Re: [Lsr] Thoughts about PUAs - are we not over-engineering?

Peter Psenak <ppsenak@cisco.com> Wed, 15 June 2022 09:08 UTC

Return-Path: <ppsenak@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2A7D2C14CF00 for <lsr@ietfa.amsl.com>; Wed, 15 Jun 2022 02:08:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -12.229
X-Spam-Level:
X-Spam-Status: No, score=-12.229 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.745, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-1.876, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EkygFyEQKtoR for <lsr@ietfa.amsl.com>; Wed, 15 Jun 2022 02:08:47 -0700 (PDT)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 89A7CC14F741 for <lsr@ietf.org>; Wed, 15 Jun 2022 02:08:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6152; q=dns/txt; s=iport; t=1655284126; x=1656493726; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=fgCelWnXDfJlwVkxWwnWNkXrGMOTDVhy8vLxrE4OnME=; b=CE74tyb6DnRGMp5Zs8Ng8yMIXxlyxPLKqcjgvxnzZWC4/5CTCX19tony oPde3u/Ofcm5jWj7ZNCfGIy/Y7k4a4w+4w0oYVc3v1AcoKcl82FODBnp2 micifNCVQEO426dGYzbq6zbfvYVtm5MhVeoYZu+V8cVF88LsD7fXuW4U2 Y=;
X-IPAS-Result: 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
IronPort-Data: A9a23:shI/uKKqsxg3J0ZiFE+R8JQlxSXFcZb7ZxGr2PjKsXjdYENS3zEFy WcXUGCPbqmIMWL3ct9xaNi+9RgCuZfSm4RnHFQd+CA2RRqmiyZq6fd1j6vUF3nPRiEWZBs/t 63yUvGZcIZuCCe0Si6FatDJtWN72byDWo3yAevFPjEZbQJ/QU/Nszo78wICqtMu0IHR7z+l4 4uo+ZWBYQP9gFaYD0pNg069gEI31BjNkGtwUmwWPZhjoFLYnn8JO5MTTYnZw6zQG9Q88kaSH o4v/Znhlo/r105F5uCNzt4XRnY3rov6ZmBivJb5t5+K2XCurgRqukoy2WF1hU1/011llPgpo DlBWADZpQoBZsXxdOohvxZwLidUZ6F985P+BWmkl9yd1m3vVHr93KA7ZK02FdVwFudfCGxUs PcfMj1IMlaIhvm9x/SwTewEasYLdZawethP/Cs4lneDV57KQribK0nOzcdAxzo2j8NmFvfFb M1fYj1qBPjFS0cTZgZPWMlWcOGApGPuaxt5t2KprIUe+TCQ3jxP6LXRP4+AEjCNbYAP9qqCn UrK5W33HlQFPdqQjD6e6De0nOLBnDO+RYQIGbSz9vdghFC7x2EPBlsRT1TTifWjg0CiHspHM EES8ylrqbMosU2kVpzgRRCxq37BpgQRVdtAO+w39A/LzbDbiy6dHXIsTzNdZpohrsBebSYt3 FKTg/vzDCd9rb7TT3+Bnp+bsDWuNDJTM2YEUiMJehUI59XuiIc0jRPGCN1kFcaIYsbdEDzqh jGSqzIiwrMakYgA1r6w+hbMhDfESoX1czPZLz7/BgqNhj6Vrqb8D2B0wTA3Ncp9Ebs=
IronPort-HdrOrdr: A9a23:Aoawoaut9BAgWOI03A/nsKjF7skDR9V00zEX/kB9WHVpmwKj5q OTdYcgtCMc7wxhPk3I+OrwX5VoLkmwyXcY2/h1AV7mZniDhILKFu1fBOnZqQEIcheWnoVgPO VbAspD4bbLY2SS4/yb3OD1KbkdKB3tytHRuQ8YpE0dND1XVw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.91,300,1647302400"; d="scan'208";a="2449083"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 15 Jun 2022 09:08:42 +0000
Received: from [10.147.24.42] ([10.147.24.42]) by aer-core-4.cisco.com (8.15.2/8.15.2) with ESMTP id 25F98fse024662; Wed, 15 Jun 2022 09:08:41 GMT
Message-ID: <41ba8fd6-ab16-6278-ba22-91a6a632ed33@cisco.com>
Date: Wed, 15 Jun 2022 11:08:41 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.9.1
Content-Language: en-US
To: "Van De Velde, Gunter (Nokia - BE/Antwerp)" <gunter.van_de_velde@nokia.com>, Robert Raszuk <robert@raszuk.net>
Cc: lsr <lsr@ietf.org>, "draft-ppsenak-lsr-igp-ureach-prefix@ietf.org" <draft-ppsenak-lsr-igp-ureach-prefix@ietf.org>, "draft-wang-lsr-prefix-unreachable@ietf.org" <draft-wang-lsr-prefix-unreachable@ietf.org>
References: <AM0PR07MB63863359D147F9EC0FF67689E0AA9@AM0PR07MB6386.eurprd07.prod.outlook.com> <CAOj+MMEwFYGMvx1fZRb0t=0W-dziE4_CJKwqPeqF+FghjjqJxA@mail.gmail.com> <AM0PR07MB6386453C35D9648ADA0C7FFCE0AD9@AM0PR07MB6386.eurprd07.prod.outlook.com>
From: Peter Psenak <ppsenak@cisco.com>
In-Reply-To: <AM0PR07MB6386453C35D9648ADA0C7FFCE0AD9@AM0PR07MB6386.eurprd07.prod.outlook.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Outbound-SMTP-Client: 10.147.24.42, [10.147.24.42]
X-Outbound-Node: aer-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/QkHPCouPVGef0BhwUUeYmJhixAk>
Subject: Re: [Lsr] Thoughts about PUAs - are we not over-engineering?
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jun 2022 09:08:51 -0000

