Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-ospf-mpls-elc-13: (with DISCUSS and COMMENT)

Peter Psenak <ppsenak@cisco.com> Thu, 21 May 2020 10:16 UTC

Return-Path: <ppsenak@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 231E63A0B9E; Thu, 21 May 2020 03:16:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.601
X-Spam-Level:
X-Spam-Status: No, score=-9.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cgAu4FYEuG1J; Thu, 21 May 2020 03:16:49 -0700 (PDT)
Received: from aer-iport-1.cisco.com (aer-iport-1.cisco.com [173.38.203.51]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 49DBF3A0B9C; Thu, 21 May 2020 03:16:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6198; q=dns/txt; s=iport; t=1590056208; x=1591265808; h=subject:to:cc:references:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=RpD3trOwcFGnfi3gXy/U93KAbybzR/i3XRyDJXkr760=; b=B+dbz4aAdcBjEw7aXHd6xK5uqj+Q+N+Qx5Z9RUS3Ndo2qfK3iHOL6lCb fT7OsqF8PJJnVrcMRDuzEhVZqlaOnJ0UMuPdG/jsye6Y0cgbLVUYXPtiP C6BRVX9KWD0+5CzYMMKVVlf1ObFbDLRuiIKUWCEihqj3kz81amZ1sHRwU 0=;
X-IronPort-AV: E=Sophos;i="5.73,417,1583193600"; d="scan'208";a="26408253"
Received: from aer-iport-nat.cisco.com (HELO aer-core-2.cisco.com) ([173.38.203.22]) by aer-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 21 May 2020 10:16:46 +0000
Received: from [10.60.140.51] (ams-ppsenak-nitro2.cisco.com [10.60.140.51]) by aer-core-2.cisco.com (8.15.2/8.15.2) with ESMTP id 04LAGiTY011668; Thu, 21 May 2020 10:16:46 GMT
To: Benjamin Kaduk <kaduk@mit.edu>, The IESG <iesg@ietf.org>
Cc: draft-ietf-ospf-mpls-elc@ietf.org, lsr-chairs@ietf.org, lsr@ietf.org, Acee Lindem <acee@cisco.com>, aretana.ietf@gmail.com
References: <158992822966.6522.4643872233017159559@ietfa.amsl.com>
From: Peter Psenak <ppsenak@cisco.com>
Message-ID: <a52346b5-8e2c-3ef0-b6c8-c3ef041fa223@cisco.com>
Date: Thu, 21 May 2020 12:16:44 +0200
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.7.0
MIME-Version: 1.0
In-Reply-To: <158992822966.6522.4643872233017159559@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Outbound-SMTP-Client: 10.60.140.51, ams-ppsenak-nitro2.cisco.com
X-Outbound-Node: aer-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/inUmrrodCozSEgTXQ1Hja3oOYhw>
Subject: Re: [Lsr] Benjamin Kaduk's Discuss on draft-ietf-ospf-mpls-elc-13: (with DISCUSS and COMMENT)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 May 2020 10:16:52 -0000

Hi Benjamin,

thanks for review.

Please see inline (##PP) two responses to OSPF specific comments.


