Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection" -draft-ietf-lsr-isis-flood-reflection-05
Tony Przygienda <tonysietf@gmail.com> Sat, 11 December 2021 15:30 UTC
Return-Path: <tonysietf@gmail.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F038D3A0124 for <lsr@ietfa.amsl.com>; Sat, 11 Dec 2021 07:30:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wl3zqe_Q08yp for <lsr@ietfa.amsl.com>; Sat, 11 Dec 2021 07:30:18 -0800 (PST)
Received: from mail-io1-xd2a.google.com (mail-io1-xd2a.google.com [IPv6:2607:f8b0:4864:20::d2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 029353A0126 for <lsr@ietf.org>; Sat, 11 Dec 2021 07:30:17 -0800 (PST)
Received: by mail-io1-xd2a.google.com with SMTP id x10so13620222ioj.9 for <lsr@ietf.org>; Sat, 11 Dec 2021 07:30:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=nk4g/blsjMxRB47f1QOgchVtDrSd5VEUnRhSyHsGCz4=; b=NFNVfWj5CdUTVCGMk1PuHPRaBLUdm8+oDVgmtKpx9OehAjv25guDDzTtjVol0oeg3s mq4+CiShma8gQBt55Go2IpYryjxmYN7UQ4EYOFUgEsEatrbns1SvAIFpqvR5bmrwiFen Lq5OzjDR1hHACHvgbYQjsWDob50S1f9pvNCcNjb4tkUah67jlzkp8pD78Jv8KFBkubLQ sUMuqTiAMcxjQX++Cdiq1ArTKOixHrJ7P6h6pTajTezKUdwfTBIOZeqBmPBREi74FkHN yCX12kKnnuB86culIX0kANYGaYjBONhREhjuxuv3+l3feqZAHMhKomxI/JfaT4I+eNrZ rGXg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=nk4g/blsjMxRB47f1QOgchVtDrSd5VEUnRhSyHsGCz4=; b=pXRe2+41HlveWKCIz5nsJ8NiDOABoWOfhtHDXLW7LGychXP78JuQGTi8fP8hI+2s5/ cyQFKEuZgQiIarFOCONqsH31hV66ccjmCXEdKe6yaeapDfLz/yc+TrpIm2ioYhMMaZX4 7M1X33qegaUBKn7u43CTeeva8ILVMsqRQNTGX0r5e1BUBJX/Zgm3h7SSD3MhPsi/17KU ttApYPJHZVIwCsKI0P5VKUghK3CG3apCVlVlYLeuzVbZnibZGfWUlltWUv8C9JquLNqy R2i1h0aIi5vaURYsdTf+CSH012ZHrbHbwq4RM++jWpOSZdcJI2M53KMAoAA8yG2i3w9W jsvQ==
X-Gm-Message-State: AOAM530X6AFVRGuurWv6ixYGdBkDK67XJJKXFEWqxhfxqZSj3sxatGVX Y3u1LH73+nxdHwsohmfvHjc1+NagROT0cS0Vecg=
X-Google-Smtp-Source: ABdhPJyWjQBerZ5JFG3kWkDPUiwwA2EJ6voJcpYoteLuFmOxzp6rqXkdgc+JlxUEwd1jFl6Q0RJxEtBbUStg9ZZUSLQ=
X-Received: by 2002:a02:6f1c:: with SMTP id x28mr24044912jab.1.1639236615679; Sat, 11 Dec 2021 07:30:15 -0800 (PST)
MIME-Version: 1.0
References: <CA+wi2hNguHEyvwwPA4w7E1pb9jwx8OhYKA78rs00kmEspKvRoA@mail.gmail.com> <86EF1F28-372C-4C80-9D2A-623C803042E7@tsinghua.org.cn>
In-Reply-To: <86EF1F28-372C-4C80-9D2A-623C803042E7@tsinghua.org.cn>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Sat, 11 Dec 2021 16:29:39 +0100
Message-ID: <CA+wi2hO_61mH+Qn7Wm0mjdz-Pga2Bo4yE2dgE5xe+3Y75LUmwg@mail.gmail.com>
To: Aijun Wang <wangaijun@tsinghua.org.cn>
Cc: lsr <lsr@ietf.org>, "Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org>, "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
Content-Type: multipart/alternative; boundary="0000000000002e339505d2e08448"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/HRedMouD9FbgAIOOjWJaoF0IOvY>
Subject: Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection" -draft-ietf-lsr-isis-flood-reflection-05
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 11 Dec 2021 15:30:23 -0000
sorry, seems you didn't parse what I wrote in previous email and keep on generating FUD. The solution is loop free if the draft is correctly implemented in both tunnel and no-tunnel scenario. The rest is subtlety of how you deploy it (and implementation choices) that I tried to explain. I cannot put it more simply than that ... -- tony On Sat, Dec 11, 2021 at 3:47 PM Aijun Wang <wangaijun@tsinghua.org.cn> wrote: > Hi, Tony: > > The advantage of IGP is that it can cure itself when there is any topology > change, no additional operator intervention involved. > But from your explanation below, there are situations that the draft > doesn’t covered for the possible loop scenarios. Additional route compare > rules or configuration requirements needed to be added when such thing > happens. Then can we call the current solution is not final? > And, if we lack one trust theory to avoid the loop, we will be stuck in > the emerged loop situations. > > Some additional replies inline. > > Aijun Wang > China Telecom > > On Dec 11, 2021, at 20:08, Tony Przygienda <tonysietf@gmail.com> wrote: > > > let's be more