Re: [Lsr] Benjamin Kaduk's No Objection on draft-ietf-lsr-ospf-prefix-originator-10: (with COMMENT)

"Ketan Talaulikar (ketant)" <ketant@cisco.com> Wed, 07 April 2021 08:44 UTC

Return-Path: <ketant@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 38D283A11AB; Wed, 7 Apr 2021 01:44:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.617
X-Spam-Level:
X-Spam-Status: No, score=-9.617 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=nD7JHLKH; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=vokKTRKf
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kfLM7Px4gICG; Wed, 7 Apr 2021 01:44:47 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CD7863A11A7; Wed, 7 Apr 2021 01:44:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8019; q=dns/txt; s=iport; t=1617785087; x=1618994687; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=9uozAgAkrmuCzLJbyUBYc8JpPengsihRjyx60L5uLSQ=; b=nD7JHLKHKzxDdcrheeCZieS6aFESCtOgivNOPJpQo7mlhw5t5MbY5wiL hhENEpEk41WIvWxfSNoHHvP6tzhNiUiZ+3aNMpxxLznRQ7Fer18VITJJk sej5Q2G3FH75B8CLfuAe2ywlLveW/8k5yLid7en+d6dtFJ3V+V0RaLIJH g=;
X-IPAS-Result: A0DsAQC8b21gmJhdJa1aDg4BAQEBAQEHAQESAQEEBAEBQIFSgVMjLn5aNjEKiAADhTmITwOKLoR5ihSBQoERA1QLAQEBDQEBHQ0IAgQBAYEWAYM5AoF3AiU4EwIDAQEBAwIDAQEBAQEFAQEBAgEGBBQBAQEBAQEBAWiFUA2GRAEBAQEDAQE4BgEBLAYFAQsEAgEIEQQBAR8FCyEGCx0IAgQBDQUIgmkBglUDLwEOoUICih91gTSBAYIEAQEGgTcCDkGDFg0LghMDBoE5gnaGY4N0JxyBSUKBE0OCXz6CHkIBAQEBAYEoARIBIzCDGoIrgVgBawg8HQkEIhkWAgJOCz1BBCQRGZELEoJyAYhdjEaQTQkwWwqDC4ljhx2GRIVbg02KeJNQglyVFYIQiVqDFo9EAwGEYQICAgIEBQIOAQEGgWsha1gRB3AVO4JpUBcCDo4fGR6DOYUUhQRBcwI2AgYKAQEDCXyLBgExXQEB
IronPort-PHdr: A9a23:T9TNGhSV8w9yTFDMDSNcAgiUydpso1PLVj590bIulq5Of6K//p/rI E3Y47B3gUTUWZnAg9pBivaQvqz9CiQM4peE5XYFdpEEFxoIkt4fkAFoBsmZQVb6I/jnY21ff oxCWVZp8mv9PR1TH8DzNFjTvju/4SNBUhn6PBB+c+LyHIOahs+r1ue0rpvUZQgAhDe0bb5oa husqgCEvcgNiowkIaE0mXP0
IronPort-HdrOrdr: A9a23:QPrlWqq785h6dy0eDtFOgtoaV5taK9V00zAX/kB9WHVpW+SivY SHgOkb2RjoiDwYRXEnnpS6NLOdRG7HnKQV3aA4Bp3neAX9omOnIMVZ7YXkyyD9ACGWzIBg/I 9aWexFBNX0ZGIUse/T6gO1Cstl5dGB/ryhi+u29QYTcShBQchbnmBEIyycFVB7QxQDIJI/Go aV6MYvnUvfRV08aMOnCn4ZG9XZr9rQm578JTIADRgr6A6B5AnYqYLSOR6ewxsYTndz0a4vmF K13TDRy4eCl7WAyhHa33LO9Jg+orvc4/ZKGcDksLlvFhzCkQCtDb4RPoGqnDdwm+237UZvrd +kmWZdA+1Wy1f8Ol64ugHs3Q6I6kdv11bHxUWDiXXu5ezVLQhKcfZpvo5SfhvH50dIhrgVu8 gnsxP7xvhqJCjNkyjn69/DWwsCrDvInVMZjeURg3ZDOLFuDoN5kI0F8EtZVLcGES7qgbpXaN VGMcDG6P5aNW6ddnDS11MfueCEY3JbJGbjfmEy/uiulxRGlnFwyEUVgOYFmG0byZ47Q55Yo8 zZL6VBjth1P4wrRJM4IN1Ebdq8C2TLTx6JGnmVO07bGKYOPG+Ig4Lr4Y8y+PqhdPUzvdkPsa WEdGkdmX85ekroB8HL9oZM6ArxTGK0Wimo7c1C+Z5juPnZSKDwOSOODHAi+vHQ5sk3M4n+Yb KeKZhWC/jsIS/FAoBSxTDzXJFUND0QS8sQttEnW0+fo87CJ4Hw39arN8r7Ff7IK3IJS2n/Cn wMUHzYP8Nb9H2mXXf+nVzQVhrWCwrC1KM1NJKf0/kYyYALOIEJmBMSk06F6saCLiAHtqQ3eU B5Ma72i6/TnxjuwU/4q0FSfjZNBEdc57vtF1lQoxURDk/yebEf/9OFeW5T23ODLgRlT9zfFR Neo1gfw9PyE7WggQQZT/63OGOTiHUe4FiQSY0Hp6GF7cD5Po8jAo0+Q6x3HwXTHxlzkQJnwV 