AD review of draft-ietf-l2vpn-vpls-inter-domain-redundancy
"Adrian Farrel" <adrian@olddog.co.uk> Sat, 22 March 2014 17:02 UTC
Return-Path: <adrian@olddog.co.uk>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com
(Postfix) with ESMTP id B93F51A06D2 for <l2vpn@ietfa.amsl.com>;
Sat, 22 Mar 2014 10:02:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -97.083
X-Spam-Level:
X-Spam-Status: No,
score=-97.083 tagged_above=-999 required=5 tests=[BAYES_50=0.8,
RCVD_IN_BL_SPAMCOP_NET=1.347, RCVD_IN_DNSWL_NONE=-0.0001,
RCVD_IN_SORBS_WEB=0.77, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d42ctjv0XfLO for
<l2vpn@ietfa.amsl.com>; Sat, 22 Mar 2014 10:02:22 -0700 (PDT)
Received: from asmtp5.iomartmail.com (asmtp5.iomartmail.com [62.128.201.176])
by ietfa.amsl.com (Postfix) with ESMTP id E89941A0128 for <l2vpn@ietf.org>;
Sat, 22 Mar 2014 10:02:21 -0700 (PDT)
Received: from asmtp5.iomartmail.com (localhost.localdomain [127.0.0.1]) by
asmtp5.iomartmail.com (8.13.8/8.13.8) with ESMTP id s2MH2Kg3024377;
Sat, 22 Mar 2014 17:02:20 GMT
Received: from 950129200 (13.17.90.92.rev.sfr.net [92.90.17.13])
(authenticated bits=0) by asmtp5.iomartmail.com (8.13.8/8.13.8) with ESMTP id
s2MH2IB5024357 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO);
Sat, 22 Mar 2014 17:02:19 GMT
From: "Adrian Farrel" <adrian@olddog.co.uk>
To: <draft-ietf-l2vpn-vpls-inter-domain-redundancy.all@tools.ietf.org>
Subject: AD review of draft-ietf-l2vpn-vpls-inter-domain-redundancy
Date: Sat, 22 Mar 2014 17:02:18 -0000
Message-ID: <0aaa01cf45f0$7d04ae00$770e0a00$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: Ac9F8Hhs0B3eBc77Qze8MzWdKc/7ag==
Content-Language: en-gb
X-TM-AS-MML: disable
X-TM-AS-Product-Ver: IMSS-7.1.0.1576-7.5.0.1017-20584.000
X-TM-AS-Result: No--36.204-10.0-31-10
X-imss-scan-details: No--36.204-10.0-31-10
X-TMASE-MatchedRID: 7REYQKYFUU6I0KPyMNrNUnBRIrj8R47F1Ga2L87qPQLIvQIyugvKdbcK
r9noZuZJ9zdfDb8dk+WJPuhfLlICQsJ67zXcCineW7gz/Gbgpl6C7C2rJeUToX1ZAf3L+lJdz5z
AIum8OcSDpyhorm+Lux137AdWhJ86b4ixR8bvk/a4jAucHcCqnS3S35ohUu37+yNYYwngrxY9CR
KBFe4asV3uUVH5nWUIRoNTe9wP1Fp48YB5KfXbgkhwlOfYeSqxh8Ytn75ClDPQpokFSTvCgAef5
FoKtUGzMVtXMjD94PIWQiN2CcE9pAosIIcjztMuf01qcJQDhV4Tc3GwbO2sy1nDUAu1mqvNxGu+
O8UpNrFXGUcuUsCpUFATU1o+/2u+RVwKIRfLzSazI1v7J4hECr4X/8yfdrbDW+jwVKpqvlJe5bV
twga9ZfcH4e13Al40ME7n8n46OINUO3zzgy+7kOv8QGaI25e3rxZQ031Z6Fq7qpOHKudqc4ZbNF
r3ThNDNIw9QKbYB+ZuTK43U2r81sKTW98jPwwN1yMJs9mBCcXOVqtt847AWmM/KUJMHtq/o8WMk
QWv6iV95l0nVeyiuDrm2CwlZwVRvECLuM+h4RB+3BndfXUhXQ==
Archived-At: http://mailarchive.ietf.org/arch/msg/l2vpn/GLIanvdjPxYxNoJgqaxQKQMCCqU
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: adrian@olddog.co.uk
List-Id: Layer 2 Virtual Private Networks <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>,
<mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn/>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>,
<mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Mar 2014 17:02:24 -0000
As is my usual practice, I am doing a review of your document as AD to support the publication request from the WG chairs. Thanks to Lizhong for answering my early questions. I understand the intention of the document and have a number of updates that I think you need to make to improve the quality and direction of the work. FWIW I disagree with Lizhong that this is not a protocol specification. This document specifically gives instructions of process that an implementation has to follow (look at Section 5.3) and those procedures will change what messages the implementation sends. That means that the text changes what happens on the wire. So, although