Re: [Lsr] Question on RFC-8667 section 2.1.1.2 and 2.1.2 related PrefixSID Propagation and L1L2 leaks ...

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Tue, 09 August 2022 01:11 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B8B9C14F73D for <lsr@ietfa.amsl.com>; Mon, 8 Aug 2022 18:11:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.623
X-Spam-Level:
X-Spam-Status: No, score=-9.623 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=G/5cibBW; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=FwlC8iKv
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xoRLB6w1ghkr for <lsr@ietfa.amsl.com>; Mon, 8 Aug 2022 18:11:03 -0700 (PDT)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6FC86C157B32 for <lsr@ietf.org>; Mon, 8 Aug 2022 18:11:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=23224; q=dns/txt; s=iport; t=1660007463; x=1661217063; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=O0KC76YQ+phZsYehyasxkdkEKoK/lIrlb8Ra0wbpPio=; b=G/5cibBWminfkLqogKS4C1dBWu8DqhftYaboA5WZwQ1fXr4/pMyZSkL9 BskSU3r0CwSnEhh2Q0ZDNNftw+/z7cXmQ7VFEI2Y0+cp5Zl4ZFZUg4EBa WS02Rb9CgLenOC2RtAksoyJwacBKjLDXpvRGI4VLLFNFh51jEozZToqmS A=;
IronPort-PHdr: A9a23:T72FqxIsEqurLJNIDdmcuWEyDhhOgF28FgIW659yjbVIf+zj+pn5J0XQ6L1ri0OBRoTU7f9Iyo+0+6DtUGAN+9CN5XYFdpEfWxoMk85DmQsmDYaMAlH6K/i/aSs8EYxCWVZp8mv9P1JSHZP1ZkbZpTu56jtBcig=
IronPort-Data: A9a23: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
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0B8BgDea4Ji/5JdJa1aHgEBCxIMggQLgSExUgd1Alg5Q4QRPYNMA4UxhQldgiUDliWFE4EsFIERA1QLAQEBDQEBOQkEAQGFAgIWhSgCJTQJDgECBAEBARIBAQUBAQECAQcEgQkThWgNhkIBAQEBAQIMBhEEBhMBATgPAgEGAg4DBAEBJAcCAgIwHQgCBAESCBqCXIIMVwMxAQ6QMI83AYE+Aoofen8ygQGCCAEBBgQEgTcBAwMPQYJ/GII4AwaBPIMUgwVYSgEBhyMnHIFJRIEUAUOCNzA+ER9VgV0BAoFGGyQHgyk3gi5jlH4HOgNUgQUSgSFxAQgGBgcKBTIGAgwYFAQCExJNBh4CEwwKBhYOQhIZDA8DEgMRAQcCCxIIFSwIAwIDCAMCAy4CAxgJBwoDHQgKHBIQFAIEEx8LCAMaHy0JAgQOA0MICwoDEQQDExgLFggQBAYDCS8NKAsDBQ8PAQYDBgIFBQEDIAMUAwUnBwMhBwsmDQ0EHAcdAwMFJgMCAhsHAgIDAgYXBgICGVgKKA0IBAgEGAQeJRMFAgcxBQQvAh4EBQYRCQIWAgYEBQIEBBYCAhIIAggnGwcWNhkBBV0GCwkjFgYcAQ8LBgUGFgMmUgUEHwGVdgiBDWwIYAJHCAggAjtOMwEvkwCDU4l5jgiSewqDTKAmFYN1jD6YJJZmIKFMgRaDfAIEAgQFAg4BAQaBYTyBWXAVO4JoURkPjiAJAxYVgzuEWYYFdQI5AgYBCgEBAwmRGgEB
X-IronPort-AV: E=Sophos;i="5.91,230,1647302400"; d="scan'208,217";a="961982136"
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 09 Aug 2022 01:11:01 +0000
Received: from mail.cisco.com (xfe-rtp-003.cisco.com [64.101.210.233]) by rcdn-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 2791B1Ph009516 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Tue, 9 Aug 2022 01:11:01 GMT
Received: from xfe-rtp-004.cisco.com (64.101.210.234) by xfe-rtp-003.cisco.com (64.101.210.233) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Mon, 8 Aug 2022 21:11:00 -0400
