Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection"-draft-ietf-lsr-isis-flood-reflection-05

Tony Przygienda <tonysietf@gmail.com> Mon, 10 January 2022 19:36 UTC

Return-Path: <tonysietf@gmail.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9DB743A0EB4 for <lsr@ietfa.amsl.com>; Mon, 10 Jan 2022 11:36:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t8tVVDvTf0lQ for <lsr@ietfa.amsl.com>; Mon, 10 Jan 2022 11:36:20 -0800 (PST)
Received: from mail-io1-xd2f.google.com (mail-io1-xd2f.google.com [IPv6:2607:f8b0:4864:20::d2f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52A423A0E89 for <lsr@ietf.org>; Mon, 10 Jan 2022 11:36:20 -0800 (PST)
Received: by mail-io1-xd2f.google.com with SMTP id i14so19046123ioj.12 for <lsr@ietf.org>; Mon, 10 Jan 2022 11:36:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=XHQhgDnC5SaOvsAFNID61ZG2j2CIRCgqfQBq98lha+4=; b=JzAIMQiNTp8b3ot9OOaCfO0McbNCDmanQoUnv+e+BU6OLOzjuW1IQozMxo2zXGGQwf zyKujuVK5s4R8S3dvp2C9VXD3IX5CIU3CcwpKrUGNTBgSq8/el/rmc6gvJotFdRYgiSH ubD1uf4kdZF1ZnWSwFGiDvOLK0IY7Hk5TgSDdMEMw8StndjtnBFfGrjzNM7XdW8Wb5C7 LbpaBJlFPRaESw7RYTdX78IWdCKLIujKAdUa88pVPnIHzgCj/yLXBIcFPQXXDytg+e25 ypECn8YLid7RsFpSdA8yIGYT/CQjIbSVamyTJZo2dWxbzXdPoOV6f3tztRS55XeyO3nv iZRw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XHQhgDnC5SaOvsAFNID61ZG2j2CIRCgqfQBq98lha+4=; b=1BR2XLDq2mkQXJmhvg5XznKh+B35QbmktsPOxepnPcmpDOcXL0kRQsA6u2CmSaBVsf CZizDUefg2qAVbeo5TiihjuI0psclwEjygrTXgQIsCf+ZQcA4kfk35YszhfE1TVImqb1 QN6DRiVy0henKHQvNFf1b0eF0IzdO99HmdYhbstqp9LsFx1RB98bS9WPJseGCdHtTWi+ gm5S2O4S/Wm2KnbChGd0cVjjiGaK4CwOQQsaB+cSIAPrvkHt5/uQpM+zPaSmYf+a/RFr U4qgp6hQfKmmcezGOc7J8L26g7MWMVLVgJMCkskzGYGbswyJdcU+cGz7b2phjWL81hiv gyeQ==
X-Gm-Message-State: AOAM533I9kwqgHuJiUWpBrWl1w5A7WGrQBQ6VHW02ZpJJpweeYRS3iCw sr/k9ZrOSlvFVoeDDZqJP7yrEvAFU79R30dXnMfd1UOrHeg=
X-Google-Smtp-Source: ABdhPJz03z9X3oF7ksh74NWfzYPlIv71/8WUj5e5KjImulQmmEiL3v1HYRFHQVLo3hLqQMtYM+OMChifbzl8l7O05Us=
X-Received: by 2002:a02:a187:: with SMTP id n7mr762004jah.178.1641843378927; Mon, 10 Jan 2022 11:36:18 -0800 (PST)
MIME-Version: 1.0
References: <71B99595-5777-46E0-A6B9-32A6D83FE3E0@cisco.com> <5F0C96E5-6626-46C3-BBDB-52DA4BEB24E9@tsinghua.org.cn> <0966F70B-3549-42C1-8692-BF4CA70BA366@cisco.com>
In-Reply-To: <0966F70B-3549-42C1-8692-BF4CA70BA366@cisco.com>
From: Tony Przygienda <tonysietf@gmail.com>
Date: Mon, 10 Jan 2022 20:35:42 +0100
Message-ID: <CA+wi2hPBsj6rJY9WbyHZ2W4eEJ6DzsduWdY_AAYg3D1z_E4wqg@mail.gmail.com>
To: "Acee Lindem (acee)" <acee@cisco.com>
Cc: Aijun Wang <wangaijun@tsinghua.org.cn>, Christian Hopps <chopps@chopps.org>, "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, "lsr@ietf.org" <lsr@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000060bdde05d53f7344"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/lXFxXW71XNI4p1VH3-USWPRASXI>
Subject: Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection"-draft-ietf-lsr-isis-flood-reflection-05
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jan 2022 19:36:26 -0000

yes, first, if you abstract in _any_ way (except a full mesh for a single
metric) you will end up with suboptimal paths (compared to global, flat
topology view) traversing an abstracted subgraph and different ECMP
behavior in corner cases, it's basic graph theory (aggravated by hop-by-hop
or loose-source route forwarding planes) and is a well-known problem
encountered in any hierarchical network, be it IGP, seamless MPLS or even
BGP (look @ AIGP). FR deployed with underlying tunnels in L1 does not loop
and neither does it when deployed correctly with prefix leaking.

