RE: Opsdir early review of draft-ietf-idr-bgp-ls-segment-routing-ext-06

"Ketan Talaulikar (ketant)" <ketant@cisco.com> Wed, 09 May 2018 09:53 UTC

Return-Path: <ketant@cisco.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC926126BF0; Wed, 9 May 2018 02:53:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W5NP-gJKRCml; Wed, 9 May 2018 02:53:32 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E08B120726; Wed, 9 May 2018 02:53:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=5276; q=dns/txt; s=iport; t=1525859612; x=1527069212; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=4yjVDC+Aevg0hyys4v8oC4bZQxIUzrvqRG2HD9nhu3M=; b=aGgWTeIa1pucZ4O1kNlNiC2th453208+AsDUW7cSQDBlMJKxHDUYQDiG ks3t5rzKn8pyGb2a7AmRglhCddTvUefYTFYbPzh+QPmsxXbzN2Q1uCKo1 GZDJbs4QAdXR4XFL4tnSkyYsWhZWIqpPwvSa67/0MTNr/Lqi1t9wQo8tB g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AQAQBvxPJa/4wNJK1cGQEBAQEBAQEBAQEBAQcBAQEBAYMUL4FbKAqDZYgCjG+BeYEPkymBeAuEbAIagk0hNBgBAgEBAQEBAQJsKIUoAQEBAQMjETMSDAQCAQgRBAEBAwImAgICMBUICAIEAQ0FCIUcp2+CHIhBgkiBCYccgVQ/gQ4BgwuFCg+CWoJUApgsCAKORYE9g2CHTYdCiGcCERMBgSQBHDiBUnAVGoJkkE5vkAyBGAEB
X-IronPort-AV: E=Sophos;i="5.49,381,1520899200"; d="scan'208";a="392738567"
Received: from alln-core-7.cisco.com ([173.36.13.140]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 09 May 2018 09:53:31 +0000
Received: from XCH-ALN-010.cisco.com (xch-aln-010.cisco.com [173.36.7.20]) by alln-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id w499rVde019294 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 9 May 2018 09:53:31 GMT
Received: from xch-aln-008.cisco.com (173.36.7.18) by XCH-ALN-010.cisco.com (173.36.7.20) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Wed, 9 May 2018 04:53:31 -0500
Received: from xch-aln-008.cisco.com ([173.36.7.18]) by XCH-ALN-008.cisco.com ([173.36.7.18]) with mapi id 15.00.1320.000; Wed, 9 May 2018 04:53:30 -0500
From: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
To: Joel Jaeggli <joelja@bogus.com>, "ops-dir@ietf.org" <ops-dir@ietf.org>
CC: "idr@ietf.org" <idr@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "draft-ietf-idr-bgp-ls-segment-routing-ext.all@ietf.org" <draft-ietf-idr-bgp-ls-segment-routing-ext.all@ietf.org>
Subject: RE: Opsdir early review of draft-ietf-idr-bgp-ls-segment-routing-ext-06
Thread-Topic: Opsdir early review of draft-ietf-idr-bgp-ls-segment-routing-ext-06
Thread-Index: AQHT52FX+wOvrYGWJEmMz8naprD+76QnJMZA
Date: Wed, 09 May 2018 09:53:30 +0000
Message-ID: <0264f5a703b145dc9b473f0d4d96efb7@XCH-ALN-008.cisco.com>
References: <152584833398.2904.14504730626460815575@ietfa.amsl.com>
In-Reply-To: <152584833398.2904.14504730626460815575@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.65.82.210]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/r6iTEnlzfhoR2asTG-j2Gf8qE4U>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 May 2018 09:53:35 -0000

Hi Joel,

Many thanks for your review and please find responses inline below. I will update the draft with the same based on your feedback.

Thanks,
Ketan

-----Original Message-----
From: Joel Jaeggli <joelja@bogus.com> 
Sent: 09 May 2018 12:16
To: ops-dir@ietf.org
Cc: idr@ietf.org; ietf@ietf.org; draft-ietf-idr-bgp-ls-segment-routing-ext.all@ietf.org
Subject: Opsdir early review of draft-ietf-idr-bgp-ls-segment-routing-ext-06

Reviewer: Joel Jaeggli
Review result: Has Nits

I have performed a requested early review on the behalf of the operations directorate of the current draft-ietf-idr-bgp-ls-segment-routing-ext-06.
Generally I think this document is good, I won't say ready, as this review is intended as an early review not a final one.

Some nits

1-
introduction

   This way, all BGP speakers (specifically the route-reflectors) obtain
   Link-State information from all IGP areas (and from other ASes from
   EBGP peers).

* BGP speakers are agnostic about the source of the information beyond that it was exported with certain properties from the rib of it’s neighbor.
[KT] I agree this is generally true in case of BGP. However, in this specific case of BGP-LS, the Node, Link and Prefix NLRIs actually contain the identifiers/descriptors which include the source of the information - as in the specific IGP node originating it. So would you agree that in this specific BGP-LS case the statement is valid?

2 -
   An external component (e.g., a controller) then can
   collect SR information in the "northbound" direction across IGP areas
   or ASes and construct the end-to-end path (with its associated SIDs)
   that need to be applied to an incoming packet to achieve the desired
   end-to-end forwarding.

* Unqualified use of the term northbound I find generally problematic, particularly in the case of a route reflector. Previously RFC 7752 manged to use the term in the title and then never again within the text.
[KT] Sure. I would remove the "northbound" term.

3-

2.3.3.  Source Router Identifier (Source Router-ID) TLV

   The Source Router-ID TLV contains the IPv4 or IPv6 Router-ID of the
   originator of the Prefix.  For IS-IS protocol this is as defined in
   [RFC7794].  The Source Router-ID TLV may be used to carry the OSPF
   Router-ID of the prefix originator.

   The Source Router-ID TLV has the following format:

    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |            Type               |            Length             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   //                  IPv4/IPv6 Address (Router-ID)              //
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

   where:

      Type: TBD, see Section 4.

      Length: 4 or 16.

      IPv4/IPv6 Address: 4 octet IPv4 address or 16 octet IPv6 address.

   The semantic of the Source Router-ID TLV is defined in [RFC7794].

* While RFC7794 Router-IDs are in fact IP addresses. OSPF Router-IDs are not even if they happen to look like them, this is particularly germain with ospfv3 but it’s worth making the distinction.
[KT] Agree. I would say "The semantic of the Source Router-ID TLV for ISIS is defined in [RFC7794]. For OSPF, the TLV carries the OSPF Router-ID of the originator of the prefix."

4 -
5.1.1.  Operations

   Existing BGP and BGP-LS operational procedures apply.  No additional
   operation procedures are defined in this document.

* An informative or normative reference (probably to 7752 especially fault
mangement) is probably required.
[KT] Agree and I would specifically put the normative reference to RFC7752.