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xfe-rtp-004.cisco.com (64.101.210.234) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Mon, 8 Aug 2022 21:11:00 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WY7j0ZGhbOiMVt/BW1G0wUUv7PVLvrbDmuS7muWJ78Aw0CpM6YCcx2zLQnC7pGuVyLBRlRq5aqXSxgZ2bjJDkBrF/SRqAo/LniWrjKAj6hVoVMVvVn6k51hOTgo8N9i1jqcik4w0eAThoW8xdt651n0pVrPksKv8ODnUSe7FwoQguCGFnvL0VIE/RiRXRUHHqwGXdc6kHgAHumSA+byoNWes7ovTFLY5LOKGUWUQsurfS0jTL4CtKImFg8KfM2IOrXue7blT+FOwORHYKpXhXqzjjOoCbQP17+s/80mX8eWqzpJbBznesGBmHZVNyfR4au+gZabX0/7m4kVK0fDngw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=O0KC76YQ+phZsYehyasxkdkEKoK/lIrlb8Ra0wbpPio=; b=bHpBpNhrpnytYp3cQVUB9GpCaUHZq4m6KYeCcYWlGicYnG/zmY40lhOCz6851slIe/BpB/IYNqtbvFgZNHIfQclYoKMMeoRQLvWkcqrOvH5wJ8FpKFULiEpgUywwjoXe3HSM6BQ8BlIWo5PqK67CRooCjGwPQD0fHwjclWqt6WhjtF4D6IhmB4oMfxUNMDG4NlzQrmdwCU5uZ4eK6scB2vgyY8pP8aoyB5Pv8Ae3lN7NusZkvAticR1Im4964hiDwTeGpETIC1g+EXQjI9hJKTvnBR63Km7xJKpE+7Cnh229OLOsTZI06WTZ+AdATJ4f7beQNZZSWkbAyhDVU7mgcA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=O0KC76YQ+phZsYehyasxkdkEKoK/lIrlb8Ra0wbpPio=; b=FwlC8iKvW/+UFyyNNQEqVRxi3wPDA7Pp9gmKYJfHnC6vjl075/fmlqQKNpq6lFmQUwtSEkn3yq+qT2h6c+0YA3lurGQDJHKInlNl5/KRc/AVYCXznnZgZ2ICJuuxynsuwbYzVpvDb4dc35eKT0DP5Rk5UKHuiibyQPzhVElhE6M=
Received: from BY5PR11MB4337.namprd11.prod.outlook.com (2603:10b6:a03:1c1::14) by DM6PR11MB3626.namprd11.prod.outlook.com (2603:10b6:5:146::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5504.17; Tue, 9 Aug 2022 01:10:59 +0000
Received: from BY5PR11MB4337.namprd11.prod.outlook.com ([fe80::290d:2dc1:eaf8:6b1b]) by BY5PR11MB4337.namprd11.prod.outlook.com ([fe80::290d:2dc1:eaf8:6b1b%4]) with mapi id 15.20.5504.020; Tue, 9 Aug 2022 01:10:58 +0000
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: Waman Nawathe <rguy@benunets.com>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: [Lsr] Question on RFC-8667 section 2.1.1.2 and 2.1.2 related PrefixSID Propagation and L1L2 leaks ...
Thread-Index: AQHYq4G8Md4l0FiIZUOoIkGyz24jfa2lvLlA
Date: Tue, 09 Aug 2022 01:10:58 +0000
Message-ID: <BY5PR11MB4337CE01B21F53038C5CB671C1629@BY5PR11MB4337.namprd11.prod.outlook.com>
References: <CALBQe7DnVhjYqDAXPS+9GEs7fUw0x=6114mdNNZ=jbf5uJQn-Q@mail.gmail.com>
In-Reply-To: <CALBQe7DnVhjYqDAXPS+9GEs7fUw0x=6114mdNNZ=jbf5uJQn-Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: cfc37d09-2b7c-49b7-bb92-08da79a404ad
