Re: [Lsr] OSPF Routing with Cross-Address Family Traffic Engineering Tunnels - draft-ietf-ospf-xaf-te-04.txt

"Van De Velde, Gunter (Nokia - BE/Antwerp)" <gunter.van_de_velde@nokia.com> Wed, 24 October 2018 10:59 UTC

Return-Path: <gunter.van_de_velde@nokia.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 040D0130DC3 for <lsr@ietfa.amsl.com>; Wed, 24 Oct 2018 03:59:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.37
X-Spam-Level:
X-Spam-Status: No, score=-2.37 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.47, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nokia.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MUfTGT_44eDj for <lsr@ietfa.amsl.com>; Wed, 24 Oct 2018 03:59:37 -0700 (PDT)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20123.outbound.protection.outlook.com [40.107.2.123]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 460671286D9 for <lsr@ietf.org>; Wed, 24 Oct 2018 03:59:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nokia.onmicrosoft.com; s=selector1-nokia-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KMyZUyzRWESLDACOpQiQerE1IYnhy3Z9ZFfpnPByjrc=; b=FqzY8EGDapAypfo88h44M/j/zxS27VtkaSWfrwNCpD/YyDJRT3cKjjeXx0/6AozYOwIUrOHnuKj4n14/0S6YJQslrhjdR4KKri34mBDbG+8oCd5SihWDZ8tynilcQKG1V0w6Ke4+g6PVoO/OUfbj5ZqbeXHHhgQkExhFr61qMHQ=
Received: from AM0PR07MB5137.eurprd07.prod.outlook.com (20.178.19.82) by AM0PR07MB3873.eurprd07.prod.outlook.com (52.134.82.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1273.15; Wed, 24 Oct 2018 10:59:34 +0000
Received: from AM0PR07MB5137.eurprd07.prod.outlook.com ([fe80::89d0:98fb:8a28:d97a]) by AM0PR07MB5137.eurprd07.prod.outlook.com ([fe80::89d0:98fb:8a28:d97a%4]) with mapi id 15.20.1273.019; Wed, 24 Oct 2018 10:59:34 +0000
From: "Van De Velde, Gunter (Nokia - BE/Antwerp)" <gunter.van_de_velde@nokia.com>
To: "Acee Lindem (acee)" <acee@cisco.com>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: OSPF Routing with Cross-Address Family Traffic Engineering Tunnels - draft-ietf-ospf-xaf-te-04.txt
Thread-Index: AQHUalYXl2Z4skvnDEu/Rd//ZGkJo6UuOTCA
Date: Wed, 24 Oct 2018 10:59:34 +0000
Message-ID: <AM0PR07MB51370D4B9B2CC026CF730AFDE0F60@AM0PR07MB5137.eurprd07.prod.outlook.com>
References: <1E930DB6-2ED9-43A3-8EC7-338DAD1C3803@cisco.com>
In-Reply-To: <1E930DB6-2ED9-43A3-8EC7-338DAD1C3803@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=gunter.van_de_velde@nokia.com;
x-originating-ip: [135.245.212.89]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM0PR07MB3873; 6:LnTMZuRpUcPBKcAck+02tmu921aGNIIcFcPId5MIFOqlKEIC3PL6J0ftomIObXwYq/3GZpB+b5Crnlo1mYLpad11cw0HggshZXLM65+hDRd6Q3j/NQlbkWKTtW4Pcmm3tF0E8lCmK09Dl+nNtp4DQO70Jqm9Xo8yzQDi3rzHFnIyvUg9E6exWKdO5Uls/nqWbsz9hXN3Y1drh+RT+Chx/Rz2DUw7P4mL58SL8Xr6V3ZIwXM3BnO9YtXRANSe/Ija5wsUXsdu0/ZUggtgiRlsslOCu5pQy9AUA4Y6D46pt+f1VnAgg2m+cKOmKw8qyndLs8Ir7itzAEVvCRwksv+07IQBhFgUol8EyPY6bR5pCkOz8M3uoaVyHUSAVfoywVaXPh9IQX1VDbtmQkgTSxxlI5j3eF2kjjGByaw0Ogbh7LDd7nmd/Wd4nsLUjdzVb1Jl05zpOB/BEcKLG4Uy+XyR4w==; 5:XcPtseISerH2ojqNxhXDcOJnAc3z0IsGaJzBj68X1coOZHecmr7BnAnlnInjAj91bw5EzDjIHCG1Ps1R2O346mnu61z4Rx2g9Er5YqDM+h+5NQMytBWy7MwjD/04IdOSLoAvv8fAun+o7eedyNmEvmdXvK3BTkbZxMMz6rNuY4Y=; 7:AvudTNF6+IYeWNwOyQ7ePkjzGubzaAJQth6feKvhHK+ffltY3i7XM2PzDhUUqVg5VDTpcRrrEwvWTltJehkfPVoPZYl/s/4TYqonS1HqTD+2ENgbsEBOGtxMSd4bKMJ/FyyvoYzVdDc7QJY7rHMS1Q==
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 37f7e992-6bb1-4a89-1356-08d6399fc8b5
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989299)(5600074)(711020)(4618075)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:AM0PR07MB3873;
x-ms-traffictypediagnostic: AM0PR07MB3873:
x-microsoft-antispam-prvs: <AM0PR07MB38731CCC9763753ECF9FDBC7E0F60@AM0PR07MB3873.eurprd07.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(120809045254105)(21748063052155)(28532068793085)(190501279198761)(227612066756510);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3002001)(3231355)(11241501184)(806099)(944501410)(52105095)(6055026)(148016)(149066)(150057)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123558120)(20161123562045)(20161123564045)(201708071742011)(7699051)(76991095); SRVR:AM0PR07MB3873; BCL:0; PCL:0; RULEID:; SRVR:AM0PR07MB3873;
x-forefront-prvs: 083526BF8A
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(376002)(136003)(346002)(396003)(39860400002)(199004)(189003)(81166006)(97736004)(71190400001)(3846002)(7696005)(790700001)(316002)(105586002)(71200400001)(6116002)(478600001)(966005)(14454004)(110136005)(6436002)(66066001)(256004)(53936002)(236005)(86362001)(55016002)(6306002)(2906002)(9686003)(54896002)(102836004)(33656002)(229853002)(76176011)(606006)(68736007)(26005)(8936002)(99286004)(5250100002)(186003)(5660300001)(25786009)(53546011)(7736002)(81156014)(8676002)(6506007)(2501003)(2900100001)(74316002)(446003)(486006)(11346002)(106356001)(476003)(6246003); DIR:OUT; SFP:1102; SCL:1; SRVR:AM0PR07MB3873; H:AM0PR07MB5137.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: nokia.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: VnGtRpBjaqmNjMFnltwBuVLJYnnY1N0I/Am3yOtn6NFQAd0E77SlLXIMyC/gosmrJ0VtceGf2YTss0WrPKpY1jHG1g4ZvOdmwbD/q6UeQOoOTlR7daLGX2UziOkTaWZh+ZISP/OK2nUwqXzmeACaGL8l1SO86bC7qs8Ycb7Ykg2hL9p+CT7S7V5y3SfPDdbjQMSpm2Aq+/Kb538vADgKSNE8kHawmzXYEvWSR1mImCyLz8FYSAWRNbvf3FLRe9TVDizsAnI74qied1hRYYv8wLhISTbhSPp/eDN4Vss+DMgzJfX5FEcHgKku3SDpsxTlze8jt70HXO46nG3IaXZ95o6QjNdNTLNwbtPZBHkY/DwWplsQ9eaALqrGRszLOS5m+lrcnGU7ORkzimZ/MnRdLA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_AM0PR07MB51370D4B9B2CC026CF730AFDE0F60AM0PR07MB5137eurp_"
MIME-Version: 1.0
X-OriginatorOrg: nokia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 37f7e992-6bb1-4a89-1356-08d6399fc8b5
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Oct 2018 10:59:34.8886 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5d471751-9675-428d-917b-70f44f9630b0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR07MB3873
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/3QakrBuQVLONQAntPw9dEydDG48>
Subject: Re: [Lsr] OSPF Routing with Cross-Address Family Traffic Engineering Tunnels - draft-ietf-ospf-xaf-te-04.txt
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Oct 2018 10:59:40 -0000

