Re: [Lsr] RFC8401 - Question on BIER TLV leaking from one level to the other

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Thu, 16 January 2020 17:10 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 921101200F9; Thu, 16 Jan 2020 09:10:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.499
X-Spam-Level:
X-Spam-Status: No, score=-14.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=l0CeqaDK; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=gyblmA3Q
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IbRW_EacksDT; Thu, 16 Jan 2020 09:10:01 -0800 (PST)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F5611208A2; Thu, 16 Jan 2020 09:10:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=63346; q=dns/txt; s=iport; t=1579194601; x=1580404201; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=rV837QSE1atfqcYbUOHZ6EapbcjoGu1rSYwsA981rn4=; b=l0CeqaDKpFt3z8TDnKnVBtLxZ7/cyVM92iLbvMaQDdq9uzEIgO1Ttkig SofOA87fNE2sXhGwJkPBcDKveKCcS0cUkXY0hPMVUH93x/8Vawg4qY1LJ w4Zk2qCzmn9m7kIb1fuDk08OuLrDT7fGKvtrI9wyswXWw9STGOm104zrv c=;
IronPort-PHdr: 9a23:XQZo6xXS/U9BDP8TaPvnaw9fxtnV8LGuZFwc94YnhrRSc6+q45XlOgnF6O5wiEPSA9yJ8OpK3uzRta2oGXcN55qMqjgjSNRNTFdE7KdehAk8GIiAAEz/IuTtank1HcJZXlJ/8FmwMFNeH4D1YFiB6nA=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DnAACalyBe/4YNJK1bAQkbAQEBAQEBAQUBAQERAQEDAwEBAYFqAwEBAQsBgSQvUAVsWCAECyqEEINGA4p6gl+JYI4ugUKBEANUCQEBAQwBASMKAgEBgSuDFQIXgWskNwYOAgMNAQEEAQEBAgEFBG2FNwyFXgEBAQQSEQoTAQElEgEPAgEIEQQBASEBBgMCAgIfERQJCAIEAQ0FCBqDBYF9TQMuAQ6hKAKBOYhhdYEygn8BAQWFKw0Lgg0DBoE2AYwbGoFBP4EQAUeCHi4+gQSBF0kBAQIBgS0BBwEKAQcaFQ8HCYJaMoIsjnKBYYVciXGObEQKgjmHPYVDhCcGW4RDgkeIBJAlhEOKGYhggiGQAwIEAgQFAg4BAQWBaCMqPXFwFYMnCUcYDYgBDBeDUIUUhT90AgEBgSWKEYIyAQE
X-IronPort-AV: E=Sophos;i="5.70,326,1574121600"; d="scan'208,217";a="417013213"
Received: from alln-core-12.cisco.com ([173.36.13.134]) by alln-iport-8.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 16 Jan 2020 17:09:58 +0000
Received: from XCH-ALN-007.cisco.com (xch-aln-007.cisco.com [173.36.7.17]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 00GH9w35025802 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 16 Jan 2020 17:09:58 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-ALN-007.cisco.com (173.36.7.17) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 16 Jan 2020 11:09:58 -0600
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 16 Jan 2020 11:09:57 -0600
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 16 Jan 2020 11:09:57 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=etoEJip942XmHp34hxxGqHDETtBFjkQJucY6xqxMq9GBc3DFzU4bIAYeWtZzFdBcGCYeHShnl+VL0qYHaoMd1W4WUE1Gm/KYvewXn8Sjeace7h58JzJUhsOS/amI2ZzzhHgP5wira7OOZH1M4X0o3DwotZrupCjy1V7kbXIFo2Fh1ANuUZJfHuGgg8AdtKrsUaYvMt++k06kzuehodrl1os/FnjvS8VLbKcN31DunKEczqbMmUhxyiD6V8ESbR2+YaUD7UulH4BoWBRqWRHlhcKCD5fLtpzptsbwhXx2NgUwPSLGWGClrIi5G5jO/RP2c4ri4dCYxmr8E0mVMDCtxQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rV837QSE1atfqcYbUOHZ6EapbcjoGu1rSYwsA981rn4=; b=bsLQ7D0m1kTmJg/kYpW/bLtRWW2X0J71vjL09y0N391dJuuj/gLz8W+PBjdJHx2aegQ4Ylq5TtV29FMqsRqj8PmvXCCcOquvUK8/TRuU5CF3mvAo2fLXrHq4k5MMPIG1fFJBfYGfMz2kFAdkfJtwAvYjXjsq2SC+tBmpb9UHOqIgiaiWWzn3HVOjdewhvL9tKOMUHD+VsFOdXTkjdgUsFsZlIbyIVNlf8w67x+cpQ06weZrYC2b7b2y2IBzl3dtPtGxuCL1xYrWXJoZRFCi2af5gK0ibTWTXa0zACzf/tt3MwoOaUedWMSbKh5TbfHRAnAsV+5f9eCWOitEOYWX4Vw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rV837QSE1atfqcYbUOHZ6EapbcjoGu1rSYwsA981rn4=; b=gyblmA3QZ3dynuij6ZGsvuPVv2CyYkNj+hYAdNgI4Q4V5l58d9QeHq9Y8ivlSn0LjPbcX47kcTZAXxqX3Kt2p6UN0TsdU+3BpVy8qtSycEmhKqjdWtboCidCLjDlymzncD9qCn76cYHu1JaqCgv+i+AWMkU7/HHKcYgbVFzJ+b8=
