RFC5120].

The text above for OSPF MT-ID values (RFC 4915, §3.7) could be somewhat clearer.

The diagram above is structured for IS-IS.  The OSPF intent is BOTH that R is set to zero (the IS-IS text has cases where it may be zero, or potentially
non-zero) and also that the next 5 bits are also zero.  

Some clarity might be achieved by noting the MT-ID field for OSPF is 0..127.
[KT] Ack. Fixed.

988	   where the Type and Length fields of the TLV are defined in Table 5.
989	   The OSPF Route Type field values are defined in the OSPF protocol and
990	   can be one of the following:

992	   o  Intra-Area (0x1)
993	   o  Inter-Area (0x2)

995	   o  External 1 (0x3)

997	   o  External 2 (0x4)

999	   o  NSSA 1 (0x5)

1001	   o  NSSA 2 (0x6)

The semantics of these are from OSPF, but what's the matching RFC section reference for the code points?
[KT] These are actually BGP-LS code points. We don't anticipate new route types in OSPF (been so for decades) and that is why I skipped creating an IANA registry for them. But we can if that is the right thing to do.

1003	4.2.3.2.  IP Reachability Information

1005	   The IP Reachability Information TLV is a mandatory TLV for IPv4 &
1006	   IPv6 Prefix NLRI types.  The TLV contains one IP address prefix (IPv4
1007	   or IPv6) originally advertised in the IGP topology.  Its purpose is
1008	   to glue a particular BGP service NLRI, using its BGP next-hop, to a
1009	   given node in the LSDB.  A router SHOULD advertise an IP Prefix NLRI

"BGP service NLRI" isn't a well-defined thing.  I suggest defining it.
[KT] I will rather just delete that sentence since that is obviously not the main or even the sole purpose of the Prefix NLRI.

1013	      0                   1                   2                   3
1014	      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1015	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1016	     |              Type             |             Length            |
1017	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1018	     | Prefix Length | IP Prefix (variable)                         //
1019	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

1021	             Figure 14: IP Reachability Information TLV Format

1023	   The Type and Length fields of the TLV are defined in Table 5.  The
1024	   following two fields determine the reachability information of the
1025	   address family.  The Prefix Length field contains the length of the
1026	   prefix in bits.  The IP Prefix field contains the most significant
1027	   octets of the prefix, i.e., 1 octet for prefix length 1 up to 8, 2
1028	   octets for prefix length 9 to 16, 3 octets for prefix length 17 up to
1029	   24, 4 octets for prefix length 25 up to 32, etc.

We have a possible need for additional pedantry here regarding "trailing bits".
RFC 4271, §4.3 defines the format for IPv4 NLRI.  It says:

 :      b) Prefix:
 :
 :         The Prefix field contains an IP address prefix, followed by
 :         the minimum number of trailing bits needed to make the end
 :         of the field fall on an octet boundary.  Note that the value
 :         of trailing bits is irrelevant.

A common fault in BGP implementations is failing to ignore the trailing bits for purposes of NLRI keying.  This particular bug tends to be less of a problem for AFI/SAFIs where multiple NLRI may be packed in the same UPDATE message.
Individual BGP Routes are unpacked as tuples of Path Attributes and their attached NLRI.

In BGP-LS, the IP Reachability Information TLV is a component that is not surrounded solely by other prefixes, it's embedded.  The procedures for BGP-LS push implementors toward simply doing binary comparison of various TLV contents.
Even more so, as discussed under my notes on error handling, the implementor is pushed to ignore most semantic validation errors.

The implication is that most developers are basically doing memcmp() for their comparison work.  Since "trailing bits" are irrelevant, but matter for comparison purposes, I strongly suggest text be added that trailing bits are zeroed.
[KT] Ack - agree.

1031	4.3.  The BGP-LS Attribute

1033	   The BGP-LS Attribute is an optional, non-transitive BGP attribute
1034	   that is used to carry link, node, and prefix parameters and
1035	   attributes.  It is defined as a set of Type/Length/Value (TLV)

It'd be useful to note that IANA has assigned code point 29 here.  It is noted in the IANA Considerations.
[KT] Ack


1044	   The size of the BGP-LS Attribute may potentially grow large depending
1045	   on the amount of link-state information associated with a single
1046	   Link-State NLRI.  The BGP specification [RFC4271] mandates a maximum
1047	   BGP message size of 4096 octets.  It is RECOMMENDED that an
1048	   implementation support [RFC8654] to accommodate a larger size of
1049	   information within the BGP-LS Attribute.  BGP-LS Producers MUST
1050	   ensure that they limit the TLVs included in the BGP-LS Attribute to
1051	   ensure that a BGP update message for a single Link-State NLRI does
1052	   not cross the maximum limit for a BGP message.  The determination of
1053	   the types of TLVs to be included MAY be made by the BGP-LS Producer
1054	   based on the BGP-LS Consumer applications requirement and is outside
1055	   the scope of this document.  When a BGP-LS Propagator finds that it
1056	   is exceeding the maximum BGP message size due to addition or update
1057	   of some other BGP Attribute (e.g.  AS_PATH), it MUST consider the
1058	   BGP-LS Attribute to be malformed and handle the propagation as
1059	   described in Section 7.2.2.