Hi Gunter,

On 15/06/2022 11:02, Van De Velde, Gunter (Nokia - BE/Antwerp) wrote:
> Hi Robert,
> 
> I agree with you that the operator problem space is not limited to 
> multi-area/levels with IGP summarisation.
> 
> With the PUA/UPA proposals I get the feeling that LSR WG is jumping into 
> the deep-end and is re-vectoring the IGP to carry opaque information not 
> used for SPF/cSPF.
> 
> I believe we should be conservative for such and if LSR WG progresses 
> with such decision.

please note that UPA draft builds on existing protocol specification 
defined in RFC5305 and RFC5308 that allow the metric larger then 
MAX_PATH_METRIC to be used "for purposes other than building the normal 
IP routing table". We are just documenting one of them.

thanks,
Peter


> 
> It could very well be that re-vectoring is the best solution, but I 
> guess we need to agree first on understanding the operator problem space.
> 
> G/
> 
> *From:*Robert Raszuk <robert@raszuk.net>
> *Sent:* Tuesday, June 14, 2022 11:51 AM
> *To:* Van De Velde, Gunter (Nokia - BE/Antwerp) 
> <gunter.van_de_velde@nokia.com>
> *Cc:* lsr <lsr@ietf.org>; 
> draft-ppsenak-lsr-igp-ureach-prefix-announce@ietf.org; 
> draft-wang-lsr-prefix-unreachable-annoucement 
> <draft-wang-lsr-prefix-unreachable-annoucement@ietf.org>
> *Subject:* Re: [Lsr] Thoughts about PUAs - are we not over-engineering?
> 
> Hello Gunter,
> 
> I agree with pretty much all you said except the conclusion - do nothing 
> :).
> 
> To me if you need to accelerate connectivity restoration upon an 
> unlikely event like a complete PE failure the right vehicle to signal 
> this is within the service layer itself. Let's keep in mind that links 
> do fail a lot in the networks - routers do not (or they do it is 
> multiple orders of magnitude less frequent event). Especially links on 
> the PE-CE boundaries do fail a lot.
> 
> Removal of next hop reachability can be done with BGP and based on BGP 
> native recursion will have the exact same effect as presented ideas. 
> Moreover it will be stateful for the endpoints which again to me is a 
> feature not a bug.
> 
> Some suggested to define a new extension in BGP to signal it even 
> without using double recursion - well one of them has been proposed in 
> the past - 
> https://www.ietf.org/archive/id/draft-raszuk-aggr-withdraw-00.txt 
> <https://www.ietf.org/archive/id/draft-raszuk-aggr-withdraw-00.txt> At 
> that time the feedback received was that native BGP withdraws are fast 
> enough so no need to bother. Well those native withdrawals are working 
> today as well as some claim that specific implementations can withdraw 
> RD:* when PE hosting such RDs fail and RDs are allocated in a unique per 
> VRF fashion.
> 
> Then we have the DROID proposal which again may look like overkill for 
> this very problem, but if you consider the bigger picture of what 
> networks control plane pub-sub signalling needs, it establishes the 
> foundation for such.
> 
> Many thanks,
> 
> Robert
> 