Received: from MWHPR11MB1616.namprd11.prod.outlook.com (10.172.54.148) by MWHPR11MB1885.namprd11.prod.outlook.com (10.175.54.136) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2644.19; Thu, 16 Jan 2020 17:09:55 +0000
Received: from MWHPR11MB1616.namprd11.prod.outlook.com ([fe80::8590:79e7:31a8:3e14]) by MWHPR11MB1616.namprd11.prod.outlook.com ([fe80::8590:79e7:31a8:3e14%8]) with mapi id 15.20.2623.018; Thu, 16 Jan 2020 17:09:55 +0000
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: "Xiejingrong (Jingrong)" <xiejingrong@huawei.com>, Senthil Dhanaraj <senthil.dhanaraj.ietf@gmail.com>
CC: dongjiajia <dongjiajia@huawei.com>, BIER WG <bier@ietf.org>, Liangyanrong <liangyanrong@huawei.com>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: RFC8401 - Question on BIER TLV leaking from one level to the other
Thread-Index: AQHU8W22VuGKC2ubU0CKFoF/QhHX9Kfs/sHQgACheaCAAR6+AIAAFaNwgABl7iA=
Date: Thu, 16 Jan 2020 17:09:55 +0000
Message-ID: <MWHPR11MB16161FD81E89FD1537C0025FC1360@MWHPR11MB1616.namprd11.prod.outlook.com>
References: <CAG9=0b+Xhunb45=1mxfCS1preLWrWAj4YvCpqDv1L8b_Ai=G2w@mail.gmail.com> <BYAPR11MB3638B02015E08711E64A1470C1280@BYAPR11MB3638.namprd11.prod.outlook.com> <e671f824cbad4318a66cce00160917ce@huawei.com> <MWHPR11MB16169BDE370EEA49036AAFD0C1370@MWHPR11MB1616.namprd11.prod.outlook.com> <6cd26cb68752405eab3c3ba0f769fe9e@huawei.com> <1f05772ebdfc41d8ac5ee1bda159d518@huawei.com>
In-Reply-To: <1f05772ebdfc41d8ac5ee1bda159d518@huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ginsberg@cisco.com;
x-originating-ip: [2001:420:c0cc:1002::516]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 9abac2f3-a33e-4683-dfa0-08d79aa6e8e9
x-ms-traffictypediagnostic: MWHPR11MB1885:
x-microsoft-antispam-prvs: <MWHPR11MB1885A19F69DE2D5A27F833D5C1360@MWHPR11MB1885.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02843AA9E0
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(366004)(346002)(39860400002)(376002)(396003)(189003)(199004)(66946007)(66556008)(66446008)(64756008)(66476007)(76116006)(478600001)(966005)(6506007)(52536014)(7696005)(81156014)(33656002)(71200400001)(110136005)(54906003)(5660300002)(186003)(81166006)(53546011)(2906002)(66574012)(8936002)(316002)(9686003)(55016002)(4326008)(8676002)(86362001); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR11MB1885; H:MWHPR11MB1616.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 4XjLyR0mLn1HQIcXNc9SGrcVdG1r9G83FtDYKqX/zB26SLCs+gQfbzBgaOjkcqhs0XKjAUHcPvP7k+soq8ao9N6y9Rba48e9qVFjbg+F2fRFL4EMCM4QOXD5SttNIwnCFyEswwJJXJDZux4tFjyuoC8BtVJhgoWm3ijweXSE24yMIPkxrrVxOPx1IIl/3NvRovibiwxsgxtzDjF6C1tiVawnxEnarOQ6dY6x6n9MwadbSkJkeXu2HEZDcaBfEw/VUGTQCaLTUhpj6TcSiADJNgFbgqq2Y24CnsRl1zv9THrY2hoQy34ZrBcR+GDkOO8Xqqcw/g2/BuBBmv0Gd61qd6PE2+N8nJtmg4/NtkjsMCex0UZXlWAkAf8d18EiwBOzXS7jLjzTBxjcMYdv1Lp4Tpa35QBTUCVjI1FBOHaGzyRliDSyu1kl2bcS02WFfbxOLs0+M1oZGtNvVHhfb8BxfOWANAqm4fg+x89joK1HLcE=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MWHPR11MB16161FD81E89FD1537C0025FC1360MWHPR11MB1616namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 9abac2f3-a33e-4683-dfa0-08d79aa6e8e9
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Jan 2020 17:09:55.8314 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: +unTSx0HrVjgWwV9tDW5EHTmgrKRzNAGmG+MXSg55NwFlR1WOWLRzDHvs3ZZI5iC1c7HsZAqG35xRT/KOcrMpQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB1885
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.17, xch-aln-007.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/kWy4N9VVsgsU88DLGeH5m-vjLvo>
Subject: Re: [Lsr] RFC8401 - Question on BIER TLV leaking from one level to the other
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jan 2020 17:10:07 -0000

