[Lsr] Question on RFC-8667 section 2.1.1.2 and 2.1.2 related PrefixSID Propagation and L1L2 leaks ...

Waman Nawathe <rguy@benunets.com> Mon, 08 August 2022 22:57 UTC

Return-Path: <rguy@benunets.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC80FC15C501 for <lsr@ietfa.amsl.com>; Mon, 8 Aug 2022 15:57:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=benunets.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id seubMoL_rFOr for <lsr@ietfa.amsl.com>; Mon, 8 Aug 2022 15:57:11 -0700 (PDT)
Received: from mail-wr1-x42f.google.com (mail-wr1-x42f.google.com [IPv6:2a00:1450:4864:20::42f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6674FC15BEC6 for <lsr@ietf.org>; Mon, 8 Aug 2022 15:57:11 -0700 (PDT)
Received: by mail-wr1-x42f.google.com with SMTP id q30so12426114wra.11 for <lsr@ietf.org>; Mon, 08 Aug 2022 15:57:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=benunets.com; s=google; h=to:subject:message-id:date:from:mime-version:from:to:cc; bh=4sSoqS/3svyUfGOprnfV105lfhK7TiXrWtPhMYxdt+U=; b=VI62XopnoN/CeoHlgE6cYnhmDypZu/8mM2w5vr078JjTNin4EJywhgsOMa/K+60L8g vJap4fMWONIRlxBrjvyNm1MAlnELrEA/7nKg1sSegLLBEcNA+ONuOGLBgrRzbnE0+BYX +GDQ+WoYHkJGhB0SVtMmzHT7fvHH+j+Ic5mkoZPLwXBWMhDyNEyvKfW/kHTR3GeTT1Gw gzpAHEu/w9aACQkPERE5vAXvZfMOomhTuGnMCOmF7EJld0c4t9pt+Pa/9iSBf4odbT1R JFyOWPtsfpANrsu+dCpBSP9+DBJj2GAARfQUCaPEaE9Trj8styGws9j8lp6jUCM5LRvF ciTg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc; bh=4sSoqS/3svyUfGOprnfV105lfhK7TiXrWtPhMYxdt+U=; b=JRk06Ok8RRYEaU67VCeGN/9nHoND2gt5UeAo9uBsXVnvHtCn3Hk2dWZ5OJWuIBCYjd p4YQYPPOIA88Bd6tQT1VXBXUXdre/whTyfi/QwBSMcDx0HpaCd6ayOeA+fISy2KZ3f3r rxwWzDyQ+GgIGSnBfu7/oxrC6VqXT3g+RDkI5/52WfUq1zyPV330A1Lj0VoxuTMdHNTY IoI/2VOc0sU5kL/Ii6IHTk88XQIbV/fhRBOEXoGVUH0qjInXPxjHjtqJuSkHDntHbU0D ua9ddVgNV5S4uE5FSKDTJA8UkFONdFYMHeo50AZk0SrACb0zLXBwiSH2si8VPNSFLdfn hGTA==
X-Gm-Message-State: ACgBeo0wfOjbMxqyU8Oqh8FwFXn5Ht4ndYC1de+u/okduDDQwzZ+EH5z m0BA1T+xKitESNBvJRey/UN91Gwnb3deyY9mYHXVsXVeotvYWPenTZaiDvxhmSdTglCyuWzMFri wx6ke0+akEEzId1NJxbvK0A9wKcBDa9Y9yP595Zfl1sQQYF4VVffcO97tKPvdhL+3v6Md3TEJ1b WvTg8Dgx6XxY4=
X-Google-Smtp-Source: AA6agR6TPc+BiHjH+REa30UX+gaLk/Br5aa4u6Dyvoa/yztujd2UTx+HIvSJRBYx+7AKcYGHg50jrVjd7wY/82QGWWw=
X-Received: by 2002:a5d:5887:0:b0:220:81c9:8ab7 with SMTP id n7-20020a5d5887000000b0022081c98ab7mr12382030wrf.702.1659999429188; Mon, 08 Aug 2022 15:57:09 -0700 (PDT)
MIME-Version: 1.0
From: Waman Nawathe <rguy@benunets.com>
Date: Mon, 08 Aug 2022 18:56:58 -0400
Message-ID: <CALBQe7DnVhjYqDAXPS+9GEs7fUw0x=6114mdNNZ=jbf5uJQn-Q@mail.gmail.com>
To: lsr@ietf.org
Content-Type: multipart/alternative; boundary="0000000000004df40c05e5c2bc95"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/7kY5zzF-NA0bfT023ifyEwntXIk>
X-Mailman-Approved-At: Mon, 08 Aug 2022 16:50:44 -0700
Subject: [Lsr] Question on RFC-8667 section 2.1.1.2 and 2.1.2 related PrefixSID Propagation and L1L2 leaks ...
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2022 23:00:22 -0000

