Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-isis-mpls-elc-12: (with DISCUSS and COMMENT)
Peter Psenak <ppsenak@cisco.com> Tue, 26 May 2020 08:58 UTC
Return-Path: <ppsenak@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A8EF3A0D23; Tue, 26 May 2020 01:58:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.601
X-Spam-Level:
X-Spam-Status: No, score=-9.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vi-JHJPtn2Gd; Tue, 26 May 2020 01:58:53 -0700 (PDT)
Received: from aer-iport-1.cisco.com (aer-iport-1.cisco.com [173.38.203.51]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F03A13A0D21; Tue, 26 May 2020 01:58:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11350; q=dns/txt; s=iport; t=1590483533; x=1591693133; h=subject:to:cc:references:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=J8weHPcBhKCcHd19Ab5ExUBK7rv9Pcc8OoBv3U2PdFY=; b=TaUABziLSrlYQZqdNIFrNWioI9AxwO4RFn+ivf+WDDwUQXYSGJmRvcIn c14qQjdaoJ2z5xGZfea1sBYiczTNTLlLLbWkBGm1w8ncjZtS6TABqrBqu 14bAXrqTGMkzScTNkFqbvGEdwg3lrURgib7AYRjCcGeDbSwSX5o95/IIi k=;
X-IronPort-AV: E=Sophos;i="5.73,436,1583193600"; d="scan'208";a="26516596"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 26 May 2020 08:58:51 +0000
Received: from [10.60.140.51] (ams-ppsenak-nitro2.cisco.com [10.60.140.51]) by aer-core-4.cisco.com (8.15.2/8.15.2) with ESMTP id 04Q8wocI029675; Tue, 26 May 2020 08:58:50 GMT
To: Benjamin Kaduk <kaduk@mit.edu>
Cc: The IESG <iesg@ietf.org>, draft-ietf-isis-mpls-elc@ietf.org, lsr-chairs@ietf.org, lsr@ietf.org, Acee Lindem <acee@cisco.com>, aretana.ietf@gmail.com
References: <158992828112.6026.1646593855480055081@ietfa.amsl.com> <1242ad52-bb48-8526-b65b-d413e0cd9e25@cisco.com> <20200521193856.GJ58497@kduck.mit.edu>
From: Peter Psenak <ppsenak@cisco.com>
Message-ID: <da35ac43-fe91-75c9-e046-d7674e88095a@cisco.com>
Date: Tue, 26 May 2020 10:58:50 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.7.0
MIME-Version: 1.0
In-Reply-To: <20200521193856.GJ58497@kduck.mit.edu>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Outbound-SMTP-Client: 10.60.140.51, ams-ppsenak-nitro2.cisco.com
X-Outbound-Node: aer-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/8k41BWIjr81oVQHQVskd5bcs7u8>
Subject: Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-isis-mpls-elc-12: (with DISCUSS and COMMENT)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 May 2020 08:58:56 -0000
Hi Ben, please see inline (##PP2) On 21/05/2020 21:38, Benjamin Kaduk wrote: > Hi Peter, > > On Thu, May 21, 2020 at 12:05:39PM +0200, Peter Psenak wrote: >> Benjamin, >> >> thanks for review, please see inline (##PP): >> >> On 20/05/2020 00:44, Benjamin Kaduk via Datatracker wrote: >>> Benjamin Kaduk has entered the following ballot position for >>> draft-ietf-isis-mpls-elc-12: Discuss >>> >>> When responding, please keep the subject line intact and reply to all >>> email addresses included in the To and CC lines. (Feel free to cut this >>> introductory paragraph, however.) >>> >>> >>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html >>> for more information about IESG DISCUSS and COMMENT positions. >>> >>> >>> The document, along with other ballot positions, can be found here: >>> https://datatracker.ietf.org/doc/draft-ietf-isis-mpls-elc/ >>> >>> >>> >>> ---------------------------------------------------------------------- >>> DISCUSS: >>> ---------------------------------------------------------------------- >>> >>> As for other reviewers, many of my comments duplicate those for the OSPF >>> document; I expect that the analogous responses apply and am fine if >>> they only appear for one document's review. >>> >>> Here, the question I have about normative language applies to the text >>> in Section 3: >>> >>> When a router propagates a prefix between ISIS levels ([RFC5302], it >>> MUST preserve the ELC signaling for this prefix. >>> >>> The scenario in question is analogous to the OSPF cross-area case: is >>> the router propagating the prefix between ISIS levels required to >>> implement this document; is preservation of the flag value a new >>> requirement from this document vs. a preexisting property; and is this >>> document trying to make normative requirements of devices that don't >>> implement this document? >> >> ##PP >> this is a new requirement and only applies to the routers that support >> this document. We are not making normative requirements of devices that >> don't implement this document, we cannot. >> >> Maybe we can add that it only applies to the routers that supports this >> extension: >> >> "When a router supporting this extension propagates a prefix between >> ISIS levels ([RFC5302], it MUST preserve the ELC signaling for this prefix." >> >> Would it work? > > That would work, yes. ##PP2 I have suggested some text