0zMDMsdwv6LHfDmK+lhJsbCKXjbNF6mh6sOtMRg2nYr1+gqcYmQWY7UzaiXdWMuxsnQyNZiz RKgvQiqYvFvQzqCGMkxMwkLVVHaQ2sccN7JTXAQL8Rp5fGV0VbS3yQiTmTlhcpE1Cah3k6ty jGNi2befbCH1xHnGtXu5yaqm9cRyG6Y196bGx8vMlbE2nL00wDjdOjV+6Uz3abbEcEz6UmFA z9JREWIg9o2rmMpUOosT6fCHQrwYgvNOTBDLIlN6rewG+pNZfgr9B0I9ZEuJliL9zgqekNTK aWfBKUNirxD6cz1xWSvWtNAlg4lFA01ffp0gbi9m62wTo2BufTOk1vQ9ggUpqhxnmhQ/aDy5 Nii90p+eO2L2Xqc9aDjaXadSRKJB+WoWm4SYgT2NpplLN3sLt4BJ/AVzTUkHlBwRUlNc/x0F oEX74T2sG2BqZ/O8gJPy5J9Fsgk9qCaEMtrwztG+c7OVUglWXSMd+F66fBwIBfTnGptU/1Ix 2S4idd9/DKU2+Y2bkWB7k5LG5WZEI/gU4StN+qZsnVEkGnZutD9F21Pjuha7dbUrGCAqhVoR Bg4d2E9tXnOBbQyUTVp398La1P+Wr8Hp/3DwKIBOJS89u1fV6LmbCn5cavjDHxDTu3An5o8b FtZAgVdIBEjDJnkYg8li61Qabzqlg+k1Rf7Sp8/2Sdk7SO8SPeBwVeLQbdgp9KRjFdPXiDkN Td/YGjpQHAySkA3YOGCVxZcd5PEcUBV4T7Ly9hLs4Lob6jlpBf9RhrcVMpFG4ziDf0wuNg0/ O4wZzpKp/fNUs=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.82,203,1613433600"; d="scan'208";a="693441046"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 07 Apr 2021 08:44:45 +0000
Received: from mail.cisco.com (xbe-aln-003.cisco.com [173.36.7.18]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 1378ijDX023583 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Wed, 7 Apr 2021 08:44:45 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xbe-aln-003.cisco.com (173.36.7.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.2.792.3; Wed, 7 Apr 2021 03:44:45 -0500
Received: from xfe-aln-004.cisco.com (173.37.135.124) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Wed, 7 Apr 2021 04:44:44 -0400
Received: from NAM02-DM3-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-004.cisco.com (173.37.135.124) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3 via Frontend Transport; Wed, 7 Apr 2021 03:44:44 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HK+xK8RcwIDB/djVjwtTDoVTo7MGfnnSptj3kqOqXfRhghxnnar2seD6SRKT/sXQyjXzd2SA/t/kbNOXdOCrd2D17o9v8TJFRNxoge1E/ONBcPpJvt99NVO3zUtGOLP0zOmPSINijDvAqH3Xe12qGQXrLf/BkHwYkmLQz24pNvK+upVoXqTxghZdAGyQYTihtP5dGjQJ79QheZOKvI8R6FtI38fguzPxOpWuYfCSF4SE5dTJ/fKupMzgl9ThtKhVzvDkV+qC4zTAX4R0O0ya20O/nchL7mNbb+FZhDmweLsuRI8SgUkSKH2/XtYl5sXl2vGau6PlBKHEwT+E+uJFoA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UHbknEHPALZMPzXdtSGr4TgtePHXEdEUbRu3ivG0vu8=; b=IyFemNiPtyyUEZarZDpciKGwWwOViYe2FGIz4+ykZieD+2u8YnIIdZGqlF77KM8jbPp/PiUh5WYJWpQDGOd/d0PLk5aVHAK+tZVqBWF5nF7RUxDFVTZVinrDAp58Hge+0pgX0w3xlIEYl4xp/1Ie11fxcg7LH+rTkKusFZLch2UrvUKjKU5wLMyfwbGhkNd1Q4uhv6IyS7xPqwNywsE4rDOAR7EOyC+Ue2iheUWQqNMfZfo7RAnM3kEo+bhBP5+hpGfgYgQqMbY6MP6mPd4yQRf9+Fo9Xo4Ezru3vWoyo0qdzM5RE805ojbK/Qruy7+ScphQ0+1G1eodyGkmdNEVdw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UHbknEHPALZMPzXdtSGr4TgtePHXEdEUbRu3ivG0vu8=; b=vokKTRKfLk6THreOrWPyo1mtxSLsvIWLxPuMU8wA7mR6BHzq0xmt+6WSkav+5ICf+bxetQdxlJufGs9Dl418Xa4QxWZMF59QKqn3l/91sC21EbK2iLj7oIg+6VPZFXl0G2VqwilMzZkFAYwajWH8BxUxBywYE/jX0QlJmwQ3lXc=