I cannot help it if a single person on this list is harboring fears,
preferences and doubts without hard technical arguments to make for a
meaningful discussion so I think it's time to put that repetitive
sub-thread aside.

As I said, I will be more than happy to help on a "deployment
considerations" or some such draft once those documents move up to
publication  so we have stable references to talk about ...

thanks

-- tony

On Mon, Jan 10, 2022 at 6:05 PM Acee Lindem (acee) <acee@cisco.com> wrote:

> I'll defer to Tony but my understanding is that there could be suboptimal
> paths if there are both Level-1 and Level-2 paths but not loops.
> Thanks,
> Acee
>
> On 1/10/22, 11:38 AM, "Aijun Wang" <wangaijun@tsinghua.org.cn> wrote:
>
>     But there are unsolved issues for this draft—— BGP has loop prevention
> mechanism, current flood reflection draft hasn’t, the operator must  design
> the topology/link metric  carefully to avoid the possible loop.
>
>     Aijun Wang
>     China Telecom
>
>     > On Jan 11, 2022, at 00:10, Acee Lindem (acee) <acee=
> 40cisco.com@dmarc.ietf.org> wrote:
>     >
>     > Speaking as a WG member, these documents are all "experimental" and,
> IMO, it would really stifle innovation to require a single experimental
> solution. We've never done that in the past. Also,  while all three
> solutions have the goal of reducing control plane overhead when using
> Level-1 areas as a transit, the flood reflection draft solves the problem
> with a different approach than the area proxy and TTZ drafts.  While the
> latter two focus on abstracting the transit area, the former also focusing
> on reducing the number of adjacencies and allows the reflector to be out of
> the data path (similar to the standardized and widely deployed BGP route
> reflection) I see no need to differentiate to stall advancement.
>     >
>     > Thanks,
>     > Acee
>     >
>     > On 1/3/22, 7:05 AM, "Christian Hopps" <chopps@chopps.org> wrote:
>     >
>     >
>     >    Tony Przygienda <tonysietf@gmail.com> writes:
>     >
>     >> One thing Les is missing here is that proxy & reflection present in
>     >> terms of deployment requirements and ultimate properties very
>     >> different engineering & operational trade-offs. Different customers
>     >> follow different philosophies here IME
>     >>
>     >> So we are not strictly standardizing here 2 solutions for the same
>     >> thing, we are standardizing two solutions that meet very different
>     >> deployment and operational requirements albeit from 20K feet view
> all
>     >> that stuff looks the same of course as any other thing does ...
>     >
>     >    Have we captured these "different deployment and operational
> requirements" anywhere? I think might be very useful...
>     >
>     >    Thanks,
>     >    Chris.
>     >    [as wg member]
>     >
>     >
>     >> -- tony
>     >>
>     >> On Tue, Dec 7, 2021 at 7:17 PM Les Ginsberg (ginsberg) <ginsberg=
>     >> 40cisco.com@dmarc.ietf.org> wrote:
>     >>
>     >>
>     >>    When I look at this request, I see it in a larger context.
>     >>
>     >>
>     >>
>     >>    There are two drafts which attempt to address the same problem in
>     >>    very different ways:
>     >>
>     >>
>     >>
>     >>    https://datatracker.ietf.org/doc/
>     >>    draft-ietf-lsr-isis-flood-reflection/
>     >>
>     >>
>     >>
>     >>    and
>     >>
>     >>
>     >>
>     >>    https://datatracker.ietf.org/doc/draft-ietf-lsr-isis-area-proxy/
>     >>
>     >>
>     >>
>     >>    Both of them discuss in their respective introductions the
>     >>    motivation – which is to address scaling issues in deployment
>     >>    scenarios where the existing IS-IS hierarchy is being asked to
>     >>    “stand on its head” i.e., interconnection between different L1
>     >>    areas is not to be achieved by utilizing an L2 backbone – rather
>     >>    it is the L1 areas themselves which are required to be used for
>     >>    interconnection of sites (e.g., two datacenters) and the scaling
>     >>    properties of the existing protocol hierarchy when used in this
>     >>    way are not attractive.
>     >>
>     >>
>     >>
>     >>    I find no technical basis on which to choose between the two
>     >>    proposed solutions – so in my mind a last call for
>     >>    “Flood-Reflection” presupposes a last call for “Area Proxy” – and
>     >>    therein lies my angst.
>     >>
>     >>    The end result will be that multiple incompatible solutions to