Jingrong –

Behavior of the N-flag is not BIER specific – so referencing RFC 8401 is not relevant here.

RFC 7794 clearly states that settings in Prefix Attributes sub-TLV take precedence over settings in Prefix-SID sub-TLV when both are present.
The use of source Router ID does not change depending on which of the other sub-TLVs are present/not present i.e., it is the only way of preserving the ID of the originator of the advertisement when the prefix is leaked into another level.

  Les

From: Xiejingrong (Jingrong) <xiejingrong@huawei.com>
Sent: Thursday, January 16, 2020 2:58 AM
To: Les Ginsberg (ginsberg) <ginsberg@cisco.com>; Senthil Dhanaraj <senthil.dhanaraj.ietf@gmail.com>
Cc: dongjiajia <dongjiajia@huawei.com>; BIER WG <bier@ietf.org>; Liangyanrong <liangyanrong@huawei.com>; lsr@ietf.org
Subject: RE: RFC8401 - Question on BIER TLV leaking from one level to the other

Hi
Sorry, I added the LSR but removed the question I was hesitating about. Take back now:
https://tools.ietf.org/html/rfc8667#section-2.1.1.2
   The N-Flag is used in order to define a Node-SID.  A router MAY set
   the N-Flag only if all of the following conditions are met:

      The prefix to which the Prefix-SID is attached is local to the
      router (i.e., the prefix is configured on one of the local
      interfaces, e.g., a 'stable transport' loopback).

      The prefix to which the Prefix-SID is attached has a Prefix length
      of either /32 (IPv4) or /128 (IPv6).

   The Prefix Attribute Flags sub-TLV [RFC7794<https://tools.ietf.org/html/rfc7794>] also defines the N-Flag
   and R-Flag and with the same semantics of the equivalent flags
   defined in this document.  Whenever the Prefix Attribute Flags sub-
   TLV is present for a given prefix, the values of the N-Flag and
   R-Flag advertised in that sub-TLV MUST be used, and the values in a
   corresponding Prefix-SID sub-TLV (if present) MUST be ignored.

So the question is that,
When RFC8667 is deployed without using the Prefix Attribute Flags sub-TLV [RFC7794], the N-flag in Prefix-SID sub-TLV[RFC8667] may work fine.
When RFC8667 is deployed with the 8401 and 7794, the N-flag in Prefix-SID sub-TLV[RFC8667] MUST be ignored, but the N-flag in Prefix Attribute Flags sub-TLV[RFC7794] may not provide the same value as Prefix-SID sub-TLV N-flag.
Then a the source Router ID sub-TLV have to be added in ?