Received: from MW3PR11MB4570.namprd11.prod.outlook.com (2603:10b6:303:5f::22) by MWHPR11MB1712.namprd11.prod.outlook.com (2603:10b6:300:29::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3999.29; Wed, 7 Apr 2021 08:44:43 +0000
Received: from MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::592f:2e19:cf5b:a0f5]) by MW3PR11MB4570.namprd11.prod.outlook.com ([fe80::592f:2e19:cf5b:a0f5%5]) with mapi id 15.20.3999.033; Wed, 7 Apr 2021 08:44:42 +0000
From: "Ketan Talaulikar (ketant)" <ketant@cisco.com>
To: Benjamin Kaduk <kaduk@mit.edu>, The IESG <iesg@ietf.org>
CC: "lsr-chairs@ietf.org" <lsr-chairs@ietf.org>, "aretana.ietf@gmail.com" <aretana.ietf@gmail.com>, "draft-ietf-lsr-ospf-prefix-originator@ietf.org" <draft-ietf-lsr-ospf-prefix-originator@ietf.org>, "chopps@chopps.org" <chopps@chopps.org>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: [Lsr] Benjamin Kaduk's No Objection on draft-ietf-lsr-ospf-prefix-originator-10: (with COMMENT)
Thread-Index: AQHXK3RwlojH1/uVU0SQkMY7XGkQY6qosgNA
Date: Wed, 07 Apr 2021 08:44:42 +0000
Message-ID: <MW3PR11MB45702CDA1976A9A65D26A41FC1759@MW3PR11MB4570.namprd11.prod.outlook.com>
References: <161777569111.16216.18390599109395230994@ietfa.amsl.com>
In-Reply-To: <161777569111.16216.18390599109395230994@ietfa.amsl.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: mit.edu; dkim=none (message not signed) header.d=none;mit.edu; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [72.163.220.12]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: dfaaf885-5ed4-4456-0fef-08d8f9a16399
x-ms-traffictypediagnostic: MWHPR11MB1712:
x-microsoft-antispam-prvs: <MWHPR11MB17122FDED9594C98BC77C8D4C1759@MWHPR11MB1712.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MW3PR11MB4570.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(136003)(346002)(366004)(39860400002)(376002)(8676002)(8936002)(53546011)(7696005)(6506007)(55016002)(52536014)(71200400001)(4326008)(86362001)(5660300002)(9686003)(478600001)(66446008)(64756008)(66556008)(66476007)(66946007)(316002)(110136005)(966005)(54906003)(33656002)(38100700001)(26005)(66574015)(83380400001)(2906002)(76116006)(186003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW3PR11MB4570.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: dfaaf885-5ed4-4456-0fef-08d8f9a16399
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Apr 2021 08:44:42.7657 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ne8OEuoypWUdC61qmygHm+3XEtk8dZA+GlR9anKsDVKTKkYQyiGmD/aqjwtxXppBA5XOzoVOW0D9LD6Uam4OuA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB1712
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.18, xbe-aln-003.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/5BFBVklZQEbiiL9eNP32mGc82oQ>
Subject: Re: [Lsr] Benjamin Kaduk's No Objection on draft-ietf-lsr-ospf-prefix-originator-10: (with COMMENT)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 07 Apr 2021 08:44:52 -0000