precise beyond sensationalist headlines ... Though it's nice > you found our documentation and based on that make first technical argument > ;-) > > a) transitory loops during convergence/tunnel setup may exist, those also > exist during normal ISIS convergence. Simple implementation techniques used > in other contexts since many years exist like e.g. holding the router in > overload until converged. That can be also easily implemented if e.g. a FR > client has no FR tunnel established. A draft/spec is not an implementation > description however so techniques deployed can be very different and > starting to put that in will lead to overspecification. > > > [WAJ] From the example that illustrated in the mentioned example, it seems > the loop is not transient. It seems when R1 is not act as FR client, the > loop will occur then? > > b) let's split the rest assuming full convergence scenario into tunnel; > and no L1 tunnels case > ib.) L1 tunnel case when all tunnels in place/converged is simple, it's > identical really to any shortcut forwarding where the next hop is a tunnel, > the packet just shows up magically @ the egress. this is AFAIS simpler > option to understand and deploy correctly. If you harbor fears and doubts > about the whole thing or looping potential, just use this. > > > [WAJ] Then the merit that you compared with TTZ will go away? > > b.ii) no tunnel case is more delicate (but hotly desired by many [arguably > sophisticated] customers hence the work). If the SPF is implemented > correctly no routing loops exist when converged. > > This preconditions also correct leaking of L1 into L2 (hence the "all > egress MUST be clients", it could work with a mix but the draft gets > unnecessarily complex) and section 5.2 of the draft provides the necessary > implementation on SPF to prevent loops in every case. > > [WAJ] As Acee pointe out also, this section is harder to understand and > not in clear logic. I doubt and am unconvinced that it can cover every case. > > However, as the documentation you found says it is easier to ensure that > L1 metrics when deployed are shorter than L2 metrics so the L1->L2 route > always takes preference towards the egress and not rely on the correct SPF > preferece outside metric comparison. > > > [WAJ] To achieve this, the design should be verified by manual carefully? > > As footnote: redistributing prefixes in ISIS is always delicate, nothing > new here, L1->L2->L1 was originally forbidden and only works with the RFC > and lots of tightly kept pref rules. With enough inventive re-distribution > on a system around the RFC and fiddiling via policy with redistributed > route properties you can loop up normal ISIS as well BTW. > > > [WAJ] Can I say that your solution is based on the original forbidden > design? To explore the forbidden, you introduce the additional SPF rules. > When the topology or interconnection scenario become complex, will the SPF > rules complex also? > > c) ECMP, yes, as our doc says it's not looping but it can be changed when > using b.ii) unless whole network is forklifted to flood reflection and e.g. > omits ECMP computed over FR adjacencies which again, is an implementation > technique that is optional complexity since FR adjacencies are not > forwarding (one could make them taht and stuff would still work but then we > would have all kind of restrictions on tunnels like e.g. XoUDP to ECMP > inside L1 and ultimately shove e'thing though FRs, most customers think > that doing L2 hot potato forwarding out the area is actually far preferred > IME). > > And no, you will never achieve the same "globally optimal" routing through > the whole topology in L2 when abstracting some L1 things except when you > advertise a full mesh of links reflecting all ingress-egress metrics in L2 > being basically L1 shortest path (or assume that all ingress/egress > connections have infinite/same metric, it's called a chassis or more > precisely a switching fabric then ;-). Beside scaling very poorly as the > draft explains this can also cause a single