Hello All,

New to this IETF list and posting ..

Regarding this section RFC-8667 2.1.1.2, It should ONLY apply to
ISIS L1L2 (or ABR) router and not L1 only or L2 only and here is my
reasoning ....

-----------------------------------------------------------
------------------------------
Reference Diagram (A):
-----------------------

                                   L1L2 (ABR)

Grunt-54 (L1) -------------- (L1) Grunt-104 (L2) ------------- (L2) Grunt
106

                                  L1 --> L2 Route Leaks or
                                  L1 <-- L2



-----------------------
Reference Diagram (B):  Showing Flat L1 or Flat L2 not using any ABRs:
-----------------------



    Grunt-54 --- G100 --- G101 --- G103       Grunt-104     Grunt-106 ----
G200 ---- G201 ----- G201

    L1           L1       L1       L1            L1L2          L2
L2        L2         L2

                                            *NOT* Connected
                                              to L1 OR L2



  Please refer to RFC-8667 Section 2.1.1.2 Page 7 and Section 2.1.2 Page 8
wrt ISIS
  ISIS route/prefix leaks. It mentioned 3 types:

      (a) L1L2
      (b) L2L1 and
      (c) redistribution from another protocol.

   Cases (a) and (b) are fine wrt to my understanding ... but (c) is NOT
clear.

   NOTE: each prefix space (tlv-135) in LSP is approx 10 bytes (prefix
length based)
         and this Prefix-SID TLV is an additional 8 bytes. So if we do this
for ALL
         Leaked routes then we reduce the total route capacity in
         LSP by 40-50% which is "not" needed really as these routes are
associated
         with Prefix-SID from the same ISIS node.

   1) I can understand if this adding of prefix-sid "sub-tlv" is is done
"only" at
      the L1L2 (ABR). as that would maintain correct Prefix-SID association
with
      the route accross ABR when it could have been lost.

      I do understand this is not for local routes ie static/connected BUT
      only for ospf/bgp into ISIS, no issues with that - on the L1L2 (ABR).
      This part is fine by me.


   2) Consider reference diagram (B) where L1 or L2 are flat networks with
no
      L1L2 (ABR) but have redistributed ospf/bgp under router isis, so why
      should each leaked route be EXPLICITLY associated with Prefix-SID
sub-tlv
      when there is ISIS node based Prefix-SID association which is
available
      for all Flat network members ?

      The only advantage to this is to reset Prefix-SID flags but we would
reduce LSP
      space by 40% wrt leaked routes., which is not clear why such an
expensive
      penalty for leaked redistributed routes.


   4) I could not see ANY good examples of leaks on the web to clarify this
issue.

      This is the ONLY reference I could see ...

      check Slide #14


https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2019/pdf/BRKRST-3009.pdf

      Side #64


https://www.segment-routing.net/tutorials/2016-09-27-segment-routing-igp-control-plane/

Comments and feedback welcome,
Thanks,

-Waman Nawathe
Boston Area, SR Learner

------------------------------------------------------------
------------------------------