Thanks
Jingrong


From: Lsr [mailto:lsr-bounces@ietf.org] On Behalf Of Xiejingrong (Jingrong)
Sent: Thursday, January 16, 2020 5:54 PM
To: Les Ginsberg (ginsberg) <ginsberg@cisco.com<mailto:ginsberg@cisco.com>>; Senthil Dhanaraj <senthil.dhanaraj.ietf@gmail.com<mailto:senthil.dhanaraj.ietf@gmail.com>>; Antoni Przygienda <prz@juniper.net<mailto:prz@juniper.net>>; aldrin.ietf@gmail.com<mailto:aldrin.ietf@gmail.com>; Jeffrey (Zhaohui) Zhang <zzhang@juniper.net<mailto:zzhang@juniper.net>>
Cc: dongjiajia <dongjiajia@huawei.com<mailto:dongjiajia@huawei.com>>; BIER WG <bier@ietf.org<mailto:bier@ietf.org>>; Liangyanrong <liangyanrong@huawei.com<mailto:liangyanrong@huawei.com>>; lsr@ietf.org<mailto:lsr@ietf.org>
Subject: Re: [Lsr] RFC8401 - Question on BIER TLV leaking from one level to the other

Hi Les,
Thanks for the clarification.
Would expect the Errata from Senthil as well.

Jingrong

From: Les Ginsberg (ginsberg) [mailto:ginsberg@cisco.com]
Sent: Thursday, January 16, 2020 12:41 AM
To: Xiejingrong (Jingrong) <xiejingrong@huawei.com<mailto:xiejingrong@huawei.com>>; Senthil Dhanaraj <senthil.dhanaraj.ietf@gmail.com<mailto:senthil.dhanaraj.ietf@gmail.com>>; Antoni Przygienda <prz@juniper.net<mailto:prz@juniper.net>>; aldrin.ietf@gmail.com<mailto:aldrin.ietf@gmail.com>; Jeffrey (Zhaohui) Zhang <zzhang@juniper.net<mailto:zzhang@juniper.net>>
Cc: BIER WG <bier@ietf.org<mailto:bier@ietf.org>>; Liangyanrong <liangyanrong@huawei.com<mailto:liangyanrong@huawei.com>>; dongjiajia <dongjiajia@huawei.com<mailto:dongjiajia@huawei.com>>
Subject: RE: RFC8401 - Question on BIER TLV leaking from one level to the other

Jingrong –

I had to look at this twice because of the long interval since the last email on this thread.
Inline.

From: Xiejingrong (Jingrong) <xiejingrong@huawei.com<mailto:xiejingrong@huawei.com>>
Sent: Tuesday, January 14, 2020 11:15 PM
To: Les Ginsberg (ginsberg) <ginsberg@cisco.com<mailto:ginsberg@cisco.com>>; Senthil Dhanaraj <senthil.dhanaraj.ietf@gmail.com<mailto:senthil.dhanaraj.ietf@gmail.com>>; Antoni Przygienda <prz@juniper.net<mailto:prz@juniper.net>>; aldrin.ietf@gmail.com<mailto:aldrin.ietf@gmail.com>; Jeffrey (Zhaohui) Zhang <zzhang@juniper.net<mailto:zzhang@juniper.net>>
Cc: BIER WG <bier@ietf.org<mailto:bier@ietf.org>>; Liangyanrong <liangyanrong@huawei.com<mailto:liangyanrong@huawei.com>>; dongjiajia <dongjiajia@huawei.com<mailto:dongjiajia@huawei.com>>
Subject: RE: RFC8401 - Question on BIER TLV leaking from one level to the other

Hi Les,
Thank you very much for the clarification.
I am curious if the text about N flag also need to change when BIER TLV is leaking from one level to another.
RFC7794 says in section 2.1 about N-flag: “Set when the prefix identifies the advertising router”.

[Les:] RFC7794 also says:

“The flag  MUST be preserved when leaked between levels.”

The identity of the originating router can be obtained from the source Router ID sub-TLV defined in https://tools.ietf.org/html/rfc7794#section-2.2

In the case when a BIER TLV (prefix=Prefix-ABR) is leaking by an ABR router from Level-1 to Level-2, the advertising router is ABR and the prefix is Prefix-ABR(a prefix bound to a Level-1 interface of ABR), so the N-flag need to be set.
In the case when a BIER TLV (prefix=Prefix-A) is leaking by an ABR router from Level-1  to Level-2, the advertising router is ABR but the prefix is Prefix-A(a prefix bound to a interface of router-A), so the N-flag need to be cleared.
Is the understanding correct ?
Would anyone please raise an Errata about this defect in the RFC ? I can also do that if needed.

