AD review of draft-ietf-l2vpn-vpls-inter-domain-redundancy

"Adrian Farrel" <adrian@olddog.co.uk> Sat, 22 March 2014 17:02 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: l2vpn@ietfa.amsl.com
Delivered-To: l2vpn@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B93F51A06D2 for <l2vpn@ietfa.amsl.com>; Sat, 22 Mar 2014 10:02:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -97.083
X-Spam-Level:
X-Spam-Status: No, score=-97.083 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_BL_SPAMCOP_NET=1.347, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_SORBS_WEB=0.77, USER_IN_WHITELIST=-100] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d42ctjv0XfLO for <l2vpn@ietfa.amsl.com>; Sat, 22 Mar 2014 10:02:22 -0700 (PDT)
Received: from asmtp5.iomartmail.com (asmtp5.iomartmail.com [62.128.201.176]) by ietfa.amsl.com (Postfix) with ESMTP id E89941A0128 for <l2vpn@ietf.org>; Sat, 22 Mar 2014 10:02:21 -0700 (PDT)
Received: from asmtp5.iomartmail.com (localhost.localdomain [127.0.0.1]) by asmtp5.iomartmail.com (8.13.8/8.13.8) with ESMTP id s2MH2Kg3024377; Sat, 22 Mar 2014 17:02:20 GMT
Received: from 950129200 (13.17.90.92.rev.sfr.net [92.90.17.13]) (authenticated bits=0) by asmtp5.iomartmail.com (8.13.8/8.13.8) with ESMTP id s2MH2IB5024357 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Sat, 22 Mar 2014 17:02:19 GMT
From: "Adrian Farrel" <adrian@olddog.co.uk>
To: <draft-ietf-l2vpn-vpls-inter-domain-redundancy.all@tools.ietf.org>
Subject: AD review of draft-ietf-l2vpn-vpls-inter-domain-redundancy
Date: Sat, 22 Mar 2014 17:02:18 -0000
Message-ID: <0aaa01cf45f0$7d04ae00$770e0a00$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 14.0
Thread-Index: Ac9F8Hhs0B3eBc77Qze8MzWdKc/7ag==
Content-Language: en-gb
X-TM-AS-MML: disable
X-TM-AS-Product-Ver: IMSS-7.1.0.1576-7.5.0.1017-20584.000
X-TM-AS-Result: No--36.204-10.0-31-10
X-imss-scan-details: No--36.204-10.0-31-10
X-TMASE-MatchedRID: 7REYQKYFUU6I0KPyMNrNUnBRIrj8R47F1Ga2L87qPQLIvQIyugvKdbcK r9noZuZJ9zdfDb8dk+WJPuhfLlICQsJ67zXcCineW7gz/Gbgpl6C7C2rJeUToX1ZAf3L+lJdz5z AIum8OcSDpyhorm+Lux137AdWhJ86b4ixR8bvk/a4jAucHcCqnS3S35ohUu37+yNYYwngrxY9CR KBFe4asV3uUVH5nWUIRoNTe9wP1Fp48YB5KfXbgkhwlOfYeSqxh8Ytn75ClDPQpokFSTvCgAef5 FoKtUGzMVtXMjD94PIWQiN2CcE9pAosIIcjztMuf01qcJQDhV4Tc3GwbO2sy1nDUAu1mqvNxGu+ O8UpNrFXGUcuUsCpUFATU1o+/2u+RVwKIRfLzSazI1v7J4hECr4X/8yfdrbDW+jwVKpqvlJe5bV twga9ZfcH4e13Al40ME7n8n46OINUO3zzgy+7kOv8QGaI25e3rxZQ031Z6Fq7qpOHKudqc4ZbNF r3ThNDNIw9QKbYB+ZuTK43U2r81sKTW98jPwwN1yMJs9mBCcXOVqtt847AWmM/KUJMHtq/o8WMk QWv6iV95l0nVeyiuDrm2CwlZwVRvECLuM+h4RB+3BndfXUhXQ==
Archived-At: http://mailarchive.ietf.org/arch/msg/l2vpn/GLIanvdjPxYxNoJgqaxQKQMCCqU
Cc: l2vpn@ietf.org
X-BeenThere: l2vpn@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: adrian@olddog.co.uk
List-Id: Layer 2 Virtual Private Networks <l2vpn.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/l2vpn/>
List-Post: <mailto:l2vpn@ietf.org>
List-Help: <mailto:l2vpn-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/l2vpn>, <mailto:l2vpn-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Mar 2014 17:02:24 -0000

As is my usual practice, I am doing a review of your document as AD to
support the publication request from the WG chairs.  Thanks to Lizhong
for answering my early questions. I understand the intention of the
document and have a number of updates that I think you need to make to
improve the quality and direction of the work.

FWIW I disagree with Lizhong that this is not a protocol specification.
This document specifically gives instructions of process that an 
implementation has to follow (look at Section 5.3) and those procedures
will change what messages the implementation sends. That means that the
text changes what happens on the wire. So, although there are no bits 
and bytes changes, this is a protocol specification.

I have put the document into "Revised I-D Needed" state. When I see a 
new revision, I'll move it forward. In the meantime, you should feel
free to debate any of these points with me if you disagree.

Thanks for the work,
Adrian

==========                               

It would be really nice to fix idnits

---

Please check the text for acronyms that have not been expanded.

---

Several places in the text (but not the boilerplate) please
s/draft/document/

---

I can't see how this is a BCP. I realise that RFC 2026 section 5 is not
really clearly written, but this is a technical spec that describes how
to build a particular function in the network. Standards Track would be
just fine (even though there are no bits and bytes defined) because you
are defining procedures (using 2119 language) that an implementation has
to perform to make this function work (i.e., interoperate).

---

Section 1

Please give a little more information about what the "solution" is. You
don't need to go into full detail, but you do need to give some 
overview. Things I'd like to see covered...
- motivation is to provide service protection mechanisms in the event of
  edge node failure
- basic mechanism is to provide edge node redundancy
- solution is dependent on the use of ICCP (with reference) to 
  coordinate between redundant edge nodes
- no changes to any protocol message formats are needed for this 
  solution and no new protocol options are defined
- this solution is a description of how existing protocol building 
  blocks may be deployed to achieve the desired function, but also
  defines implementation behavior necessary for the function to work.

---

Section 4

3/PE4/PE5/PE6 should read PE3/PE4/PE5/PE6

---

The figures in Section 4 use "RG" but this term is not introduced until
Section 5.

---

Figure 2 might usefully be redrawn to show how PW3 and PW4 attach to the
PEs.

---

Section 5 says

   For the inter-domain four-PW scenario,
   it is required for PEs to ensure that the same mode is supported on
   the two ICCP peers in the same redundancy group (RG).

But you don't say how this is achieved.

---

Section 5.2

   Before
   deploying this inter-domain VPLS, the operators MUST negotiate to
   configure same PW high/low priority at two PW end-points.

How do they do this?

---

Section 5.3

   In this use case, there are generally three options

So, sometimes two options and sometimes four options? :-)
Delete "generally", but also make clear what the three options are.

---

Section 5.3

   support of 'request switchover' bit is required

It would have helped me if this had used the same name as in RFC 6870
(Request Switchover status bit) and had included a reference to RFC
6870.

---

Section 6

There seem to be some independent actions needed (operator negotiation,
setting of mode). Are these security vulnerabilities?

ICCP is being run on the Internet and not in a chassis. Does that make a
difference to the security model?