Re: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Mon, 29 February 2016 05:33 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: isis-wg@ietfa.amsl.com
Delivered-To: isis-wg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E7D91B2C4A for <isis-wg@ietfa.amsl.com>; Sun, 28 Feb 2016 21:33:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.507
X-Spam-Level:
X-Spam-Status: No, score=-14.507 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.006, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dN9Pm1_vLepC for <isis-wg@ietfa.amsl.com>; Sun, 28 Feb 2016 21:33:50 -0800 (PST)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0DD3D1B2C48 for <isis-wg@ietf.org>; Sun, 28 Feb 2016 21:33:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=13724; q=dns/txt; s=iport; t=1456724030; x=1457933630; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=rRHQf01LOhKUwApJMCvUD8miaN5lxe4mwpJZccFE/vQ=; b=DsASxQi63jeqXLo9Z3UOuu7gbRGjPOWc+i/Fx0+uoQPXGF355256D8yK dOcOl778qF3EMuRcr3lFhChgNuN4ZYlv4oTGQDA4oSZXft01mFxNRIFY2 y17v3cghV08L8lV0ZtEvzxGIXM6cd8BDt/sybGmr8vddbdautO7CcLz2t k=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0D4AQBs19NW/49dJa1egzpSbQa6VwENgWYXCoVyAoElOBQBAQEBAQEBZCeEQQEBAQQBAQEaHTEDCwwEAgEIEQQBAQEeCQcnCxQJCAIEAQ0FCIgXDr4bAQEBAQEBAQEBAQEBAQEBAQEBAQEBEQSGEoQ6hAUKAQYBhFgFlwwBhViIAoFlhESIUo5JAR4BAUKDZGqHCAEIFx1+AQEB
X-IronPort-AV: E=Sophos;i="5.22,519,1449532800"; d="scan'208";a="243595605"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 Feb 2016 05:33:48 +0000
Received: from XCH-ALN-003.cisco.com (xch-aln-003.cisco.com [173.36.7.13]) by rcdn-core-7.cisco.com (8.14.5/8.14.5) with ESMTP id u1T5XmDj029460 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 29 Feb 2016 05:33:48 GMT
Received: from xch-aln-001.cisco.com (173.36.7.11) by XCH-ALN-003.cisco.com (173.36.7.13) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Sun, 28 Feb 2016 23:33:47 -0600
Received: from xch-aln-001.cisco.com ([173.36.7.11]) by XCH-ALN-001.cisco.com ([173.36.7.11]) with mapi id 15.00.1104.009; Sun, 28 Feb 2016 23:33:47 -0600
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: Marc Binderberger <marc@sniff.de>, Hannes Gredler <hannes@gredler.at>, Uma Chunduri <uma.chunduri@ericsson.com>
Thread-Topic: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap
Thread-Index: AQHRKSDuT28sdMgL3ESJe3s68xYgBJ62KrQAgELBV1CAA4PWAIBDRWoAgAD5fjCAAHKIAP//pMtQgAKS2QD//7ja0A==
Date: Mon, 29 Feb 2016 05:33:47 +0000
Message-ID: <b9b35fb6bfe44819922dfcffc218c8a8@XCH-ALN-001.cisco.com>
References: <4C33F1DA-351A-4E4C-AB2D-EB9C530EBA36@chopps.org> <05BB1848-0F89-4A06-B1C6-7E955C41C9E9@chopps.org> <2d9f516b68fd4443853f512a533bd9d6@XCH-ALN-001.cisco.com> <1B502206DFA0C544B7A6046915200863514605D3@eusaamb105.ericsson.se> <1B502206DFA0C544B7A60469152008635152D9E1@eusaamb105.ericsson.se> <3741852a2e494e6ca54fd6ffe847ba14@XCH-ALN-001.cisco.com> <20160227175134.GA16059@gredler.at> <623aa7aca98449d68305bb75bf9744dd@XCH-ALN-001.cisco.com> <20160228194314146283.17ea4e23@sniff.de>
In-Reply-To: <20160228194314146283.17ea4e23@sniff.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.63.30]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/isis-wg/KSLfhCpJz5bSH17wJRM6SiJKde4>
Cc: Christian Hopps <chopps@chopps.org>, "isis-wg@ietf.org list" <isis-wg@ietf.org>
Subject: Re: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap
X-BeenThere: isis-wg@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF IS-IS working group <isis-wg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/isis-wg/>
List-Post: <mailto:isis-wg@ietf.org>
List-Help: <mailto:isis-wg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/isis-wg>, <mailto:isis-wg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Feb 2016 05:33:53 -0000

Let me try to clarify my concerns...