> On Tue, Jun 14, 2022 at 10:59 AM Van De Velde, Gunter (Nokia - 
> BE/Antwerp) <gunter.van_de_velde@nokia.com 
> <mailto:gunter.van_de_velde@nokia.com>> wrote:
> 
>     Hi All,
> 
>     When reading both proposals about PUA's:
>     * draft-ppsenak-lsr-igp-ureach-prefix-announce-00
>     * draft-wang-lsr-prefix-unreachable-annoucement-09
> 
>     The identified problem space seems a correct observation, and indeed
>     summaries hide remote area network instabilities. It is one of the
>     perceived benefits of using summaries. The place in the network
>     where this hiding takes the most impact upon convergence is at
>     service nodes (PE's for L3/L2/transport) where due to the
>     summarization its difficult to detect that the transport tunnel
>     end-point suddenly becomes unreachable. My concern however is if it
>     really is a problem that is worthy for LSR WG to solve.
> 
>     To me the "draft draft-wang-lsr-prefix-unreachable-annoucement-09"
>     is not a preferred solution due to the expectation that all nodes in
>     an area must be upgraded to support the IGP capability. From this
>     operational perspective the draft
>     "draft-ppsenak-lsr-igp-ureach-prefix-announce-00" is more elegant,
>     as only the A(S)BR's and particular PEs must be upgraded to support
>     PUA's. I do have concerns about the number of PUA advertisements in
>     hierarchically summarized networks (/24 (site) -> /20 (region) ->
>     /16 (core)). More specific, in the /16 backbone area, how many of
>     these PUAs will be floating around creating LSP LSDB update churns?
>     How to control the potentially exponential number of observed PUAs
>     from floating everywhere? (will this lead to OSPF type NSSA areas
>     where areas will be purged from these PUAs for scaling stability?)
> 
>     Long story short, should we not take a step back and re-think this
>     identified problem space? Is the proposed solution space not more
>     evil as the problem space? We do summarization because it brings
>     stability and reduce the number of link state updates within an
>     area. And now with PUA we re-introduce additional link state updates
>     (PUAs), we blow up the LSDB with information opaque to SPF best-path
>     calculation. In addition there is suggestion of new state-machinery
>     to track the igp reachability of 'protected' prefixes and there is
>     maybe desire to contain or filter updates cross inter-area
>     boundaries. And finally, how will we represent and track PUA in the RTM?
> 
>     What is wrong with simply not doing summaries and forget about these
>     PUAs to pinch holes in the summary prefixes? this worked very well
>     during last two decennia. Are we not over-engineering with PUAs?
> 
>     G/
> 
>     _______________________________________________
>     Lsr mailing list
>     Lsr@ietf.org <mailto:Lsr@ietf.org>
>     https://www.ietf.org/mailman/listinfo/lsr
>     <https://www.ietf.org/mailman/listinfo/lsr>
>