link failing in L1 to cause a > havoc of advertisements in L2 and if you are experienced in operational > matters this is the last things you desire. In more abstract control theory > terms you are building with such a solution a negatively stable system of > control loops or in simpler terms an invisible big blast radius. Good for > fighter planes, very bad for networking if you experienced those effects. > > hope that's enough details, none of this is BTW pure speculation but > output of implemenation and extensive testing. > > --- tony > > On Sat, Dec 11, 2021 at 8:48 AM Aijun Wang <wangaijun@tsinghua.org.cn> > wrote: > >> Please refer to “Routing Loops” section that described in your company’s >> documents: >> >> https://www.juniper.net/documentation/en_US/junos/topics/concept/understanding-isis-flood-reflectors.html#jd0e162 >> >> This is just the simplest transit scenario. I am worrying for its further >> applications. >> >> The overall routing path for L2 topologies that connected by several L1 >> is not determined by one L2 SPF algorithm, how can you assure no loop occur? >> >> Is it nightmare or mess for the operator to run its network in such >> challenges situations? >> >> Aijun Wang >> China Telecom >> >> On Dec 11, 2021, at 02:02, Tony Przygienda <tonysietf@gmail.com> wrote: >> >> >> What you describe is not technical reality when you're dealing with SPF >> in L2 ... You seem to be deeply confused (but honestly, I have a hard time >> to even figure out what kind of assumptions you're making about all kind of >> things in all those threads about IGPs these days and on what but personal >> preferences all those claims of "better" things are based) by the simple >> fact that there is only a single connected L2 area ever in ISIS, if you >> partition L2 you do not run ISIS within its viable envelope anymore, with >> or without extensions. And L2 SPF will never loop and flood reflector draft >> does not change the path taken in L2 so by first order logic you won't >> loop. That is BTW one of the reasons why you will want to deploy multiple >> flood reflectors per L1 (to not partition L2). >> >> As Acee pointed out, unlike OSPF (discounting alternate ABR behavior) L2 >> could in ISIS from day one use L1 to "traverse across" (if you squint a bit >> ;-) in a sense and those drafts just improve the behavior so we are not >> even architecturally changing the topological properties of the protocol >> (whatever that means without delving deeply into graph theory definitions >> ;-) >> >> -- tony >> >> On Fri, Dec 10, 2021 at 1:40 AM Aijun Wang <wangaijun@tsinghua.org.cn> >> wrote: >> >>> Hi, Acee: >>> >>> No, I think the WG participations would like to enjoy the interested and >>> correct direction topics. >>> One technical considerations is the following: if IGP evolved into this >>> direction, then the following connections loop diagram is also possible: >>> L2-L1-L2-L1-L2-L1-…..-L2(back to the origin) >>> Then, will we introduce the “AS number” to avoid loop, and various “Path >>> Attributes” to influence the path selection within the IGP? >>> >>> There is a rush to adopt this draft, we should not rush again to >>> accomplish its WG last call. >>> >>> >>> Aijun Wang >>> China Telecom >>> >>> On Dec 9, 2021, at 10:07, Acee Lindem (acee) <acee= >>> 40cisco.com@dmarc.ietf.org> wrote: >>> >>> >>> >>> Hi Aijun, >>> >>> >>> >>> At least I’ve had several discussions with authors on the draft and >>> you’ll note my comments on the list. The lack of further discussion on the >>> list is a general problem in LSR. It seems many WG participants only want >>> to discuss the draft that they have authored and it is hard to get comment >>> without forcing the issue without an adoption or last call. I’m expecting >>> at least one more review on the draft. Technical comments on the draft >>> would be appreciated. >>> >>> >>> >>> Thanks, >>> Acee >>> >>> >>> >>> *From: *Aijun Wang <wangaijun@tsinghua.org.cn> >>> *Date: *Wednesday, December 8, 2021 at 11:15 AM >>> *To: *Acee Lindem <acee@cisco.com> >>> *Cc: *"Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, "lsr@ietf.org" < >>> lsr@ietf.org> >>> *Subject: *Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection" >>> -draft-ietf-lsr-isis-flood-reflection-05 >>> >>> >>> >>> Hi, Acee: >>> >>> >>> >>> I found there is no any technical discussion on the list for the >>> mentioned draft after its adoption(from 2020-7-6), even before its adoption. >>> >>> There is only one presentation for its update at the IETF 111 meeting(1 >>> pages, 5 minutes) and after it’s presentation at IETF 112, the WG Last Call >>> is issued. >>> >>> >>> >>> From the authors’ statement, there is only the author’s affiliation >>> implemented it, no interoperability problems can be found. >>> >>> >>> >>> From the discussion in these days, it is doubtful for IGP to evolve into >>> this direction as behaved by BGP. >>> >>> >>> >>> From the POV of the operator, we will not consider such strange design >>> to scale the IS-IS. >>> >>> >>> >>> From the documents itself, there are unsolved problems (for example in >>> section 7) which can only be solved by “sending alarm and declare >>> misconfiguration). >>> >>> >>> >>> Then, why it is ready to WG Last Call? >>> >>> >>> >>> >>> >>> Aijun Wang >>> >>> China Telecom >>> >>> >>> >>> On Dec 8, 2021, at 06:28, Acee Lindem (acee) <acee= >>> 40cisco.com@dmarc.ietf.org> wrote: >>> >>> Hi Les, >>> >>> >>> >>> *From: *"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> >>> *Date: *Tuesday, December 7, 2021 at 5:10 PM >>> *To: *"Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org>, Acee >>> Lindem <acee@cisco.com>, "lsr@ietf.org" <lsr@ietf.org> >>> *Subject: *RE: [Lsr] WG Last Call fo "IS-IS Flood Reflection" >>> -draft-ietf-lsr-isis-flood-reflection-05 >>> >>> >>> >>> Let me try to respond to Acee/Tony/Tony in one email. >>> >>> >>> >>> Acee – I don’t like any of the proposals. I believe they are all abusing >>> the protocols to some degree. >>> >>> >>> >>> That’s fine if you have technical concerns with the individual drafts. >>> The problem space discussion is a moot point since the WG has already >>> adopted these documents. >>> >>> >>> >>> Thanks, >>> >>> Acee >>> >>> >>> >>> I fully believe that the authors are clever enough to figure out how to >>> make this work – but that doesn’t mean any of them are desirable. >>> >>> So if I have to “vote” – I vote “no”. >>> >>> >>> >>> Tony Li – >>> >>> >>> >>> Area Proxy Introduction says in part: >>> >>> >>> >>> “Following the current rules of IS-IS, all spine routers would >>> >>> necessarily be part of the Level 2 topology, plus all links between a >>> >>> Level 2 leaf and the spines. In the limit, where all leaves need to >>> >>> support Level 2, it implies that the entire L3LS topology becomes >>> >>> part of Level 2. This is seriously problematic as it more than >>> >>> doubles the LSDB held in the L3LS topology and eliminates any >>> >>> benefits of the hierarchy.” >>> >>> >>> >>> Flood Reflection says: >>> >>> >>> >>> “In such scenarios, an >>> >>> alternative approach is to consider multiple L2 flooding domains >>> >>> connected together via L1 flooding domains. In other words, L2 >>> >>> flooding domains are connected by "L1/L2 lanes" through the L1 areas >>> >>> to form a single L2 backbone again. Unfortunately, in its simplest >>> >>> implementation, this requires the inclusion of most, or all, of the >>> >>> transit L1 routers as L1/L2 to allow traffic to flow along optimal >>> >>> paths through such transit areas. Consequently, this approach fails >>> >>> to reduce the number of L2 routers involved, so it fails to increase >>> >>> the scalability of the L2 backbone.” >>> >>> >>> >>> >>> >>> These problem statements seem fundamentally similar to me. >>> >>> >>> >>> No question the two drafts define very different solutions – but the >>> problem statements seem quite similar to me. >>> >>> >>> >>> Tony P – I would argue that a “20K perspective” is useful when deciding >>> whether the overall approach is a good one. >>> >>> >>> >>> And in response to Tony Li’s