On 20/05/2020 00:43, Benjamin Kaduk via Datatracker wrote:
> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-ospf-mpls-elc-13: Discuss
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-ospf-mpls-elc/
> 
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> I have a question about the scope of some normative language, which may
> or may not be problematic but I'm too ignorant of OSPF details to be
> able to answer myself.  In Section 3 we say that:
> 
>     When an OSPF Area Border Router (ABR) distributes information between
>     connected areas it MUST preserve the ELC setting.
> 
> My undesrtanding is that it's normal operation for an ABR to
> distribution information about prefixes and such between areas, and in
> particular that an ABR does not necessarily need to know the semantic
> details of every bit of information being distributed in that fashion.
> So, I am imagining a scenario where some routers in both areas
> advertise/understand the ELC flag but the ABR between them does not
> implement this spec.  What would happen in such a scenario?  If the ABR
> is still expected to distribute the ELC setting without change, isn't
> that just a core requirement from the respective OSPF specs, as opposed
> to a new requirement imposed by this spec (which, in this scenario, the
> ABR is not claiming to adhere to anyway)?
> 
> There is perhaps a similar question about the ASBR guidance, though when
> doing cross-protocol signalling there is a more clear need for the ASBR
> to understand the semantics of the flags it is redistributing (and it's
> only a "SHOULD").
> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> Section 1
> 
> The abstract is pretty explicit that "this draft defines" both ELC and
> ERLD signaling capabilities, but this section only has a clear statement
> for the ELC.  Should we put something at the end of the last paragraph
> about "this document defines a mechanism to signal the ERLD using OSPFv2
> and OSPFv3"?

##PP
this has been already addressed based on previous comments. Latest text 
is as follows:

"Multiprotocol Label Switching (MPLS) has defined a mechanism to 
load-balance traffic flows using Entropy Labels (EL). An ingress Label
Switching Router (LSR) cannot insert ELs for packets going into a given 
Label Switched Path (LSP) unless an egress LSR has indicated via 
signaling that it has the capability to process ELs, referred to as the 
Entropy Label Capability (ELC), on that LSP. In addition, it would be 
useful for ingress LSRs to know each LSR's capability for reading the 
maximum label stack depth and performing EL-based load-balancing, 
referred to as Entropy Readable Label Depth (ERLD). This document 
defines a mechanism to signal these two capabilities using OSPFv2 and 
OSPFv3 and BGP-LS."
> 
>     In cases where LSPs are used (e.g., SR-MPLS [RFC8660], it would be
> 
> side note(?): I don't know that SR-MPLS is so popular so as to be
> privileged as the only example given for LSP usage.  If we instead
> talked about using IGPs to signal labels, this selection would seem less
> surprising to me.
> 
> Section 3
> 
>     If the router supports ELs on all of its interfaces, it SHOULD
>     advertise the ELC with every local host prefix it advertises in OSPF.
> 
> Do we want to say anything about (not) advertising the ELC for other
> prefixes?
> 
> Section 7
> 
> Should we say anything about considerations for redistributing ELC/ERLD
> information at the ASBR with respect to exposing "internal information"
> to external parties?
> 
>     This document specifies the ability to advertise additional node
>     capabilities using OSPF and BGP-LS.  As such, the security
>     considerations as described in [RFC5340], [RFC7770], [RFC7752],
>     [RFC7684], [RFC8476], [RFC8662],
> 
> RFC 8662's security considerations have a pretty hard dependency on RFC
> 6790's security considerations; it might be worth mentioning 6790
> directly in this list as well.
> 
>     [I-D.ietf-idr-bgp-ls-segment-routing-ext] and
>     [I-D.ietf-idr-bgp-ls-segment-routing-msd] are applicable to this
>     document.
> 
> Could we also have a brief note that the (respective) OSPF security
> mechanisms serve to protect the ELC/ERLD information?
> 
>     Incorrectly setting the E flag during origination, propagation or
>     redistribution may lead to black-holing of the traffic on the egress
>     node.
> 
> This is what happens when the E flag should not be set but is
> erroneously set.  Should we also say what happens if we should set the E
> flag but erroneously clear it (e.g., that poor or no load-balancing may
> occur)?
> 
> Section 8
> 
> I do see the note in the shepherd writeup about the sixth author (thank
> you!); if we're already breaking through the 5-author limit, did we
> consider making those who "should be considered as co-authors" listed as
> co-authors?
> 
> Section 10.2
> 
> It's slightly surprising to see the core OSPF protocols only listed as
> informative, but I can see how they are to be considered "basic
> specifications" in the vein of
> https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/

##PP
right, I can add it as normative, or remove completely, or keep as 
informative. Whatever you like :)

thanks,
Peter


> 
> 
> 
> 
>