Re: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap

Uma Chunduri <uma.chunduri@ericsson.com> Mon, 29 February 2016 06:51 UTC

Return-Path: <uma.chunduri@ericsson.com>
X-Original-To: isis-wg@ietfa.amsl.com
Delivered-To: isis-wg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8152F1A6F77 for <isis-wg@ietfa.amsl.com>; Sun, 28 Feb 2016 22:51:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 67CRE5A6FUmd for <isis-wg@ietfa.amsl.com>; Sun, 28 Feb 2016 22:51:38 -0800 (PST)
Received: from usplmg20.ericsson.net (usplmg20.ericsson.net [198.24.6.45]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D83641A6F3A for <isis-wg@ietf.org>; Sun, 28 Feb 2016 22:51:37 -0800 (PST)
X-AuditID: c618062d-f79dd6d000003091-8f-56d3e6133226
Received: from EUSAAHC002.ericsson.se (Unknown_Domain [147.117.188.78]) by usplmg20.ericsson.net (Symantec Mail Security) with SMTP id 9F.4B.12433.316E3D65; Mon, 29 Feb 2016 07:32:51 +0100 (CET)
Received: from EUSAAMB105.ericsson.se ([147.117.188.122]) by EUSAAHC002.ericsson.se ([147.117.188.78]) with mapi id 14.03.0248.002; Mon, 29 Feb 2016 01:51:36 -0500
From: Uma Chunduri <uma.chunduri@ericsson.com>
To: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, Christian Hopps <chopps@chopps.org>, "isis-wg@ietf.org list" <isis-wg@ietf.org>
Thread-Topic: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap
Thread-Index: AQHRKSDrA8JFzobLS0+ZndjUGF5XpZ62GfEAgEMqEQCAArqBAIBDUWSggAG3dICAAhmDwA==
Date: Mon, 29 Feb 2016 06:51:35 +0000
Message-ID: <1B502206DFA0C544B7A60469152008635154073B@eusaamb105.ericsson.se>
References: <4C33F1DA-351A-4E4C-AB2D-EB9C530EBA36@chopps.org> <05BB1848-0F89-4A06-B1C6-7E955C41C9E9@chopps.org> <2d9f516b68fd4443853f512a533bd9d6@XCH-ALN-001.cisco.com> <1B502206DFA0C544B7A6046915200863514605D3@eusaamb105.ericsson.se> <1B502206DFA0C544B7A60469152008635152D9E1@eusaamb105.ericsson.se> <3741852a2e494e6ca54fd6ffe847ba14@XCH-ALN-001.cisco.com>
In-Reply-To: <3741852a2e494e6ca54fd6ffe847ba14@XCH-ALN-001.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [147.117.188.11]
Content-Type: multipart/alternative; boundary="_000_1B502206DFA0C544B7A60469152008635154073Beusaamb105erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprCIsWRmVeSWpSXmKPExsUyuXSPn67ws8thBod3mlhM23yQ2WLDn43s FkcPvWd1YPa4d3cxk8eU3xtZPZYs+ckUwBzFZZOSmpNZllqkb5fAlfH121mmgt/LmSpOzxFv YNzcytTFyMkhIWAi0X3kJyOELSZx4d56ti5GLg4hgSOMEi0behkhnOWMEk+md7CBVLEJ6El8 nPqTHSQhItAKlDi7hQUkISzgLbH58gygIg6ghI/Eo7WyIGERgTCJox8mgW1gEVCVmPV+A5jN K+ArceLbJKht75kkGm79A0twCrhKnNq6DWwmI9BJ30+tATuVWUBc4taT+VBnC0gs2XOeGcIW lXj5+B8rhK0k8fH3fHaI+nyJmfvfsUEsE5Q4OfMJywRGkVlIRs1CUjYLSRlEXEdiwe5PbBC2 tsSyha+ZYewzBx4zIYsvYGRfxchRWlyQk5tuZLCJERhXxyTYdHcw3p/ueYhRgINRiYd3g/Pl MCHWxLLiytxDjBIczEoivMuuAoV4UxIrq1KL8uOLSnNSiw8xSnOwKInzLnVYHyYkkJ5Ykpqd mlqQWgSTZeLglGpgTLDeeEXt4wJfnaqdqbNvfBH/vSD682pHy65FgXvP2axW+HB98QHdExwL umOuRnsW3D99oTMhnL1t9uQAzo/X674Jt2X6iire3vV/w+EG2bu9Gv9l55x9W8xy816b+fcd l+9e7I2v41yo1+Yq0XFtQ3bKgWW9FVt9dDxy3sesnSJr9P3WwrstnkosxRmJhlrMRcWJAI91 sZ2nAgAA
Archived-At: <http://mailarchive.ietf.org/arch/msg/isis-wg/3NFf_APgVMDmM1Tji7ykbmfnIBc>
Subject: Re: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap
X-BeenThere: isis-wg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF IS-IS working group <isis-wg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/isis-wg/>
List-Post: <mailto:isis-wg@ietf.org>
List-Help: <mailto:isis-wg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Feb 2016 06:51:44 -0000