Looks fine. One item I would like to see changed (or at least discussed)

I have a problem with chapter3 – Para6 – Point 1 :

EXISTING:

If T's destination IP address is from the same address family as

the computing OSPF instance, then the tunnel must have been

signaled based on MPLS TE information propagated in the same OSPF

instance.  Process the tunnel as per [RFC3630<https://tools.ietf.org/html/rfc3630>] or [RFC5329<https://tools.ietf.org/html/rfc5329>].

PROPOSED:

If T's destination IP address is from the same address family as

the computing OSPF instance, then process the tunnel as per [RFC3630<https://tools.ietf.org/html/rfc3630>] or [RFC5329<https://tools.ietf.org/html/rfc5329>].

MOTIVATION:
I do not understand why to restrict the tunnel to be signaled with only info from same OSPF instance. If there is tunnel available (different instance, or even other routing protocol), it should be able to be used.

G/

From: Lsr <lsr-bounces@ietf.org> On Behalf Of Acee Lindem (acee)
Sent: Tuesday, October 23, 2018 00:25
To: lsr@ietf.org
Subject: [Lsr] OSPF Routing with Cross-Address Family Traffic Engineering Tunnels - draft-ietf-ospf-xaf-te-04.txt

This begins an LSR WG last call for the subject draft. Please send your comments to this list prior to 12:00 AM GMT, November 13th , 2018. While its only an 8 page document, I added an extra week due to the IETF. Please let me know if anyone needs any more time.

https://datatracker.ietf.org/doc/draft-ietf-ospf-xaf-te/

Thanks,
Acee