Re: [Lsr] https://tools.ietf.org/html/draft-wang-lsr-prefix-unreachable-annoucement-05

"Acee Lindem (acee)" <acee@cisco.com> Thu, 11 March 2021 16:01 UTC

Return-Path: <acee@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0CA2B3A11D4; Thu, 11 Mar 2021 08:01:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.607
X-Spam-Level:
X-Spam-Status: No, score=-9.607 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=M44Et3NZ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=DcKQRr1m
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d0S9Wp3o1OiT; Thu, 11 Mar 2021 08:01:12 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 04D613A11D1; Thu, 11 Mar 2021 08:01:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=39157; q=dns/txt; s=iport; t=1615478472; x=1616688072; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=MG/beT7ASqnnVtmEeL3P+ObtCQ8gzYgo1NAvR2EtnIc=; b=M44Et3NZFTWE8XGuTnIIR6Sl1o43ss2EcDdFcgVNKC9IdWHKoj3YSPGt cDS3ozX1L5MNXp7x+xADupyaCSUHKg58rBhr4+bce6lTr2A+OUVUHkF87 fv5rATVWbVOFes+uKJTB/1IpdAaNPxy0Xj2OuyP19rj/NjO6lYTrhJAwI k=;
IronPort-PHdr: A9a23:Uk2pxBagXDogzHw6swOr0ND/LTDdhN3EVjU944c7i79IbqWo9ojjO0qa//h2kVvVRu3z5PdNiu6QuKflCiQM4peE5XYFdpEEFxoIkt4fkAFoBsmZQVb6I/jnY21ffoxCWVZp8mv9PR1TH8DzNFLXq3y2qzUVH0a3OQ98PO+gHInUgoy+3Pyz/JuGZQJOiXK9bLp+IQ/wox/Ws5wdgJBpLeA6zR6aykY=
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: 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
X-IronPort-AV: E=Sophos;i="5.81,241,1610409600"; d="scan'208,217";a="781776200"
Received: from rcdn-core-8.cisco.com ([173.37.93.144]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 11 Mar 2021 16:00:45 +0000
Received: from mail.cisco.com (xbe-aln-005.cisco.com [173.36.7.20]) by rcdn-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 12BG0jCS030541 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Thu, 11 Mar 2021 16:00:45 GMT
Received: from xfe-rcd-002.cisco.com (173.37.227.250) by xbe-aln-005.cisco.com (173.36.7.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Thu, 11 Mar 2021 10:00:45 -0600
Received: from xfe-rcd-002.cisco.com (173.37.227.250) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3; Thu, 11 Mar 2021 10:00:16 -0600
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-002.cisco.com (173.37.227.250) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.792.3 via Frontend Transport; Thu, 11 Mar 2021 10:00:16 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KqpPGPfXV5wn8rHWyQ8Tn9L0fSgnY2VGTX2gZxMSV6sN5mPUXHRTBLVjDFCCC0aup/Fkp9BLSTD4jEwiLjdEMfdeY+8mw4D/jl/irFhN/d7PcEKBTvanXdeVsFr8xMgB5UKpfQPi8Y1ebtyvVdcxQ7LOvQN7j0dJ58HxzEWkIV9TgoTd5w+AdHKA5kmBJHHKyTIw6JFnaeCpNYg2i6N/LI0sImmPXN7gWGjs/jSlIFiQhk9clsHTrrZLKoSho1BghAUO/uDGN72irNRtZU4y2qtnbV6coE36mp9uZlCEKsFBX/2/xtPfglFy0vVQIJ/9e7JAp69Hw/nL/NlN/bnfeA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MG/beT7ASqnnVtmEeL3P+ObtCQ8gzYgo1NAvR2EtnIc=; b=OFyuuoZ3ri9R0OxDq9L+lX7bD7Neznf0BD1zSr6OEyQBk3VkXdbyGZB9VB6txhqGxSYvcaOucc8ptjGc4PmUBl+05kDmtbZaivO+d2v6RZmPga1ojbisOdkm7TaoN1v1Pc4hP22nysqCzJz0m0nIlEoNi0eoWft/zKeJUIoKB1E7dbHoW7KYCDSshV6DuJJ7VOYjeg7Vs7xP740MH7t0DtLC8uRc7CL19kxTS6Vyn7NmuhG43Yq6O+23cR3CzuqigPkMXK27+J/HRGCXBH1uzruKa6Np3Ah3SeHqVilPKk2H/chguMBIa23A7M80kR/qpNjs4iwk5yUpDcLuHqK10g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MG/beT7ASqnnVtmEeL3P+ObtCQ8gzYgo1NAvR2EtnIc=; b=DcKQRr1mHYL3K21MyWvCQQfd9g3M6qmH75teDbRueHLUbFRjoLWbqQ9O427jikBThw20AHAopcH9Z2upNG4zEZjHPBvLnojTGQvrbSfMeqJq7czDsQtvjOlblPNRzBAyixZXI28ve6BZokQ5xm/rPf5OpBBNniNzMVg8MFjJVHM=
Received: from BYAPR11MB2887.namprd11.prod.outlook.com (2603:10b6:a03:89::27) by SJ0PR11MB5118.namprd11.prod.outlook.com (2603:10b6:a03:2dd::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3933.31; Thu, 11 Mar 2021 16:00:15 +0000
Received: from BYAPR11MB2887.namprd11.prod.outlook.com ([fe80::a053:fad0:cf70:98b6]) by BYAPR11MB2887.namprd11.prod.outlook.com ([fe80::a053:fad0:cf70:98b6%4]) with mapi id 15.20.3890.037; Thu, 11 Mar 2021 16:00:15 +0000
From: "Acee Lindem (acee)" <acee@cisco.com>
To: Gyan Mishra <hayabusagsm@gmail.com>
CC: Aijun Wang <wangaj3@chinatelecom.cn>, draft-wang-lsr-prefix-unreachable-annoucement <draft-wang-lsr-prefix-unreachable-annoucement@ietf.org>, lsr <lsr@ietf.org>
Thread-Topic: https://tools.ietf.org/html/draft-wang-lsr-prefix-unreachable-annoucement-05
Thread-Index: AQHXFHbdPXq3oeG8SU+kbxdWp1pdYqp6e9yAgABdUoCAA8lRAA==
Date: Thu, 11 Mar 2021 16:00:14 +0000
Message-ID: <0E39A8D4-547D-482C-BD01-4A8CDE48324A@cisco.com>
References: <CABNhwV2=HTRYG5PTgiGYanm8LeT1HYcrPKQ4R4TQHZ-GO9ecJQ@mail.gmail.com> <439DD1F9-9924-405F-9FBD-6704D85B05D6@cisco.com> <CABNhwV3ky4nbYxo7qLowu0GyHpSYRKWdTQ3y-uQpvU-p0bskww@mail.gmail.com>
In-Reply-To: <CABNhwV3ky4nbYxo7qLowu0GyHpSYRKWdTQ3y-uQpvU-p0bskww@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.46.21021202
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [136.56.133.70]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d034c457-6d3f-43b7-8b65-08d8e4a6c282
x-ms-traffictypediagnostic: SJ0PR11MB5118:
x-microsoft-antispam-prvs: <SJ0PR11MB51181540FDAC354F0E8EBEA8C2909@SJ0PR11MB5118.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2887.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(366004)(376002)(136003)(39860400002)(346002)(86362001)(76116006)(66446008)(66556008)(66946007)(64756008)(66476007)(6916009)(478600001)(6506007)(53546011)(66574015)(166002)(83380400001)(36756003)(186003)(6486002)(54906003)(5660300002)(71200400001)(316002)(8676002)(8936002)(26005)(4326008)(2906002)(2616005)(966005)(33656002)(9326002)(6512007)(91956017)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_0E39A8D4547D482CBD014A8CDE48324Aciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2887.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d034c457-6d3f-43b7-8b65-08d8e4a6c282
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Mar 2021 16:00:15.0785 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: E+hMlk1rPDz18pZ1FXDSuEh8iNt2nR0UeVbVR2cb672CAorif62mKEZULPjtLDpD
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB5118
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.20, xbe-aln-005.cisco.com
X-Outbound-Node: rcdn-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/M6v6-npR8Dzngk-Td7NCgbOC_1g>
Subject: Re: [Lsr] https://tools.ietf.org/html/draft-wang-lsr-prefix-unreachable-annoucement-05
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Mar 2021 16:01:16 -0000