to clarify ABR and ASBR behavior in my response to Alvaro. Please have a look if that is fine with you. I'm not going to add the "When a router supporting this extension", as this was not necessary according to Alvaro. > I think what bothers me about the current text is that it feels like a > global statement that holds universally everywhere (and as such would be > "scope overreach"). Even to say something like "ELC signaling MUST be > preserved when a router propagates a prefix between ISIS levels" (which is > superficially similar) does not bother me very much, since it presumes a > knowledge of what ELC signaling is (and thus, implementation of this > document) in a way that "unknown prefix attribute flag 3" does not. That > is, we clearly (given your above explanation) don't expect the "unknown > prefix attribute flag 3" to get propagaged, and only when we know that it's > the ELC signalling does the requirement kick in, if that makes sense. > > With respect to Alvaro's clarification, your answer for (1) makes sense; > thanks! I think Alvaro has offered to help work out what (if any) > additional text we might want to be sure that the answer to (2) is clear in > the document. > >> >>> >>> Likewise, the ASBR case for cross-protocol redistribution seems to >>> rather inherently require understanding the semantics of the flags being >>> translated. >> >> similarly to the above I can chnage to: >> >> "When a router supporting this extension redistribute a prefix ..." >> >> >>> >>> >>> ---------------------------------------------------------------------- >>> COMMENT: >>> ---------------------------------------------------------------------- >>> >>> Section 1 >>> >>> Should we add a sentence at the end of the last paragraph about how >>> "this document defines a mechanism to signal the ERLD using IS-IS"? >> >> not sure I understand, how is described in the body of the document. > > I think I maybe put a little more detail on the motivation for this > question in the OSPF document's comments. Basically, it's about parity > between Abstract and Introduction -- the Introduction says clearly "this > draft defines a mechanism to signal the ELC using IS-IS", but there is not > an analogous statement about the ERLD signaling mechanism. As such, it's > an editorial matter of style and you should feel free to ignore the comment > or do what you see fit. ##PP2 I added the below sentence: "This document defines a mechanism to signal the ERLD using IS-IS" Similar has been done to OSPF draft. > >>> >>> In cases where LSPs are used (e.g., SR-MPLS [RFC8660], it would be >>> >>> side note(?): I don't know that SR-MPLS is so popular so as to be >>> privileged as the only example given for LSP usage. If we instead >>> talked about using IGPs to signal labels, this selection would seem less >>> surprising to me. >> >> this document describes the ELC/ERLD capability signaling for SR MPLS. >> For non SR MPLS cases, thee are existing mechanisms to learn ELC/ERLD. >> >> I can replace the text with: >> >> "In cases where SR is used with the MPLS Data Plane" >> >> Would it work? > > Sure, thanks. ##PP2 done. > >> >>> >>> Section 3 >>> >>> unless all of its interfaces are capable of processing ELs. If a >>> router supports ELs on all of its interfaces, it SHOULD set the ELC >>> for every local host prefix it advertises in IS-IS. >>> >>> Do we want to say anything about (not) advertising the ELC for other >>> prefixes? >> >> Do we have to? I can add "MUST NOT set ELC with for any other prefix", >> but I find it unneeded. > > This is the "comment" section of the document, so no, you don't have to :) > I mostly ask because we give guidance on what to do for local host prefixes > but say nothing about the other case. That could be taken to imply that we > don't know what guidance to give, even though someone skilled in the area > who thinks through what the mechanism is doing will come to the conclusion > that it makes no sense/is actively harmful to advertise the ELC for other > prefixes. ##PP2 I would tend to leave it as it is. > >>> >>> Section 4 >>> >>> I agree with Roman's comment about code 2 vs TBD2. >> >> that has been fixed already. >> >>> >>> ERLD in the range between 0 to 255. The scope of the advertisement >>> depends on the application. If a router has multiple interfaces with >>> >>> Just to check: w.r.t. "scope", both this document and the OSPF one only >>> define usage of this MSD type at the scope of a single node, right? (I >>> don't see a particular reason to preclude using it at a different >>> scope.) >> >> the scope here means where the information will be flooded - area only >> or network wide. No such thing as a node scope. > > Oops, sorry for misremembering that part, and thanks for the