To use a tunnel endpoint you have to know it is reachable (IP/IPv6 Reachability TLVs already do this), you have to know it is reachable using the underlying tunnel transport (implementations today get this from internal communication (e.g. LDP), and you need to know it is the address of choice. For the last, admin tag is a much more efficient means of advertising this. For the first two this draft does not add value.
 
In summary, I think what is proposed in this draft  is bloating the advertisement space, will require more config knobs to control what is advertised, and won't tell us anything that we could not determine using existing infrastructure and/or additional use of admin tags.

   Les

> -----Original Message-----
> From: Marc Binderberger [mailto:marc@sniff.de]
> Sent: Sunday, February 28, 2016 7:43 PM
> To: Les Ginsberg (ginsberg); Hannes Gredler; Uma Chunduri
> Cc: isis-wg@ietf.org list; Christian Hopps
> Subject: Re: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap
> 
> Hello Les, Hannes, Uma & IS-IS experts,
> 
> when I was reading the document for the first time I had a similar reaction:
> what is the actual problem this draft tries to solve?
> 
> 
> > IMO the generic ability to discover tunnel-endpoints is something
> desireable.
> 
> that is a generic statement, so I agree :-)
> 
> > agreed that the actual use-cases should be (better) documented
> > somewhere (perhaps in RTGWG ?), but we can do that after WG adoption
> as
> > well.
> 
> That's where I have a problem. I prefer to have at least one use-case at the
> time when a proposal is under discussion. Looking at RFC5512 the
> Introduction
> chapter is more detailed. I'm not saying the list of "partial deployment of
> X" in the draft's section 1 is not convincing - but there are no details for
> at least one the items on the list.
> 
> 
> E.g.: I assume that not every node in the IS-IS network support a tunnel
> encapsulations - otherwise the draft may not be necessary. For the start
> Node
> R1 to reach the end Node R4 and realizing there is an MPLS/BIER/IPvX gap in
> between, R1 must find an egress tunnel node R2. R2 needs to find an ingress
> tunnel node R3
> 
>           Zone 1            Zone 2              Zone 3
>     R1 -----/.../---- R2 -----/.../------ R3 -----/.../---- R4
>          has MPLS,         misses MPLS,        has MPLS,
>          BIER, IPvX        BIER or IPvX        BIER, IPvX
> 
> (beware of proportional fonts - they are evil :-)
> 
> 
> I'm guessing that the draft does not differentiate between egress and
> ingress
> tunnel capability, i.e. if you support tunnel X you can encapsulate and
> decapsulate. Fine with that - but it's nowhere mentioned.
> 
> Then there is the matter of borders, here between Zone 1 and 2, and
> between
> Zone 2 and 3. For RFC5512 this concept may be more natural as BGP is made
> for
> it. What are the expectations for IS-IS though? Do all routers bordering two
> zones need to be tunnel-capable?  Do we want to support a limited number
> of
> tunnel-capable border routers?  What impact does this have on the required
> TLV information, distribution etc.?
> 
> 
> Long story short: I find it difficult to discuss the draft without more
> context.
> 
> 
> Regards, Marc
> 
> 
> 
> 
> 
> 
> On Sat, 27 Feb 2016 18:28:10 +0000, Les Ginsberg (ginsberg) wrote:
> > Hannes -
> >
> > Discovery of tunnel endpoints is not what this draft is about.
> >
> > I am saying that I do not see that announcing tunnel capabilities is
> > useful. Discovering tunnel endpoints obviously is useful - as is
> > identifying endpoint addresses - but this draft will help us do neither.
> >
> >    Les
> >
> >
> >> -----Original Message-----
> >> From: Hannes Gredler [mailto:hannes@gredler.at]
> >> Sent: Saturday, February 27, 2016 9:52 AM
> >> To: Les Ginsberg (ginsberg)
> >> Cc: Uma Chunduri; Christian Hopps; isis-wg@ietf.org list
> >> Subject: Re: [Isis-wg] WG Adoption Call for draft-xu-isis-encapsulation-cap
> >>
> >> hi les,
> >>
> >> <wg-chair hat off>
> >>
> >> On Sat, Feb 27, 2016 at 05:18:39PM +0000, Les Ginsberg (ginsberg) wrote:
> >> |    From my POV the draft currently defines how to advertise new
> >> |    information without defining why it is necessary to do so.
> >>
> >> agree - "discovery of tunnel endpoints" should be explicitly spelled out.