Ok, couple of e-mails let me respond to clarify as much as I can.
In-line [Uma]:


--
Uma C.

From: Les Ginsberg (ginsberg) [mailto:ginsberg@cisco.com]
Sent: Saturday, February 27, 2016 9:19 AM
To: Uma Chunduri; Christian Hopps; isis-wg@ietf.org list
Subject: RE: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap

Uma -

>From my POV the draft currently defines how to advertise new information without defining why it is necessary to do so.
[Uma]: Why question has been answered in Section 1, see my subsequent responses...

Yes, multiple tunnel types may be in use in the network - that does not in and of itself lead to a requirement to advertise supported tunnel types . In most cases, the support of a given tunnel type can be known today by other means. You give the example of RLFA - but today LDP reachability to an endpoint is something a router already knows - and this is the real requirement to setup an RLFA tunnel.

[Uma]: Incorrect.
LDP/T-LDP tunnel is one variant to reach PQ node. RLFA computation is agnostic to the tunnel type to reach the computed PQ node; in pure IP deployments it's non-LDP based tunnel and as advertised by the node decapsulation capabilities as specified in this draft.

Knowing that the endpoint is capable of supporting RLFA is insufficient.
[Uma]:  No.  What is "supporting RLFA??" an egress node doesn't not need to support RLFA to decapsulate the packet (MPLS/IP etc..) and forward. Well, egress node can support RLFA to offer protection in the other direction (as an ingress node then).

Further, folks (including you if I recall correctly) have indicated that they want more than just knowing RLFA capability -
[Uma]:  What is "RLFA capability???"  there is nothing like RLFA capability I am aware of.

they also want to know what endpoint address to use.
[Uma]: By the above sentence I am trying to understand what you meant. Ok, if T-LDP tunnel were to be used to reach the computed PQ node, yes ingress node ought to know which IP address need to be used for establishing the targeted session. And for that we have mechanisms now.. there is more to it. But RLFA is  completely agnostic  to how to reach to the computed repair node and doesn't mandate you to use MPLS always.

This logically leads to the use of admin tags which will not only indicate support for the tunnel type but also what endpoint address is preferred/required.
[Uma]: Admin tag is insufficient in multiple levels as it can either say anything but decapsulation capabilities of the egress node much less its parameters (Destination address, GRE key etc..).

I think more thought and discussion is required before deciding that this is something that should be supported.
And I think this needs to be done BEFORE this becomes a WG document as - almost without exception - anything that becomes a WG document proceeds to become an RFC.


   Les


From: Uma Chunduri [mailto:uma.chunduri@ericsson.com]
Sent: Friday, February 26, 2016 12:09 PM
To: Uma Chunduri; Les Ginsberg (ginsberg); Christian Hopps; isis-wg@ietf.org<mailto:isis-wg@ietf.org> list
Subject: RE: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap

Dear Les et. al,

Please post any further comments you might have on this document.

--
Uma C.