clarification. > >> >>> >>> Section 6 >>> >>> - Bit 3 in the Bit Values for Prefix Attribute Flags Sub-TLV >>> registry has been assigned to the ELC Flag. IANA is asked to >>> >>> Is there an "IS-IS" in the name of this registry? >> >> no the registry name is "Bit Values for Prefix Attribute Flags Sub-TLV". > > Okay, thanks for confirming. > >> >>> >>> Section 7 >>> >>> Should we say anything about considerations for redistributing ELC/ERLD >>> information at the ASBR with respect to exposing "internal information" >>> to external parties? >> >> why would this be "internal information" and why redistribution would be >> "external party"? Redistribution between IGPs is predominantly done >> between IGPs under same administrative domain. > > I don't have any scenario in mind; I just wanted to check if there were any > significant considerations to mention. It sounds like there aren't such > considerations, and thus nothing to mention. >> >>> >>> This document specifies the ability to advertise additional node >>> capabilities using IS-IS and BGP-LS. As such, the security >>> considerations as described in [RFC7981], [RFC7752], [RFC7794], >>> [RFC8491], [RFC8662], [I-D.ietf-idr-bgp-ls-segment-routing-ext] and >>> >>> RFC 8662's security considerations have a pretty hard dependency on RFC >>> 6790's security considerations; it might be worth mentioning 6790 >>> directly in this list as well. >> >> would not that be implicit when mentioning RFC 8662? > > Yes; this is mostly a question of style. > >> >>> >>> [I-D.ietf-idr-bgp-ls-segment-routing-msd] are applicable to this >>> document. >>> >>> Could we also have a brief note that the normal IS-IS authentication >>> mechanisms serve to protect the ELC/ERLD information? >> >> do we need to repeat this every time we add a bit in the TLV? > > It's my preference, though not a strict need. > >>> >>> Incorrectly setting the E flag during origination, propagation or >>> redistribution may lead to black-holing of the traffic on the egress >>> node. >>> >>> This is what happens when the E flag should not be set but is >>> erroneously set. Should we also say what happens if we should set the E >>> flag but erroneously clear it (e.g., that poor or no load-balancing may >>> occur)? >> >> yes, there is a text there already: >> >> "Incorrectly setting of the ERLD value may lead to poor or no >> load-balancing of the traffic." > > I thought that was about the ERLD value, not the ELC indicator, but trust > you to know best. ##PP2 sorry, you are right. Regarding the "E flag being erroneously clear" - I would think that "Incorrectly setting the E flag " covers both cases of E bit being set when it should not be set and E bit not being set when it should be set. What about this: "Incorrectly setting the E flag during origination, propagation or redistribution may lead to poor or no load-balancing of the traffic or black-holing of the traffic on the egress node." thanks, Peter > >>> >>> Section 8 >>> >>> I do see the note in the shepherd writeup about the sixth author (thank >>> you!); if we're already breaking through the 5-author limit, did we >>> consider making those who "should be considered as co-authors" listed as >>> co-authors? >> >> I'm not fun of this 5 authors rule to be honest. >> >>> >>> Section 10.1 >>> >>> Should we reference RFC 7981 from Section 4 as well? Right now we seem >>> to only use it for the security considerations, which is not necessarily >>> enough to qualify it as a normative reference. >> >> we reference RFC8491, which references RFC 7981. I don't see a need to >> reference RFC 7981 directly. > > Okay. > > Thanks for the clarifications and updates! > > -Ben > >
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Benjamin Kaduk
- [Lsr] Benjamin Kaduk's Discuss on draft-ietf-isis… Benjamin Kaduk via Datatracker
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Peter Psenak
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Alvaro Retana
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Peter Psenak
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Alvaro Retana
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Peter Psenak
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Peter Psenak
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Acee Lindem (acee)
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Peter Psenak
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Acee Lindem (acee)
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Acee Lindem (acee)
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Peter Psenak
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Acee Lindem (acee)
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Alvaro Retana
- Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-… Benjamin Kaduk