Re: [Lsr] Martin Duke's Discuss on draft-ietf-lsr-ospf-reverse-metric-08: (with DISCUSS and COMMENT)

Alvaro Retana <aretana.ietf@gmail.com> Thu, 06 October 2022 11:12 UTC

Return-Path: <aretana.ietf@gmail.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2D48C14CE39; Thu, 6 Oct 2022 04:12:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.109
X-Spam-Level:
X-Spam-Status: No, score=-7.109 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 02uDSvbBWvoP; Thu, 6 Oct 2022 04:12:46 -0700 (PDT)
Received: from mail-pf1-x42a.google.com (mail-pf1-x42a.google.com [IPv6:2607:f8b0:4864:20::42a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B789C14CE36; Thu, 6 Oct 2022 04:12:46 -0700 (PDT)
Received: by mail-pf1-x42a.google.com with SMTP id w191so1738949pfc.5; Thu, 06 Oct 2022 04:12:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date :mime-version:references:in-reply-to:from:from:to:cc:subject:date; bh=2RrK3vdQX0ceciW5AP3WdvQz76kZDoHctf+HtUcAds0=; b=f1/Cg2g7vXVO9WgHqIIemEFvJCoDiFoqESCudEJOSBzDf7DhYBE0w7DKXCWD1t/FK7 Mfpb93B35rljawvZ8dkrmbF/3qFBZiqZ7xDvWBsQFA2koh0HqAcuQqbpXtGXLKtIN806 9kLOlrZhn4GpXGGpchH4CplkeSHzStO9a3EMWGT27377JBUmd41DcJctJG0P+0qCkeCf OiGhE00rrbHh22ShpRQ+Kt8o3lJFJAnTM/Z9F8vH6Ol/+uSUP222wJMVZOeikdrI6Iiz 4uFZsnvB2U7viPYfWgRgAOBJZJS1ilLDPEcC5TRpF0fFabJZk9sdtIXSpOHOLWpeC1su UNvA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date :mime-version:references:in-reply-to:from:x-gm-message-state:from:to :cc:subject:date; bh=2RrK3vdQX0ceciW5AP3WdvQz76kZDoHctf+HtUcAds0=; b=GftkR4YmoiZtR1EINyP4YnQdv7vNi1/A6A/YrlOA+cinvgT6y1QMaF9yHQtoUwFfYU lNt13RwUUEJpX/YT7zW9af9y89Z54QTECxYq3n4guVYaVqw21w49svqToirj+utSJRu6 TDneOyOfTagfFIvVkBcNXA3caA5l5KdDQK33c7KK3FJeqF+1w1mwvEn/Iz56nnr6CIWI zTCD4ReS65ASbcu6DKSDKqW0BatkFhpv80+RAEwGXMHfKUCM5tJ13IOJrhwUDIcoJ36b eVhnqu+BoolrhbQA4Qdt/pnBI5n/RzqUPHp6cRgnju+a4DEhu74JOLUvKAv3dOLb7yhd Eodw==
X-Gm-Message-State: ACrzQf3BReAAvANFkSh2+vuKwXX4uzU5fYjDBPQz2Cxlw+z0dXWOspoj a1lDr/bsblYBqSUvjd4N12ybNS6aZtyNzT2PyxQ=
X-Google-Smtp-Source: AMsMyM4+1RZV8HuJfnbhT6GnuWUoBhaf+KbweIw0mCce9zD+SHt4OkRslZbXgg7n7ryFcMz+B+FbbmTS2Tw/2ER3ZjU=
X-Received: by 2002:a63:6c01:0:b0:429:ea6e:486d with SMTP id h1-20020a636c01000000b00429ea6e486dmr4001546pgc.247.1665054765969; Thu, 06 Oct 2022 04:12:45 -0700 (PDT)
Received: from 1058052472880 named unknown by gmailapi.google.com with HTTPREST; Thu, 6 Oct 2022 04:12:44 -0700
From: Alvaro Retana <aretana.ietf@gmail.com>
In-Reply-To: <CAH6gdPzH1PLD_-1B+twSQ_2xLeiY4e9o0UK2JBHo2vy0XM2rzQ@mail.gmail.com>
References: <166501601066.34369.9310407245793819522@ietfa.amsl.com> <CAH6gdPzH1PLD_-1B+twSQ_2xLeiY4e9o0UK2JBHo2vy0XM2rzQ@mail.gmail.com>
MIME-Version: 1.0
Date: Thu, 06 Oct 2022 04:12:44 -0700
Message-ID: <CAMMESszNu6sbM_5DXwM8=1jzpLaiTNFU-yEob4Qm9LKwKttfdg@mail.gmail.com>
To: Martin Duke <martin.h.duke@gmail.com>, Ketan Talaulikar <ketant.ietf@gmail.com>
Cc: lsr@ietf.org, chopps@chopps.org, acee@cisco.com, lsr-chairs@ietf.org, The IESG <iesg@ietf.org>, draft-ietf-lsr-ospf-reverse-metric@ietf.org
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/YOA0hrNA12MX3v-kxBX5IkBQfNo>
Subject: Re: [Lsr] Martin Duke's Discuss on draft-ietf-lsr-ospf-reverse-metric-08: (with DISCUSS and COMMENT)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Oct 2022 11:12:51 -0000

On October 6, 2022 at 5:44:57 AM, Ketan Talaulikar wrote:


Ketan:

Hi!


...
> KT> Added text in the security considerations that cover this issue as well
> as a proposed mitigation. Please let us know if that works.

This is the text that you added:

   A router that is misbehaving or misconfigured, may end up signaling
   varying values of reserve metrics or toggle the state of reserve
   metric.  This can result in a neighbor router having to frequently
   update its Router LSA causing network churn and instability despite
   the LSA rate-limiting behavior in the OSPF protocol.  It is
   RECOMMENDED that implementations support the detection of frequent
   changes in reverse metric signaling and ignore the reserve metric
   (i.e., revert to using their provisioned metric value) during such
   conditions.


Monitoring the changes is the right mitigation.  But the description
of how it would be done is not specific -- for a normative
recommendation.

As I think about this, it occurs to me that even though the originator
of the RM is not sending an LSA, this is an "IGP event", as described
in rfc8405.  Receiving the RM should trigger an SPF and the updated
Router LSA should also trigger SPF events elsewhere.

   IGP event: The reception or origination of an IGP LSDB change
   requiring a new routing table computation.  Some examples are a
   topology change, a prefix change, and a metric change on a link or
   prefix.  Note that locally triggering a routing table computation is
   not considered an IGP event since other IGP routers are unaware of
   this occurrence.


The same back-off mechanism from rfc8405 should be required in this case.


Thanks!

Alvaro.