Re: [Lsr] AD review of draft-ietf-lsr-ospf-bfd-strict-mode-05
John Scudder <jgs@juniper.net> Thu, 01 September 2022 17:12 UTC
Return-Path: <jgs@juniper.net>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3310AC14CF17; Thu, 1 Sep 2022 10:12:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.679
X-Spam-Level:
X-Spam-Status: No, score=-7.679 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.571, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=EhxWqBrr; dkim=pass (1024-bit key) header.d=juniper.net header.b=A6HDKEJL
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aKsGFG9ByOIm; Thu, 1 Sep 2022 10:12:43 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B394CC14F749; Thu, 1 Sep 2022 10:12:40 -0700 (PDT)
Received: from pps.filterd (m0108160.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.17.1.5/8.17.1.5) with ESMTP id 281ETRI1032481; Thu, 1 Sep 2022 10:12:39 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=RyM/01ohBbmWiNx4cMoE/v+s+KfMN0QloNw/a+bGCXs=; b=EhxWqBrrCrNhTW3ianPo21X1NKS3+lsE9ymGEdr7YOT9qg2ChLlnr8Uy8GIEIjl6f0ym rcgfemkOhtocc49i1CSjDdc+p+t+oqa0kawvILaunMV0DAgkuxqIBDD58QbOawKUPB0b kZHL8Hg2/I70gEpjGXfTGtAvljA2GhlkUbU4aPWxJT/el1D6u5hEe6DWnai7pCwJaNh7 6RnFC2GUVKQdWnidtNNEzoFskbi0ZkV5dM3DGLuuNxWNmogiUN8mfZzP5s6RAKYBMewY 5UKwbFXtWRwhrFJGDYY0em9zx0FIjC7DkPSU7peCJ09HhhwtKmLf9sdFpTdgj2camyCS YQ==
Received: from na01-obe.outbound.protection.outlook.com (mail-centralusazlp17013039.outbound.protection.outlook.com [40.93.13.39]) by mx0b-00273201.pphosted.com (PPS) with ESMTPS id 3jas2rgwg4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 01 Sep 2022 10:12:39 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FHv9kNk9QPuyMGYSQtExnFkpWw36zPaSsICOk5MkHLXO7cJcPVNCeLKAXtIKhrG4Adb05IGRo4a454klwQEnZXBQPEmt3IAm9Sq7YUJhNCfgqBK792E1xz2PtZbVxmnnQVXR1yrYvfmswAL+k1YNYh08dtMJtor6oWUnOi3+oLc2Nys+syuzICQzhi7JsusAW3fbu3zBJSSeUeIVeOq0TkQ3exNb9XgVix5Lr9yzvKz+Ix6DcZG9UTWa4P3kAldTqKr4WA+9C+84rrp6YfhSZW0LdG7SHOMpId/6wPTaWkSKC502ScxgCr1JT1zWAfesvCsHdaFTxk3ixLZcKuIgHA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RyM/01ohBbmWiNx4cMoE/v+s+KfMN0QloNw/a+bGCXs=; b=P6C3n3WwWjWPeEswbUL+AbXz8EPWYXSCF0duxJcCx1nrae7wR2xs2wxbs1CSqiQNVIrMI7922NqAx6c8tGn4VfU4na9FUXa9YldNdF8ThFbQ4ZTmejOPmezHf/y/wQckz86LHpIFQMJlUsyrHtNOFuNCAXjB6VHMYHGTI/vxFG5Qm/cjpD6Q/O1HneZwv8YTZHAL1aPoThwZ6z/BhccFUAZYR1DUZ2DLn9nU9gBvyMnGB0b4NUZ4iDFH6k4j9uNdwDy1GJEEdqi7FseYbtKhu55BViXYBiAX63H/QBG8Hk87xm7R0ZUz7ZI9wd70hSs8KEcMCApkyiYHdw48fTfluQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RyM/01ohBbmWiNx4cMoE/v+s+KfMN0QloNw/a+bGCXs=; b=A6HDKEJLmX9jPb9Xk3yJ49c33SHw0n32MBBG6SMPJsiPpbzxql7rW6SC9Y3Avi4+eQVEzyvSp/f2hlKF2yV7fL25XTslg58pPrDnTAD+S3GcJ0g3exOeeizm71Yc/kdTNeWSTwJdmGMnzXjT6n4iSUdxUl6vv50zxKcafI//d8Q=
Received: from MN2PR05MB6109.namprd05.prod.outlook.com (2603:10b6:208:c4::20) by SA0PR05MB7404.namprd05.prod.outlook.com (2603:10b6:806:b8::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5612.5; Thu, 1 Sep 2022 17:12:37 +0000
Received: from MN2PR05MB6109.namprd05.prod.outlook.com ([fe80::915f:ef9b:a308:d50d]) by MN2PR05MB6109.namprd05.prod.outlook.com ([fe80::915f:ef9b:a308:d50d%3]) with mapi id 15.20.5588.010; Thu, 1 Sep 2022 17:12:37 +0000
From: John Scudder <jgs@juniper.net>
To: Ketan Talaulikar <ketant.ietf@gmail.com>
CC: lsr <lsr@ietf.org>, "draft-ietf-lsr-ospf-bfd-strict-mode@ietf.org" <draft-ietf-lsr-ospf-bfd-strict-mode@ietf.org>
Thread-Topic: AD review of draft-ietf-lsr-ospf-bfd-strict-mode-05
Thread-Index: AQHYvJ2eYPTqT8ydUUW0nygoCOYJ+a3KuBAAgAAaxAA=
Date: Thu, 01 Sep 2022 17:12:37 +0000
Message-ID: <D210C156-FC01-41D7-B6B1-8599ABEE6891@juniper.net>
References: <0FA46564-EECB-442F-A058-19ED4BD96A25@juniper.net> <CAH6gdPzG6BLcqagtJEx0aH4sZLAtOssVk7tjS8Cpw9fBrD+PkQ@mail.gmail.com>
In-Reply-To: <CAH6gdPzG6BLcqagtJEx0aH4sZLAtOssVk7tjS8Cpw9fBrD+PkQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3696.120.41.1.1)
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 70365e68-484f-4c05-2ee9-08da8c3d2b56