> >>
> >> |
> >> |    Yes, multiple tunnel types may be in use in the network - that does
> >> not
> >> |    in and of itself lead to a requirement to advertise supported tunnel
> >> |    types . In most cases, the support of a given tunnel type can be known
> >> |    today by other means. You give the example of RLFA - but today LDP
> >> |    reachability to an endpoint is something a router already knows - and
> >> |    this is the real requirement to setup an RLFA tunnel. Knowing that the
> >> |    endpoint is capable of supporting RLFA is insufficient. Further, folks
> >> |    (including you if I recall correctly) have indicated that they want
> >> |    more than just knowing RLFA capability - they also want to know what
> >> |    endpoint address to use. This logically leads to the use of admin tags
> >> |    which will not only indicate support for the tunnel type but also what
> >> |    endpoint address is preferred/required.
> >>
> >> guess the RLFA example refers to non-MPLS (IP-only deployments)
> >>
> >> |    I think more thought and discussion is required before deciding that
> >> |    this is something that should be supported. And I think this needs to
> >> |    be done BEFORE this becomes a WG document as - almost without
> >> exception
> >> |    - anything that becomes a WG document proceeds to become an RFC.
> >>
> >> IMO the generic ability to discover tunnel-endpoints is something
> >> desireable.
> >> agreed that the actual use-cases should be (better) documented
> >> somewhere (perhaps in RTGWG ?), but we can do that after WG adoption
> as
> >> well.
> >>
> >> - or is it that you want to make a case that discovery of tunnel endpoints
> >> is
> >> not desired at all ?
> >>
> >> /hannes
> >>
> >> |    From: Uma Chunduri [mailto:uma.chunduri@ericsson.com]
> >> |    Sent: Friday, February 26, 2016 12:09 PM
> >> |    To: Uma Chunduri; Les Ginsberg (ginsberg); Christian Hopps;
> >> |    isis-wg@ietf.org list
> >> |    Subject: RE: [Isis-wg] WG Adoption Call for
> >> |    draft-xu-isis-encapsulation-cap
> >> |
> >> |
> >> |    Dear Les et. al,
> >> |
> >> |
> >> |    Please post any further comments you might have on this document.
> >> |
> >> |
> >> |    --
> >> |
> >> |    Uma C.
> >> |
> >> |
> >> |    From: Isis-wg [[1]mailto:isis-wg-bounces@ietf.org] On Behalf Of Uma
> >> |    Chunduri
> >> |    Sent: Thursday, January 14, 2016 4:51 PM
> >> |    To: Les Ginsberg (ginsberg); Christian Hopps; [2]isis-wg@ietf.org list
> >> |    Subject: Re: [Isis-wg] WG Adoption Call for
> >> |    draft-xu-isis-encapsulation-cap
> >> |
> >> |
> >> |    Les,
> >> |
> >> |
> >> |    Thanks for your comments, see in line [Uma]:
> >> |
> >> |    --
> >> |
> >> |    Uma C.
> >> |
> >> |
> >> |    From: Isis-wg [[3]mailto:isis-wg-bounces@ietf.org] On Behalf Of Les
> >> |    Ginsberg (ginsberg)
> >> |    Sent: Tuesday, January 12, 2016 5:25 PM
> >> |    To: Christian Hopps; [4]isis-wg@ietf.org list
> >> |    Subject: Re: [Isis-wg] WG Adoption Call for
> >> |    draft-xu-isis-encapsulation-cap
> >> |
> >> |
> >> |    Apologies for the very late response on this...
> >> |
> >> |
> >> |    I have a couple of concerns regarding taking on this work.
> >> |
> >> |
> >> |    The draft is straightforward enough in terms of the protocol
> >> extensions
> >> |    defined, but I am not at all clear on the usefulness of the
> >> information
> >> |    being advertised. The introduction to the draft discusses a variety of
> >> |    tunnel types which might be used in a network but does not offer an y
> >> |    reason why advertising the tunnel types supported is of benefit.
> >> |
> >> |
> >> |    [Uma]: Lot of use cases have been described where there is no
> >> |    configuration possible for all possible egress nodes at a given
> >> ingress
> >> |    node; as asymmetric connections can be made dynamically based on
> the
> >> |    network topology; using the tunnel capabilities or parameters of
> >> egress
> >> |    node  from ingress.
> >> |
> >> |
> >> |    Given this information is only advertised within a single
> >> |    administrative domain it does not seem to provide any information
> that
> >> |    is not already known to the network operator.
> >> |
> >> |    [Uma]: This is not about whether network operators know all the
> >> |    information but it's about if it is possible to configure/manage
> >> |
> >> |    a.       all options supported by possible egress nodes from ingress
> >> |    nodes perspective or
> >> |
> >> |    b.      one option of all "possible" egress nodes from ingress nodes
> >> |    pov.