Hi Gyan,

I guess you didn’t understand my first PUA question. See inline.

From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Monday, March 8, 2021 at 8:11 PM
To: Acee Lindem <acee@cisco.com>
Cc: Aijun Wang <wangaj3@chinatelecom.cn>, draft-wang-lsr-prefix-unreachable-annoucement <draft-wang-lsr-prefix-unreachable-annoucement@ietf.org>, lsr <lsr@ietf.org>
Subject: Re: https://tools.ietf.org/html/draft-wang-lsr-prefix-unreachable-annoucement-05



On Mon, Mar 8, 2021 at 7:37 PM Acee Lindem (acee) <acee@cisco.com<mailto:acee@cisco.com>> wrote:
Speaking as a WG member:

Hi Gyan,

The first question is how do you know which prefixes within the summary range to protect? Are these configured? Is this half-assed best-effort protection where you protect prefixes within the range that you’ve installed recently? Just how does this work? It is clearly not specified in the draft.
 Gyan>  All prefixes within the summary range are protected see section 4.


   [RFC7794] and [I-D.ietf-lsr-ospf-prefix-originator<https://tools.ietf.org/html/draft-wang-lsr-prefix-unreachable-annoucement-05#ref-I-D.ietf-lsr-ospf-prefix-originator>] draft both define

   one sub-tlv to announce the originator information of the one prefix

   from a specified node.  This draft utilizes such TLV for both OSPF

   and ISIS to signal the negative prefix in the perspective PUA when a

   link or node goes down.