x-ms-traffictypediagnostic: SA0PR05MB7404:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MN2PR05MB6109.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(39860400002)(346002)(376002)(396003)(136003)(366004)(66556008)(91956017)(66946007)(64756008)(4326008)(8676002)(66476007)(6486002)(478600001)(6916009)(71200400001)(54906003)(316002)(76116006)(8936002)(5660300002)(2906002)(38100700002)(66446008)(122000001)(33656002)(36756003)(86362001)(38070700005)(186003)(2616005)(6506007)(26005)(41300700001)(6512007)(53546011)(83380400001)(66574015)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <7AAC8BAE911E6F468EAD4EB34F70D7F9@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR05MB7404
X-Proofpoint-ORIG-GUID: UMaXNnY0YBNz3siaDUhI_p_A-OqU9a0C
X-Proofpoint-GUID: UMaXNnY0YBNz3siaDUhI_p_A-OqU9a0C
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.517,FMLib:17.11.122.1 definitions=2022-09-01_10,2022-08-31_03,2022-06-22_01
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 bulkscore=0 mlxlogscore=999 clxscore=1015 priorityscore=1501 phishscore=0 adultscore=0 spamscore=0 mlxscore=0 lowpriorityscore=0 impostorscore=0 suspectscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2207270000 definitions=main-2209010074
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/XPWtCuz5ZSnaQcSfBYG5y6T3haU>
Subject: Re: [Lsr] AD review of draft-ietf-lsr-ospf-bfd-strict-mode-05
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Sep 2022 17:12:48 -0000
Hi Ketan, Thanks for the prompt update. I have one question about your edits. In Section 6, I had suggested OLD: Implementations MAY provide a local configuration option to specifically enable BFD operation in OSPF BFD strict-mode only. NEW (my suggestion): Implementations MAY provide a local configuration option to require BFD strict-mode. NEW (your revision): Implementations MAY provide a local configuration option to require BFD operation in OSPF BFD strict-mode only. I’m wrestling with whether this option is supposed to mean “the adjacency must not establish unless BFD comes up first” or “if the neighbor supports BFD, then BFD must come up first before the adjacency is allowed to establish”. I.e., as written I can make the argument that if my neighbor doesn’t advertise the B-bit, then it’s fine for the adjacency to come up as long as BFD isn’t run at all. The former interpretation seems more operationally useful, but the spec text is ambiguous. I’m not sure my proposed text even resolved that problem, on reflection. In any case, I would be happier if the ambiguity were resolved somehow. Other comments below. > On Sep 1, 2022, at 11:36 AM, Ketan Talaulikar <ketant.ietf@gmail.com> wrote: [snip] > Status of This Memo > @@ -92,10 +92,19 @@ > protocols like OSPFv2 [RFC2328] and OSPFv3 [RFC5340] to detect > connectivity failures for established adjacencies faster than the > OSPF hello dead timer detection and trigger rerouting of traffic > - around the failure. The use of BFD for monitoring routing protocols > + around the failure. The use of BFD for monitoring routing protocol > adjacencies is described in [RFC5882]. > > - When BFD monitoring is enabled for OSPF adjacencies, the BFD session > +jgs: In the paragraph below, I found the flow of reading disrupted by > +the dawning realization that it's describing the status quo prior to > +introduction of this spec, i.e. the shortcomings that drove development > +of the spec. I've proposed an additional first clause that might help > +mitigate that, feel free to use it if you like. (It's a little > +inelegant, you might want to do a more intrusive edit instead, up to > +you.) > > KT> Ack. I've modified the text a little differently than your suggestion. Please let me know if it works. Yes, that’s fine, thanks. [snip] > +jgs: I expect that taken as a whole, this document is clear enough to > +enable an implementor to do the right thing, and that's the