x-ms-traffictypediagnostic: DM6PR11MB3626:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR11MB4337.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(396003)(136003)(346002)(39860400002)(376002)(366004)(5660300002)(64756008)(66476007)(66556008)(66446008)(316002)(66946007)(76116006)(8676002)(110136005)(55016003)(86362001)(52536014)(8936002)(33656002)(2906002)(122000001)(38070700005)(38100700002)(166002)(71200400001)(41300700001)(7696005)(6506007)(53546011)(9686003)(186003)(478600001)(966005)(66574015); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: gebslrGb1kWgQwpA2UZv1fbZfk1UjauY62McTBZ7gEf4xkmmQ4YdgyZbj2JZEgqemvFtCyBLRZyF4D/h1UsOcdIRqPIXdvuuVdIWSi7si/pLA+KH2+TzexDwKb9uIAPrfk3pR0YaS7idi2PmXQ1pe9SSu9FBTsJgi6cTveUoRlPCCgrCQUE/8dLV4VCq2IQHQtOc9htI0RgImsADoL1iQsKjyfbYsFObTPgCLRiXVPghiVTGfxXOoO205H9LvbGrkG6ob7N+zQnnXuZXS3ivvhy3Ewy6OePNL4yxmME3hA2YkYkR8EHyWRBgEgyJqUMRzXygVs8jcxQ/L1hyrYF7Ssj4G/+oKmGoiLAxgTfNbCT8mxgQjeLPoF5vJ9K1GN6ziqVZ65Yz0v+z1pr+tzpFo8Ch3uUdcHWy39y8u/0YeinCPabBtrf9umZvsxJJ69DddxngqZhMRhwlJTsSlK9NlBwHz5DVg1V2gNVV+Xq0hUvx0xUHApJ2XgUvaUljQJASqbc/F+tH5X+HNO4MGPnNg3ifVHeqE2k0tO2I0dvTFrXbxrdJrZxWrx9UTUzzMq1nOIy2zLu1L79oTUe7TX0yBPejVa9O3V5V65+i/P6LtU3tj0aB8D2tebo4u97SNBscEg9gYJy+k8sF2vIA8z8xOxlY/8Rt7PenAQe1fjAByQD4qf7WJriBnogN4gAwyMYQWkXeU+K71sNuja1zlTkgw76ILJ2CR6FZ41TyeSVr0vRI7xp1n/Z4KSgpS10yovQE3Ia3Ad2LOdPFW2TS6vjI0bTifY3mVTfd1Icv+LAaLSvNLY/peCgGP327DqNEbobSu/5gK0Kg/iMG6zs3XNojT1l1xSWqjknsqizyuLhp6AX6/TLFVZgadQIsU+7FmfD5P5CzUnFQKG1F5tR/WuonC5BumgNctZBWGgQzm1/HLkW29LFEKW1xBIxB3PRZ8kPtj0EXmtAba67hW6dT16K/ahUH90/ydjxMHrwZdI+uhNhaSjRNc7cONozk+CBthlD4PngoFij0lANgO0NySIL8bc3/eEj5Un4UHyGE7w3Tu9bXueMi1O0yGKZGQi4eQttdqvZl1ODCRDn1+HFTF+raE+58CuyF/fXmnTcGUOwoQvTNQ3SR87jDRXzShAOaNXxdTc+VaXQLNUaM3RaMwpEDvG76Q3sFsAwgK4qTpSy51Nt8nJXJc1tjv5nn2rV8NmvBLhccQtgsrnWw99ZKYTg7xYB9peebc7j30qziIGFH1AmTrMKlz8E5MRVkIBq5tfKbKJuPRx8G4EDQxGNqe6+TtG4VU5OGxXxChpXO3m4WWt3LGR3lcSoFs1tA4IK7cOknIbHfYIRoArZL97Yi1z+hM3m1QBhd9iKPez1KG1PYMWiZEv+tZ74Ky3rRdYNzmbHn6c8ROu9dSEBmNnrcks9NLjQB1ck2HqvlQHxMLbWmy8WnF9Grbzg1t5yDvLAerMgyAfAzA+8Kqf9yzSvnYJ5o4SDGpPBRbSJx71CYxm+GL/Mx+/Gvijw7pq6filJYUWSDYltim/uZNEIjWDUWRyEtBedauS7EtrP1Pgu22DTsARsZbR6Jqq3sQcKeyiJtPXYrbh1ALT1g1huUBvDxjl5nVogkIWXRge3/FguCF6G4Dy6OQPChGD/gK87CTQAx2Gpb
Content-Type: multipart/alternative; boundary="_000_BY5PR11MB4337CE01B21F53038C5CB671C1629BY5PR11MB4337namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR11MB4337.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cfc37d09-2b7c-49b7-bb92-08da79a404ad
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Aug 2022 01:10:58.6282 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ZXoj7fqylzIK64u8P5Hy3eEjfWY4pG5ltRSXn92K+0ilLppZUQxZ/mJqEnse6xrfxTm/tXNCiYpVRU13uqvwqg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB3626
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 64.101.210.233, xfe-rtp-003.cisco.com
X-Outbound-Node: rcdn-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/DV_E9z7svBWOiM3H40I9GWlfH0U>
Subject: Re: [Lsr] Question on RFC-8667 section 2.1.1.2 and 2.1.2 related PrefixSID Propagation and L1L2 leaks ...
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2022 01:11:08 -0000