Hi Ben,

Thanks for your review.

An update to the draft with to address some of yours, John's and Eric's comments has just been posted : https://datatracker.ietf.org/doc/html/draft-ietf-lsr-ospf-prefix-originator-11

Please check inline below for responses.

-----Original Message-----
From: Lsr <lsr-bounces@ietf.org> On Behalf Of Benjamin Kaduk via Datatracker
Sent: 07 April 2021 11:38
To: The IESG <iesg@ietf.org>
Cc: lsr-chairs@ietf.org; aretana.ietf@gmail.com; draft-ietf-lsr-ospf-prefix-originator@ietf.org; chopps@chopps.org; lsr@ietf.org
Subject: [Lsr] Benjamin Kaduk's No Objection on draft-ietf-lsr-ospf-prefix-originator-10: (with COMMENT)

Benjamin Kaduk has entered the following ballot position for
draft-ietf-lsr-ospf-prefix-originator-10: No Objection

When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-lsr-ospf-prefix-originator/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

In the ECMP case is there a way to correlate (order of appearance?) the listed router-IDs with the listed reachable addresses?
[KT] No.

Are there cases where you might choose to only advertise one but not the other of the prefix source Router-ID and address?
[KT] Normally no. However, there is some text in Sec 5 about policies that may be employed to abstract/hide information (e.g. across areas/ASes) - such mechanisms may be used, as necessary, in a deployment.

Section 2.1

   The parent TLV of a prefix advertisement MAY include more than one
   Prefix Source OSPF Router-ID sub-TLV, one corresponding to each of
   the Equal-Cost Multi-Path (ECMP) nodes that originated the given
   prefix.

Is there any subtlety (or complexity, I guess) to how the advertising node knows about the other ECMP nodes advertising the same prefix?  
[KT] An ABR performs the inter-area prefix advertisements based on its local route computation (i.e. the sources contributing to its local intra-area route). It is not affected by the advertisement of the same prefix by another "peer/pair" ABR. I hope I've got your question right though.