statement: “…the IETF is at its best when >>> it is documenting de facto standards” >>> >>> >>> >>> 1) I fully believe that our customers understand their requirements(sic) >>> better than we (vendors) do. But that does not mean that they understand >>> what is the best solution better than we do. >>> >>> When a customer comes to me and says “Can you do this?” my first >>> response is usually “Please fully describe your requirements independent of >>> the solution.” >>> >>> >>> >>> 2)Not clear to me that there is an existing “de facto standard” here – >>> which is reinforced by the fact that we have so many different solutions >>> proposed. >>> >>> >>> >>> Les >>> >>> >>> >>> >>> >>> >>> >>> *From:* Acee Lindem (acee) <acee=40cisco.com@dmarc.ietf.org> >>> *Sent:* Tuesday, December 7, 2021 10:31 AM >>> *To:* Les Ginsberg (ginsberg) <ginsberg@cisco.com>; Acee Lindem (acee) < >>> acee@cisco.com>; lsr@ietf.org >>> *Subject:* Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection" >>> -draft-ietf-lsr-isis-flood-reflection-05 >>> >>> >>> >>> Hi Les, >>> >>> >>> >>> *From: *Lsr <lsr-bounces@ietf.org> on behalf of "Les Ginsberg >>> (ginsberg)" <ginsberg=40cisco.com@dmarc.ietf.org> >>> *Date: *Tuesday, December 7, 2021 at 1:17 PM >>> *To: *"Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org>, " >>> lsr@ietf.org" <lsr@ietf.org> >>> *Subject: *Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection" >>> -draft-ietf-lsr-isis-flood-reflection-05 >>> >>> >>> >>> When I look at this request, I see it in a larger context. >>> >>> >>> >>> There are two drafts which attempt to address the same problem in very >>> different ways: >>> >>> >>> >>> https://datatracker.ietf.org/doc/draft-ietf-lsr-isis-flood-reflection/ >>> >>> >>> >>> and >>> >>> >>> >>> https://datatracker.ietf.org/doc/draft-ietf-lsr-isis-area-proxy/ >>> >>> >>> >>> Both of them discuss in their respective introductions the motivation – >>> which is to address scaling issues in deployment scenarios where the >>> existing IS-IS hierarchy is being asked to “stand on its head” i.e., >>> interconnection between different L1 areas is not to be achieved by >>> utilizing an L2 backbone – rather it is the L1 areas themselves which are >>> required to be used for interconnection of sites (e.g., two datacenters) >>> and the scaling properties of the existing protocol hierarchy when used in >>> this way are not attractive. >>> >>> >>> >>> I find no technical basis on which to choose between the two proposed >>> solutions – so in my mind a last call for “Flood-Reflection” presupposes a >>> last call for “Area Proxy” – and therein lies my angst. >>> >>> The end result will be that multiple incompatible solutions to the same >>> problem will be defined. It will then be left to customers to try to >>> determine which of the solutions seems best to them – which in turn will >>> put the onus on vendors to support both solutions (depending on the set of >>> customers each vendor supports). >>> >>> This – to me – represents an utter failure of the standards process. We >>> are reduced to a set of constituencies which never find common ground – the >>> end result being sub-optimal for the industry as a whole. >>> >>> >>> >>> It seems to me that the proper role of the WG is to address the big >>> questions first: >>> >>> >>> >>> 1)Is this a problem which needs to be solved by link-state protocols? >>> >>> We certainly have folks who are clever enough to define solutions – the >>> two drafts are a proof of that. >>> >>> But whether this is a wise use of the IGPs I think has never been fully >>> discussed/answered. >>> >>> Relevant to this point is past experience with virtual links in OSPF – >>> use of which was problematic and which has largely fallen out of use. >>> >>> Also, many datacenters use BGP (w or w/o IGP) and therefore have other >>> ways to address such issues. >>> >>> Although I am familiar with the “one protocol is simpler” argument, >>> whether that justifies altering the IGPs in any of the proposed ways is >>> still an important question