   ABR detects link or node down and floods PUA negative prefix

   advertisement along with the summary advertisement according to the

   prefix-originator specification.  The ABR or ISIS L1-L2 border node

   has the responsibility to add the prefix originator information when

   it receives the Router LSA from other routers in the same area or

   level.



Acee> So, the ABR will only know about missing prefixes that it has recently received? What if the prefix is already missing when the ABR establishes adjacencies on the path to the PE? What if the prefix is being permanently taken out of service – then this negative advertisement will persist permanently. What if there is an unintentional advertisement in the summary range and it is withdrawn? How do you decide whether or not to protect a prefix with in the range?









When the ABR or ISIS L1-L2 border node generates the summary

   advertisement based on component prefixes, the ABR will announce one

   new summary LSA or LSP which includes the information about this down

   prefix, with the prefix originator set to NULL.  The number of PUAs

   is equivalent to the number of links down or nodes down.  The LSA or

   LSP will be propagated with standard flooding procedures.



   If the nodes in the area receive the PUA flood from all of its ABR

   routers, they will start BGP convergence process if there exist BGP

   session on this PUA prefix.  The PUA creates a forced fail over

   action to initiate immediate control plane convergence switchover to

   alternate egress PE.  Without the PUA forced convergence the down

   prefix will yield black hole routing resulting in loss of

   connectivity.



   When only some of the ABRs can't reach the failure node/link, as that

   described in Section 3.2<https://tools.ietf.org/html/draft-wang-lsr-prefix-unreachable-annoucement-05#section-3.2>, the ABR th.at<http://th.at> can reach the PUA prefix

   should advertise one specific route to this PUA prefix.  The internal

   routers within another area can then bypass the ABRs that can't reach

   the PUA prefix, to reach the PUA prefix.

The second comment is that using the prefix-originator TLV is a terrible choice of encoding. Note that if there is any router in the domain that doesn’t support the extension, you’ll actually attract traffic towards the ABR blackholing it.
 Gyan> I will work with the authors to see if their is any alternative PUA process to signal and detect the failure in case prefix originator TLV is not supported.
Acee> Note that in the case of OSPFv3, the prefix originator TLV is a Sub-TLV of the Inter-Area Prefix TLV advertised in the E-Inter-Area-Prefix-LSA. If there are any OSPFv3 routers in the domain that don’t support this functionality and receive traffic for the protected prefix, they will actually route it towards the blackhole.

Further, I think your example is a bit contrived. I’d hope that an OSPF area with “thousands” of summarized PE addresses wouldn’t be portioned by a single failure as in figure 1 in the draft and your slides. I also that the option of a backbone tunnel between the ABRs was removed from the draft since it diminished the requirement for this functionality.
 Gyan> This is a real world Metro access edge example as the impact is customers that have LSP built to the down egress PE that has not failed over.  In this scenario their is a Primary and Backup PE per Metro edge which is typical for an operator.

The workaround used today is to flood all /32 next hop prefixes and not take advantage of summarization.  This draft makes RFC 5283 inter area FEC binding now viable for operators.
Acee> Or add a reliable intra-area link between your ABRs. Or, as a backup, a tunnel through the backbone area (as was previously in the draft).
Thanks,
Acee


Thanks,
Acee

From: Gyan Mishra <hayabusagsm@gmail.com<mailto:hayabusagsm@gmail.com>>
Date: Monday, March 8, 2021 at 6:57 PM
To: Acee Lindem <acee@cisco.com<mailto:acee@cisco.com>>, Aijun Wang <wangaj3@chinatelecom.cn<mailto:wangaj3@chinatelecom.cn>>, draft-wang-lsr-prefix-unreachable-annoucement <draft-wang-lsr-prefix-unreachable-annoucement@ietf.org<mailto:draft-wang-lsr-prefix-unreachable-annoucement@ietf.org>>, lsr <lsr@ietf.org<mailto:lsr@ietf.org>>
Subject: https://tools.ietf.org/html/draft-wang-lsr-prefix-unreachable-annoucement-05


Acee.

Please ask the two questions you raised about the PUA draft so we can address your concerns.

If anyone else has any other outstanding questions or concerns we would like to address as well and resolve.

Once all questions and  concerns are satisfied we would like to ask for WG adoption.

Kind Regards

Gyan
--

Error! Filename not specified.<http://www.verizon.com/>

Gyan Mishra

Network Solutions Architect

M 301 502-1347
13101 Columbia Pike<https://www.google.com/maps/search/13101+Columbia+Pike?entry=gmail&source=g>
Silver Spring, MD

--

[Image removed by sender.]<http://www.verizon.com/>

Gyan Mishra

Network Solutions Architect

M 301 502-1347
13101 Columbia Pike
Silver Spring, MD