there are no bits and bytes changes, this is a protocol specification. I have put the document into "Revised I-D Needed" state. When I see a new revision, I'll move it forward. In the meantime, you should feel free to debate any of these points with me if you disagree. Thanks for the work, Adrian ========== It would be really nice to fix idnits --- Please check the text for acronyms that have not been expanded. --- Several places in the text (but not the boilerplate) please s/draft/document/ --- I can't see how this is a BCP. I realise that RFC 2026 section 5 is not really clearly written, but this is a technical spec that describes how to build a particular function in the network. Standards Track would be just fine (even though there are no bits and bytes defined) because you are defining procedures (using 2119 language) that an implementation has to perform to make this function work (i.e., interoperate). --- Section 1 Please give a little more information about what the "solution" is. You don't need to go into full detail, but you do need to give some overview. Things I'd like to see covered... - motivation is to provide service protection mechanisms in the event of edge node failure - basic mechanism is to provide edge node redundancy - solution is dependent on the use of ICCP (with reference) to coordinate between redundant edge nodes - no changes to any protocol message formats are needed for this solution and no new protocol options are defined - this solution is a description of how existing protocol building blocks may be deployed to achieve the desired function, but also defines implementation behavior necessary for the function to work. --- Section 4 3/PE4/PE5/PE6 should read PE3/PE4/PE5/PE6 --- The figures in Section 4 use "RG" but this term is not introduced until Section 5. --- Figure 2 might usefully be redrawn to show how PW3 and PW4 attach to the PEs. --- Section 5 says For the inter-domain four-PW scenario, it is required for PEs to ensure that the same mode is supported on the two ICCP peers in the same redundancy group (RG). But you don't say how this is achieved. --- Section 5.2 Before deploying this inter-domain VPLS, the operators MUST negotiate to configure same PW high/low priority at two PW end-points. How do they do this? --- Section 5.3 In this use case, there are generally three options So, sometimes two options and sometimes four options? :-) Delete "generally", but also make clear what the three options are. --- Section 5.3 support of 'request switchover' bit is required It would have helped me if this had used the same name as in RFC 6870 (Request Switchover status bit) and had included a reference to RFC 6870. --- Section 6 There seem to be some independent actions needed (operator negotiation, setting of mode). Are these security vulnerabilities? ICCP is being run on the Internet and not in a chassis. Does that make a difference to the security model?
- AD review of draft-ietf-l2vpn-vpls-inter-domain-r… Adrian Farrel
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Adrian Farrel
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Lizhong Jin
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Lizhong Jin
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Adrian Farrel
- Re: AD review of draft-ietf-l2vpn-vpls-inter-doma… Loa Andersson
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Adrian Farrel
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Lizhong Jin
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Lizhong Jin
- RE: AD review of draft-ietf-l2vpn-vpls-inter-doma… Adrian Farrel