> >> |
> >> |
> >> |    It also logically leads to requiring a configuration for what tunnel
> >> |    types to advertise. If this information is meant to drive automatic
> >> |    configuration of tunnels I presume that the network operator would
> >> want
> >> |    to limit what is advertised - not simply accept what the
> >> implementation
> >> |    is capable of supporting. So it seems we have simply traded one
> >> |    configuration for another.
> >> |
> >> |    [Uma]: I don't see, we have traded any configuration here. An in-line
> >> |    ingress application/feature  running as part of IS-IS ought to know
> >> |    what kind of tunnel capabilities the egress node is capable of
> >> |    accepting and associated parameters thereof for that tunnel.  Network
> >> |    operator can always limit enabling  capabilities that are being
> >> |    supported and capabilities that are being advertised by an egress node
> >> |    as part of ISIS through configuration.
> >> |
> >> |
> >> |    I would like to see more detail on this before deciding whether it is
> >> |    worth doing.
> >> |
> >> |
> >> |    It is clear that the information is not at all useful to IS-IS itself
> >> -
> >> |    which brings me to my second concern. This is advertising information
> >> |    that has nothing to with IS-IS. Router Capabilities is not meant to be
> >> |    used as a vehicle to advertise information not of direct use to the
> >> |    protocol.
> >> |
> >> |    [Uma]:  I am not sure why you see it is not all useful to IS-IS ; most
> >> |    of the features/applications listed in  section 1 are related to  ISIS
> >> |    protocols. For example RLFA- computation of PQ nodes done after
> >> primary
> >> |    SPF and as part of RLFA  SPFs (neighbor SPF, neighbors rSPF) and PQ
> >> |    nodes are computed dynamically on the current topology. It's not
> >> |    conceivable to provision an ingress node with one/all tunnel
> >> |    capabilities of egress nodes (essentially where ever this feature is
> >> |    enabled and potentially all eventually).  Similarly for Spring/Bier
> >> |    nodes dynamic tunnels can be supported based on the neighboring
> >> |    non-spring/non-bier node capabilities advertised.
> >> |
> >> |
> >> |    In fact, the existence of a couple of exceptions to this guideline is
> >> |    what prompted the creation of GENAPP (RFC 6823) as the appropriate
> >> |    place to advertise such information.
> >> |
> >> |
> >> |    I would like to see further discussion of the above before deciding
> >> |    that WG adoption (which almost always indicates an intent to progress
> >> |    to RFC) is appropriate.
> >> |
> >> |
> >> |        Les
> >> |
> >> |
> >> |
> >> |    From: Isis-wg [[5]mailto:isis-wg-bounces@ietf.org] On Behalf Of
> >> |    Christian Hopps
> >> |    Sent: Monday, November 30, 2015 11:45 PM
> >> |    To: [6]isis-wg@ietf.org list
> >> |    Subject: Re: [Isis-wg] WG Adoption Call for
> >> |    draft-xu-isis-encapsulation-cap
> >> |
> >> |
> >> |    [It seems due to some sneaky cut and paste error, the URL was wrong
> in
> >> |    the original email, I've corrected in this message]
> >> |
> >> |
> >> |    Hi Folks,
> >> |    The authors have requested the IS-IS WG adopt:
> >> |
> >> |
> >> |
> >> | [7]https://datatracker.ietf.org/doc/draft-xu-isis-encapsulation-cap/
> >> |
> >> |
> >> |    as a working group document.
> >> |
> >> |    Please indicate support or no-support for taking on this work.
> >> |    Thanks,
> >> |    Chris.
> >> |
> >> | References
> >> |
> >> |    1. mailto:isis-wg-bounces@ietf.org
> >> |    2. mailto:isis-wg@ietf.org
> >> |    3. mailto:isis-wg-bounces@ietf.org
> >> |    4. mailto:isis-wg@ietf.org
> >> |    5. mailto:isis-wg-bounces@ietf.org
> >> |    6. mailto:isis-wg@ietf.org
> >> |    7.
> >> | https://datatracker.ietf.org/doc/draft-xu-isis-encapsulation-cap/
> >>
> >> | _______________________________________________
> >> | Isis-wg mailing list
> >> | Isis-wg@ietf.org
> >> | https://www.ietf.org/mailman/listinfo/isis-wg
> >
> > _______________________________________________
> > Isis-wg mailing list
> > Isis-wg@ietf.org
> > https://www.ietf.org/mailman/listinfo/isis-wg
> >