to discuss. >>> >>> >>> >>> Given the discussions of these solutions over the last two years in LSR, >>> I don’t think we need to rehash this – especially on the experimental >>> track. >>> >>> >>> >>> 2)If link state protocols do need to solve this problem, what is the >>> preferred way to do that? >>> >>> This requires meaningful dialogue and a willingness to engage on complex >>> technical issues. >>> >>> >>> >>> The alternative is to do what we seem to be doing – allowing multiple >>> solutions to move forward largely without comment. In which case I see no >>> basis on which to object – anyone who can demonstrate a deployment case >>> should then be allowed to move a draft forward – and there are then no >>> standardized solutions. >>> >>> (The Experimental Track status for these drafts reflects that reality.) >>> >>> >>> >>> Are you saying you don’t want any experimental solutions unless we have >>> one standardized solution that everybody agrees on? Please review this one >>> as part of WG last call. >>> >>> >>> >>> Thanks, >>> >>> Acee >>> >>> >>> >>> Les >>> >>> >>> >>> P.S. (Aside: There is a third draft offering a solution in this space >>> https://datatracker.ietf.org/doc/draft-ietf-lsr-isis-ttz/ - but as >>> that draft continues to promote its primary usage as a means of more easily >>> changing area boundaries (merging/splitting) I have not discussed it here. >>> However, if the authors of that draft claim it as a solution to the same >>> problem space claimed by Area Proxy/Flood Reflection then the WG would have >>> no basis but to also progress it – which would result in three solutions >>> being advanced.) >>> >>> >>> >>> >>> >>> >>> >>> *From:* Lsr <lsr-bounces@ietf.org> *On Behalf Of *Acee Lindem (acee) >>> *Sent:* Monday, November 22, 2021 11:47 AM >>> *To:* lsr@ietf.org >>> *Subject:* [Lsr] WG Last Call fo "IS-IS Flood Reflection" >>> -draft-ietf-lsr-isis-flood-reflection-05 >>> >>> >>> >>> This begins the WG Last for draft-ietf-lsr-isis-flood-reflection-05. >>> Please post your support or objection to this list by 12:00 AM UTC on Dec 14th >>> , 2021. Also please post your comments on the draft. I’m allowing as >>> extra week as I like to get some additional reviews – although my comments >>> have been addressed. >>> >>> >>> >>> Thanks, >>> Acee >>> >>> >>> >>> _______________________________________________ >>> Lsr mailing list >>> Lsr@ietf.org >>> https://www.ietf.org/mailman/listinfo/lsr >>> >>> _______________________________________________ >>> Lsr mailing list >>> Lsr@ietf.org >>> https://www.ietf.org/mailman/listinfo/lsr >>> >> _______________________________________________ >> Lsr mailing list >> Lsr@ietf.org >> https://www.ietf.org/mailman/listinfo/lsr >> >> _______________________________________________ > Lsr mailing list > Lsr@ietf.org > https://www.ietf.org/mailman/listinfo/lsr > >
- [Lsr] WG Last Call fo "IS-IS Flood Reflection" -d… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Jeff Tantsura
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Parag Kaneriya
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… zhang.zheng
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Lee, Yiu
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Chris Bowers
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Les Ginsberg (ginsberg)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Li
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Les Ginsberg (ginsberg)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Li
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Acee Lindem (acee)
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Li
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Aijun Wang
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Christian Hopps
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Tony Przygienda
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Jeff Tantsura
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Gyan Mishra
- Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection… Les Ginsberg (ginsberg)