For example, would there be some transient discovery stage when first setting up the ECMP advertisement and only a subset of the ECMP nodes are actually listed in some advertisements that go out?
[KT] Taking the scenario of the previous response, the inclusion of ECMP origin node information would depend on how the ABR router receives the intra-area prefix advertisements via LSAs from the nodes owning that prefix, how they get processed by the SPF computation and then how they get included in the inter-area route advertisements that the ABR generates. There are various timers and scheduling mechanisms in the protocol for each of these steps - but I would not call these timers/back-off mechanisms as "discovery".

Section 3

   another non-backbone area.  The ABR performs its prefix calculation
   to determine the set of nodes that contribute to the best prefix
   reachability.  It MUST use the prefix originator information only
   from this set of nodes.  The ABR MUST NOT include the Prefix Source
   OSPF Router-ID or the Prefix Source Router Address Sub-TLVs when it
   is unable to determine the information of the best originating node.

I feel like this text might be hiding some subtlety as to the nature of determining the "nodes that contribute to the best prefix reachability"
-- is this a concept that is well established in the core OSPF RFCs already (and thus doesn't need further explanation)?
[KT] Yes, it is a well-established part of the OSPF protocol/implementations.

Section 4

We often consider privacy considerations as part of the security considerations section.  Since routers are to some extent inherently "well known", they themselves may not have much privacy considerations but there may be something to say about propagating additional information about the internal structure of a given network.  My understanding is that OSPF areas are all under a common administrative domain, so this mostly only seems relevant to the case of AS-external advertisement.  One potential consideration would be if there is value in hiding that a set of prefixes are all advertised by the same router (the "linkability" of the prefixes, if you well).
(Hmm, I guess this is somewhat related to the existing operational considerations discussion, but not entirely equivalent.)
[KT] Yes, it is related. Hence the text in Sec 5 to cover the scenarios where there may be a desire to hide/abstract a set of prefixes' origin info while allowing for other prefixes.

If we go into more detail on potential use cases, we might accordingly be able to go into more detail on the consequences of a rouge node injecting incorrect prefix source information.
[KT] We are focusing on the OSPF protocol specification here. The details of the use-cases are beyond the scope of this document.

Section 5

   protocol.  Based on deployment design and requirements, a subset of
   prefixes may be identified for which the propagation of the
   originating node information across area boundaries is disabled at
   the ABRs.

Per my previous comment, is this even more important at ASBRs than ABRs?
[KT] Ack. I will update this in the text.

NITS

Section 1

   The identification of the originating router for a prefix in OSPF
   varies by the type of the prefix and is currently not always
   possible.  [...]

(nit) my intuition is suggesting that the intent is that the "procedures for identification" vary and are not always possible; is that correct?
(It seems to me that "the identification of the originating router varies by the type of prefix" would indicate that the actual identifier used for even the same advertising router will be different for the different type of prefix being advertised, which doesn't seem to be what the subsequent discussion describes.)
[KT] The procedures are actually described in the further sentences of the paragraph. It also explains the cases where this is not possible.
 
   address for the router.  The IPv4/IPv6 Router Address as defined in
   [RFC3630] and [RFC5329] for OSPFv2 and OSPFv3 respectively provide an
   address to reach that router.

(nit) Is it useful to indicate that these are TLVs, here?
[KT] The IPv4/IPv6 Router Address is in fact the name of the TLVs in the referenced drafts.

   the core OSPF route computation functionality.  They provide useful
   information for topology analysis and traffic engineering, especially
   on a controller when this information is advertised as an attribute
   of the prefixes via mechanisms such as Border Gateway Protocol Link-
   State (BGP-LS) [RFC7752] [I-D.ietf-idr-bgp-ls-segment-routing-ext].

The draft-ietf-idr-bgp-ls-segment-routing-ext reference seems rather unmotivated by the current prose leading up to it.
[KT] It is an informational reference that explains how the information is provided to an external controller or application via BGP-LS.

  Per John's Discuss some further exposition on the expected use case might help.
[KT] As mentioned in my response to John's Discuss, the further detailed discussion on use cases are beyond the scope of this document.

Thanks,
Ketan



_______________________________________________
Lsr mailing list
Lsr@ietf.org
https://www.ietf.org/mailman/listinfo/lsr