Hi Waman!

Not sure I completely understand your concerns/questions, but let me make a few comments and see if that helps.

The language in RFC 8667 Section 2.1.2 is to say that if the prefix which is being leaked/redistributed has a prefix-SID associated with the source advertisement (be that L1 for L1->l2 leaking or L2 for L2->L1 leaking or some other protocol in the case of redistribution) then the prefix-SID must be included in the leaked/redistributed advertisement. It is NOT suggesting that in the absence of a SID one should be introduced when leaking/redistributing.

Also, please do not be confused by the referenced slides which highlight the “R” and “N” flags in the prefix-SID advertisement. At the time SR was first defined, the prefix attribute advertisement (RFC 7794) did not exist. However, we quickly realized that R/N flags have use cases beyond SR and so the prefix attributes sub-TLV was defined. The R/N flags in the prefix-SID sub-TLV have been retained to allow interoperation with early deployments of SR, but note the text in RFC 8667 Section 2.1.1.2:

“The Prefix Attribute Flags sub-TLV [RFC7794] also defines the N-Flag and R-Flag and with the same semantics of the equivalent flags defined in this document. Whenever the Prefix Attribute Flags sub-TLV is present for a given prefix, the values of the N-Flag and R-Flag advertised in that sub-TLV MUST be used, and the values in a corresponding Prefix-SID sub-TLV (if present) MUST be ignored.

Unfortunately, the slides you reference do not emphasize this point.
So there is no reason to introduce a prefix-sid advertisement simply to advertise R-bit.

As far as redistribution, while this is commonly configured (if at all) on ABRs, there is no restriction against doing so on any router. Clearly the inclusion of the prefix-sid for the redistributed route would have to be introduced on the router where IS-IS learns of the redistributed route. Whether that router is an ABR or not isn’t relevant.

HTH

   Les

From: Lsr <lsr-bounces@ietf.org> On Behalf Of Waman Nawathe
Sent: Monday, August 8, 2022 3:57 PM
To: lsr@ietf.org
Subject: [Lsr] Question on RFC-8667 section 2.1.1.2 and 2.1.2 related PrefixSID Propagation and L1L2 leaks ...

Hello All,

New to this IETF list and posting ..

Regarding this section RFC-8667 2.1.1.2, It should ONLY apply to
ISIS L1L2 (or ABR) router and not L1 only or L2 only and here is my
reasoning ....

-----------------------------------------------------------------------------------------
Reference Diagram (A):
-----------------------

                                   L1L2 (ABR)

Grunt-54 (L1) -------------- (L1) Grunt-104 (L2) ------------- (L2) Grunt 106

                                  L1 --> L2 Route Leaks or
                                  L1 <-- L2



-----------------------
Reference Diagram (B):  Showing Flat L1 or Flat L2 not using any ABRs:
-----------------------



    Grunt-54 --- G100 --- G101 --- G103       Grunt-104     Grunt-106 ---- G200 ---- G201 ----- G201

    L1           L1       L1       L1            L1L2          L2           L2        L2         L2

                                            *NOT* Connected
                                              to L1 OR L2



  Please refer to RFC-8667 Section 2.1.1.2 Page 7 and Section 2.1.2 Page 8 wrt ISIS
  ISIS route/prefix leaks. It mentioned 3 types:

      (a) L1L2
      (b) L2L1 and
      (c) redistribution from another protocol.

   Cases (a) and (b) are fine wrt to my understanding ... but (c) is NOT clear.

   NOTE: each prefix space (tlv-135) in LSP is approx 10 bytes (prefix length based)
         and this Prefix-SID TLV is an additional 8 bytes. So if we do this for ALL
         Leaked routes then we reduce the total route capacity in
         LSP by 40-50% which is "not" needed really as these routes are associated
         with Prefix-SID from the same ISIS node.

   1) I can understand if this adding of prefix-sid "sub-tlv" is is done "only" at
      the L1L2 (ABR). as that would maintain correct Prefix-SID association with
      the route accross ABR when it could have been lost.

      I do understand this is not for local routes ie static/connected BUT
      only for ospf/bgp into ISIS, no issues with that - on the L1L2 (ABR).
      This part is fine by me.


   2) Consider reference diagram (B) where L1 or L2 are flat networks with no
      L1L2 (ABR) but have redistributed ospf/bgp under router isis, so why
      should each leaked route be EXPLICITLY associated with Prefix-SID sub-tlv
      when there is ISIS node based Prefix-SID association which is available
      for all Flat network members ?

      The only advantage to this is to reset Prefix-SID flags but we would reduce LSP
      space by 40% wrt leaked routes., which is not clear why such an expensive
      penalty for leaked redistributed routes.


   4) I could not see ANY good examples of leaks on the web to clarify this issue.

      This is the ONLY reference I could see ...

      check Slide #14

           https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2019/pdf/BRKRST-3009.pdf

      Side #64

          https://www.segment-routing.net/tutorials/2016-09-27-segment-routing-igp-control-plane/

Comments and feedback welcome,
Thanks,

-Waman Nawathe
Boston Area, SR Learner

------------------------------------------------------------------------------------------