main goal. > +It does seem to me however that "updating the state machine" by means > +of putting a few notes into one of the states isn't the most thorough > +way of doing it -- probably if you were doing this from the get-go you'd > +introduce a new substate called "waiting for BFD establishment" or > +something like that, and then transition to it from Init at the appropriate > +time. Or something like that, I'm just making things up on the fly here. > +Likewise you'd introduce a new "BFD comes up" event that gets you out of > +your new state and back to the main flow of the state machine. Instead > +that's encapsulated in the note you've added to Init. > + > +I don't want a return to the Bad Old Days where we spent months of our > +lives wrangling over state machines in the Routing Area (if you missed > +that time count yourself lucky). However, it would make me feel better to > +know that the WG has at least considered the question and decided to move > +ahead without doing a full update to the state machine. So, I'd appreciate > +a bit of discussion on this point, thanks. > > KT> I don't remember this discussion on the mailer. I do remember some discussion during an initial presentation of this draft to the WG though not sure if it was during the session or offline. The introduction of a new state would result in far more intrusive changes to implementations. We would have this state whether or not the strict-mode is in use (BFD itself is optional). It was simpler to update the INIT state as proposed by the draft instead. We've added text in the Operations section so implementations show this additional BFD wait information along with the adjacency state and transitions. That should help in troubleshooting and operations. I’m satisfied that you’ve considered it, that the issue has been raised on the WG list (it has now) and that anyone who wants to comment has had the opportunity (they do, now). > +Also: when you write "This document updates ... [RFC2328]" it seems like > +there's a decent chance that someone's going to ask if the document should > +formally Update RFC 2328. If you're not going to use the updates header > +(and I don't insist you do) you might at least consider the reasons such > +an update isn't called for. It might be helpful too, to update the > +shepherd write-up with some text saying the WG considered the question. > > KT> This is a good point and at least I was not sure if doing the formal update to RFC2328 was the right way since this is an optional feature. That said, we can do the formal updates if that is the right way to go about this. Looking for feedback if this change is required. Your point about the feature being optional is well taken. The other perspective to consider is what might happen if someone else feels the need to also modify the Init state in their own spec. If they do, they really need to take your changes into account as well — it wouldn’t be great to have two documents, both purporting to update Init in some uncoordinated way. Adding the Updates: header makes this somewhat less likely to happen, because a person looking at 2328 will see the Updated by: header listing your RFC (to be). So I think as a practical matter, it would be useful to add the Updates header. Regrettably, there is no formal definition of what the semantics of “Updates” are (!!) so all we have to go on is tradition and practicality. > Whenever the neighbor state transitions to Down state, the removal of > the BFD session associated with that neighbor SHOULD be requested by > @@ -246,6 +281,14 @@ > result in the deletion and creation of the BFD session respectively > when OSPF is the only client interested in the BFD session with the > neighbor address. > + > +jgs: Please do a global search for the RFC 2119 keyword SHOULD and in > +each instance, consider whether it can be a MUST, or the normal English > +word "should" (in lower or mixed