[Les:] To be sure we are on the same page, the only Errata is the one mentioned below regarding the R flag. There is no issue regarding the N flag.
I believe Senthil indicated he would create an Errata for that but it appears that this never happened.

   Les

Best regards,
Jingrong

From: BIER [mailto:bier-bounces@ietf.org] On Behalf Of Les Ginsberg (ginsberg)
Sent: Saturday, April 13, 2019 4:24 AM
To: Senthil Dhanaraj <senthil.dhanaraj.ietf@gmail.com<mailto:senthil.dhanaraj.ietf@gmail.com>>; Antoni Przygienda <prz@juniper.net<mailto:prz@juniper.net>>; aldrin.ietf@gmail.com<mailto:aldrin.ietf@gmail.com>; Jeffrey (Zhaohui) Zhang <zzhang@juniper.net<mailto:zzhang@juniper.net>>
Cc: BIER WG <bier@ietf.org<mailto:bier@ietf.org>>
Subject: Re: [Bier] RFC8401 - Question on BIER TLV leaking from one level to the other

Senthil –

There is no such thing as a “BIER-ISIS extension TLV”.
There is only the “BIER Info” sub-TLV(sic) which is carried in a Prefix Reachability TLV (one of TLVs 135, 235, 236, and 237).
Therefore the Prefix-Attribute sub-TLV can and should be present in such a TLV as well.

See https://tools.ietf.org/html/rfc8401#section-4.2

The only minor issue here is that the RFC says:

o  When the Prefix Attributes Flags sub-TLV [RFC7794] is present, the
      N flag MUST be set and the R flag MUST NOT be set.

In cases where the prefix is leaked the R flag will be set. The text is a holdover from early versions where we had prohibited leaking.
In cases where the prefix is leaked the R flag will be set.

I suppose this deserves an Errata.
I thought this issue had been discussed and addressed – but I couldn’t find any relevant email and clearly the published text has a flaw.
Sigh…

    Les


From: Senthil Dhanaraj <senthil.dhanaraj.ietf@gmail.com<mailto:senthil.dhanaraj.ietf@gmail.com>>
Sent: Thursday, April 11, 2019 11:03 PM
To: Les Ginsberg (ginsberg) <ginsberg@cisco.com<mailto:ginsberg@cisco.com>>; Antoni Przygienda <prz@juniper.net<mailto:prz@juniper.net>>; aldrin.ietf@gmail.com<mailto:aldrin.ietf@gmail.com>; Jeffrey (Zhaohui) Zhang <zzhang@juniper.net<mailto:zzhang@juniper.net>>
Cc: BIER WG <bier@ietf.org<mailto:bier@ietf.org>>
Subject: RFC8401 - Question on BIER TLV leaking from one level to the other

Hi Authors,

When ABR leaks the Prefix (& BIER TLVs) from one level to another, the LSP contains both the ABR's local prefix and the other prefix'es which are re-advertised from one level to the other.
Nodes receiving such an LSP should be able to identify the Prefix (& BIER TLV) that is originally local to the ABR from the other inter (re-advertised) prefix'es.

Unlike SR-ISIS extensions TLV, BIER-ISIS extension TLVs do not have N/R flags.

Hence the only way to identify the prefix type (local or re-advertised) is by having the ABR advertise the "IPv4/IPv6 Extended Reachability Attribute Flags sub-TLV - RFC7794" whenever it leaks the BIER TLVs from one level to another. Is my understanding correct?

Ref from - RFC 7794 - 2.1<https://tools.ietf.org/html/rfc7794#section-2.1>. IPv4/IPv6 Extended Reachability Attribute Flags


       0 1 2 3 4 5 6 7...

      +-+-+-+-+-+-+-+-+...

      |X|R|N|          ...

      +-+-+-+-+-+-+-+-+...


   R-Flag:  Re-advertisement Flag (Bit 1)

      Set when the prefix has been leaked from one level to another

      (upwards or downwards).

Thanks,
Senthil