While discussing RFC 8654 is appropriate, a related deployment consideration should be mentioned:  If the BGP route propagation path is such that a large message (> 4096 octets) is created, it can only be sent along a contiguous path of BGP sessions that all support RFC 8654.

Since loss of messages can result in incomplete link state information, this may result in a broken LSDB.
[KT] Ack

1174	4.3.1.5.  Opaque Node Attribute TLV

1176	   The Opaque Node Attribute TLV is an envelope that transparently
1177	   carries optional Node Attribute TLVs advertised by a router.  An
1178	   originating router shall use this TLV for encoding information
1179	   specific to the protocol advertised in the NLRI header Protocol-ID
1180	   field or new protocol extensions to the protocol as advertised in the
1181	   NLRI header Protocol-ID field for which there is no protocol-neutral
1182	   representation in the BGP Link-State NLRI.  The primary use of the
1183	   Opaque Node Attribute TLV is to bridge the document lag between,
1184	   e.g., a new IGP link-state attribute being defined and the protocol-
1185	   neutral BGP-LS extensions being published.

This, and the related Opaque sections could use some discussion about what happens when that bridge has been crossed.

Consider a feature that can move from a new link-state attribute carried in the Opaque information and has a code point later added to carry in BGP-LS:  There's possibly an incremental deployment motivation to carry the information in both spots.  This means keeping the values consistent in each place becomes important.
[KT] Ack. How about adding the following?

<NEW>
Once the protocol-neutral BGP-LS extensions are defined, the BGP-LS implementations would still need to advertise the information both within the Opaque Attribute TLV and the new TLV definition for incremental deployment and transition.
</NEW>

1273	      0                   1                   2                   3
1274	      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1275	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1276	     |              Type             |             Length            |
1277	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1278	     |L|R|  Reserved |
1279	     +-+-+-+-+-+-+-+-+

1281	                     Figure 19: MPLS Protocol Mask TLV

Here, and later in the document, "Reserved" likely should be "MUST be set to zero and SHOULD be ignored on receipt".
[KT] Ack


1451	      0                   1                   2                   3
1452	      0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
1453	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1454	     |              Type             |             Length            |
1455	     +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1456	     |D|N|L|P|       |
1457	     +-+-+-+-+-+-+-+-+

1459	                      Figure 25: IGP Flag TLV Format

Suggest marking the empty space as Reserved.  See prior comment about Reserved.
[KT] Ack


2032	6.1.4.  BGP-LS Node Flags Registry

2034	   The "BGP-LS Node Flags" registry is requested to be created for the
2035	   one-octet sized flags field of the Node Flag Bits TLV (1024) and
2036	   populated with the initial values shown below:

2038	              Bit   Description             Reference
2039	              -----------------------------------------------
2040	               0    Overload Bit (O-bit)    [This document]
2041	               1    Attached Bit (A-bit)    [This document]
2042	               2    External Bit (E-bit)    [This document]
2043	               3    ABR Bit (B-bit)         [This document]
2044	               4    Router Bit (R-bit)      [This document]
2045	               5    V6 Bit (V-bit)          [This document]
2046	               6-7  Unassigned

2048	   Allocations within the registry under the "RFC Required" policy (see
2049	   [RFC8126]).

This registry is absent from the IANA Considerations.  Similarly, IANA does not have a registry in the expected place:
https://www.iana.org/assignments/bgp-ls-parameters/bgp-ls-parameters.xhtml
[KT] Yes, this was missed by RFC7752 and we are fixing this now by creating it.

2051	6.1.5.  BGP-LS MPLS Protocol Mask Registry

2053	   The "BGP-LS MPLS Protocol Mask" registry is requested to be created
2054	   for the one-octet sized flags field of the MPLS Protocol Mask TLV
2055	   (1094) and populated with the initial values shown below:

2057	    Bit   Description                                Reference
2058	    ------------------------------------------------------------------
2059	     0    Label Distribution Protocol (L-bit)        [This document]
2060	     1    Extension to RSVP for LSP Tunnels (R-bit)  [This document]
2061	     2-7  Unassigned

2063	   Allocations within the registry under the "RFC Required" policy (see
2064	   [RFC8126]).

See prior comment about missing IANA Considerations and registry at IANA.
[KT] Same as previous.

2066	6.1.6.  BGP-LS IGP Prefix Flags Registry

2068	   The "BGP-LS IGP Prefix Flags" registry is requested to be created for
2069	   the 1 octet sized flags field of the IGP Flags TLV (1152) and
2070	   populated with the initial values shown below:

2072	        Bit   Description                        Reference
2073	        ----------------------------------------------------------
2074	         0    IS-IS Up/Down Bit (D-bit)          [This document]
2075	         1    OSPF "no unicast" Bit (N-bit)      [This document]
2076	         2    OSPF "local address" Bit (L-bit)   [This document]
2077	         3    OSPF "propagate NSSA" Bit (P-bit)  [This document]
2078	         4-7  Unassigned

2080	   Allocations within the registry under the "RFC Required" policy (see
2081	   [RFC8126]).

See prior comment about missing IANA Considerations and registry at IANA.
[KT] Same as previous.

Thanks,
Ketan