From: Isis-wg [mailto:isis-wg-bounces@ietf.org] On Behalf Of Uma Chunduri
Sent: Thursday, January 14, 2016 4:51 PM
To: Les Ginsberg (ginsberg); Christian Hopps; isis-wg@ietf.org<mailto:isis-wg@ietf.org> list
Subject: Re: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap

Les,

Thanks for your comments, see in line [Uma]:
--
Uma C.

From: Isis-wg [mailto:isis-wg-bounces@ietf.org] On Behalf Of Les Ginsberg (ginsberg)
Sent: Tuesday, January 12, 2016 5:25 PM
To: Christian Hopps; isis-wg@ietf.org<mailto:isis-wg@ietf.org> list
Subject: Re: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap

Apologies for the very late response on this...

I have a couple of concerns regarding taking on this work.

The draft is straightforward enough in terms of the protocol extensions defined, but I am not at all clear on the usefulness of the information being advertised. The introduction to the draft discusses a variety of tunnel types which might be used in a network but does not offer an y reason why advertising the tunnel types supported is of benefit.

[Uma]: Lot of use cases have been described where there is no configuration possible for all possible egress nodes at a given ingress node; as asymmetric connections can be made dynamically based on the network topology; using the tunnel capabilities or parameters of egress node  from ingress.

Given this information is only advertised within a single administrative domain it does not seem to provide any information that is not already known to the network operator.
[Uma]: This is not about whether network operators know all the information but it's about if it is possible to configure/manage

a.       all options supported by possible egress nodes from ingress nodes perspective or

b.      one option of all "possible" egress nodes from ingress nodes pov.

It also logically leads to requiring a configuration for what tunnel types to advertise. If this information is meant to drive automatic configuration of tunnels I presume that the network operator would want to limit what is advertised - not simply accept what the implementation is capable of supporting. So it seems we have simply traded one configuration for another.
[Uma]: I don't see, we have traded any configuration here. An in-line ingress application/feature  running as part of IS-IS ought to know what kind of tunnel capabilities the egress node is capable of accepting and associated parameters thereof for that tunnel.  Network operator can always limit enabling  capabilities that are being supported and capabilities that are being advertised by an egress node as part of ISIS through configuration.

I would like to see more detail on this before deciding whether it is worth doing.

It is clear that the information is not at all useful to IS-IS itself - which brings me to my second concern. This is advertising information that has nothing to with IS-IS. Router Capabilities is not meant to be used as a vehicle to advertise information not of direct use to the protocol.
[Uma]:  I am not sure why you see it is not all useful to IS-IS ; most of the features/applications listed in  section 1 are related to  ISIS protocols. For example RLFA- computation of PQ nodes done after primary SPF and as part of RLFA  SPFs (neighbor SPF, neighbors rSPF) and PQ nodes are computed dynamically on the current topology. It's not conceivable to provision an ingress node with one/all tunnel capabilities of egress nodes (essentially where ever this feature is enabled and potentially all eventually).  Similarly for Spring/Bier nodes dynamic tunnels can be supported based on the neighboring non-spring/non-bier node capabilities advertised.

In fact, the existence of a couple of exceptions to this guideline is what prompted the creation of GENAPP (RFC 6823) as the appropriate place to advertise such information.

I would like to see further discussion of the above before deciding that WG adoption (which almost always indicates an intent to progress to RFC) is appropriate.

    Les


From: Isis-wg [mailto:isis-wg-bounces@ietf.org] On Behalf Of Christian Hopps
Sent: Monday, November 30, 2015 11:45 PM
To: isis-wg@ietf.org<mailto:isis-wg@ietf.org> list
Subject: Re: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap

[It seems due to some sneaky cut and paste error, the URL was wrong in the original email, I've corrected in this message]

Hi Folks,

The authors have requested the IS-IS WG adopt:

https://datatracker.ietf.org/doc/draft-xu-isis-encapsulation-cap/

as a working group document.

Please indicate support or no-support for taking on this work.

Thanks,
Chris.