case). If SHOULD is the appropriate > +keyword, please supply some detail about when it would be appropriate > +for an implementor to disregard the SHOULD. (The one place where I > +thought "should" might be the appropriate choice is in the Operations & > +Management Considerations section.) > > KT> In this specific case, we are discussing implementation specifics that are also applicable without the strict-mode, and hence introducing a MUST here was not appropriate. We could change it to "should" if that would be more appropriate. Looking for feedback if this change is required. This actually motivates the question, why does that paragraph need to be there at all? Was the base behavior underspecified and in need of update? Is this just a nota bene for the implementor? Should you more clearly signal that’s what it is? But this is in any case tangential to the main point; we can return to it later perhaps. I did note the peculiar nature of the paragraph on my first read-through, and figured it did no harm to clarify that this is how implementations should be done regardless — but in any case I don’t see why that makes MUST inappropriate. > In some other places, the behavior may be applicable and shared with "base" BFD and hence we felt not appropriate to make it a MUST. However, we have taken the opportunity to suggest a desirable behavior. We look for feedback if any specific instance needs change or clarification. I have a different take on the appropriate use of SHOULD vs. MUST. Let’s look at what RFC 2119 says about SHOULD: 3. SHOULD This word, or the adjective "RECOMMENDED", mean that there may exist valid reasons in particular circumstances to ignore a particular item, but the full implications must be understood and carefully weighed before choosing a different course. I tend to think of SHOULD informally as a “MUST… UNLESS” pair. Regarding your point that the extension is optional, it’s my position that in the case of a specification for an optional extension, MUST means “if you choose to practice this extension to the protocol, i.e. if the extension is both implemented and enabled by configuration, then you MUST”. If you still feel uncertain about this, we can dig into it case-by-case and discuss each occurrence, but possibly the context above will help? (Note that I am not the only reviewer who’s likely to be triggered by unqualified use of SHOULD…) > An implementation MUST NOT wait for BFD session establishment in Init > state unless OSPF BFD strict-mode is enabled on the interface and the > @@ -268,6 +311,12 @@ > BFD sessions. Disabling BFD would result in the BFD session being > brought down due to Admin reason [RFC5882] and hence would not bring > down the OSPF adjacency. > + > +jgs: Regarding the last sentence above, suppose the router is configured > +as you permit in Section 6, such that strict mode is required in order > +to establish an adjacency. Would it then be appropriate to bring > +down the adjacency if the B-bit is cleared? If the B-bit is cleared and > +the BFD session moves to admin down? > > KT> No. The OSPF adjacency would not be brought down. The checking for B-bit and BFD session UP dependency check is only while in the INIT state. I’m going to defer this until we settle on what exactly the “local configuration option” text is trying to say (the discussion at the beginning of this note). Thanks, —John
- [Lsr] AD review of draft-ietf-lsr-ospf-bfd-strict… John Scudder
- Re: [Lsr] AD review of draft-ietf-lsr-ospf-bfd-st… Ketan Talaulikar
- Re: [Lsr] AD review of draft-ietf-lsr-ospf-bfd-st… John Scudder
- Re: [Lsr] AD review of draft-ietf-lsr-ospf-bfd-st… Ketan Talaulikar
- Re: [Lsr] AD review of draft-ietf-lsr-ospf-bfd-st… John Scudder
- Re: [Lsr] AD review of draft-ietf-lsr-ospf-bfd-st… Ketan Talaulikar
- Re: [Lsr] AD review of draft-ietf-lsr-ospf-bfd-st… John Scudder
- Re: [Lsr] AD review of draft-ietf-lsr-ospf-bfd-st… Ketan Talaulikar