>     >>    the same problem will be defined. It will then be left to
>     >>    customers to try to determine which of the solutions seems best
>     >>    to them – which in turn will put the onus on vendors to support
>     >>    both solutions (depending on the set of customers each vendor
>     >>    supports).
>     >>
>     >>    This – to me – represents an utter failure of the standards
>     >>    process. We are reduced to a set of constituencies which never
>     >>    find common ground – the end result being sub-optimal for the
>     >>    industry as a whole.
>     >>
>     >>
>     >>
>     >>    It seems to me that the proper role of the WG is to address the
>     >>    big questions first:
>     >>
>     >>
>     >>
>     >>    1)Is this a problem which needs to be solved by link-state
>     >>    protocols?
>     >>
>     >>    We certainly have folks who are clever enough to define solutions
>     >>    – the two drafts are a proof of that.
>     >>
>     >>    But whether this is a wise use of the IGPs I think has never been
>     >>    fully discussed/answered.
>     >>
>     >>    Relevant to this point is past experience with virtual links in
>     >>    OSPF – use of which was problematic and which has largely fallen
>     >>    out of use.
>     >>
>     >>    Also, many datacenters use BGP (w or w/o IGP) and therefore have
>     >>    other ways to address such issues.
>     >>
>     >>    Although I am familiar with the “one protocol is simpler”
>     >>    argument, whether that justifies altering the IGPs in any of the
>     >>    proposed ways is still an important question to discuss.
>     >>
>     >>
>     >>
>     >>    2)If link state protocols do need to solve this problem, what is
>     >>    the preferred way to do that?
>     >>
>     >>    This requires meaningful dialogue and a willingness to engage on
>     >>    complex technical issues.
>     >>
>     >>
>     >>
>     >>    The alternative is to do what we seem to be doing – allowing
>     >>    multiple solutions to move forward largely without comment. In
>     >>    which case I see no basis on which to object – anyone who can
>     >>    demonstrate a deployment case should then be allowed to move a
>     >>    draft forward – and there are then no standardized solutions.
>     >>
>     >>    (The Experimental Track status for these drafts reflects that
>     >>    reality.)
>     >>
>     >>
>     >>
>     >>       Les
>     >>
>     >>
>     >>
>     >>    P.S.  (Aside: There is a third draft offering a solution in this
>     >>    space https://datatracker.ietf.org/doc/draft-ietf-lsr-isis-ttz/
>     >>     - but as that draft continues to promote its primary usage as a
>     >>    means of more easily changing area boundaries (merging/splitting)
>     >>    I have not discussed it here. However, if the authors of that
>     >>    draft claim it as a solution to the same problem space claimed by
>     >>    Area Proxy/Flood Reflection then the WG would have no basis but
>     >>    to also progress it – which would result in three solutions being
>     >>    advanced.)
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>
>     >>    From: Lsr <lsr-bounces@ietf.org> On Behalf Of Acee Lindem (acee)
>     >>    Sent: Monday, November 22, 2021 11:47 AM
>     >>    To: lsr@ietf.org
>     >>    Subject: [Lsr] WG Last Call fo "IS-IS Flood Reflection"
>     >>    -draft-ietf-lsr-isis-flood-reflection-05
>     >>
>     >>
>     >>
>     >>    This begins the WG Last for
>     >>    draft-ietf-lsr-isis-flood-reflection-05. Please post your support
>     >>    or objection to this list by 12:00 AM UTC on Dec 14^th , 2021.
>     >>    Also please post your comments on the draft. I’m allowing as
>     >>    extra week as I like to get some additional reviews – although my
>     >>    comments have been addressed.
>     >>
>     >>
>     >>
>     >>    Thanks,
>     >>    Acee
>     >>
>     >>
>     >>
>     >>    _______________________________________________
>     >>    Lsr mailing list
>     >>    Lsr@ietf.org
>     >>    https://www.ietf.org/mailman/listinfo/lsr
>     >>
>     >>
>     >>
>     >> _______________________________________________
>     >> Lsr mailing list
>     >> Lsr@ietf.org
>     >> https://www.ietf.org/mailman/listinfo/lsr
>     >
>     >
>     > _______________________________________________
>     > Lsr mailing list
>     > Lsr@ietf.org
>     > https://www.ietf.org/mailman/listinfo/lsr
>
>
>