Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection"-draft-ietf-lsr-isis-flood-reflection-05

"Acee Lindem (acee)" <acee@cisco.com> Thu, 20 January 2022 20:34 UTC

Return-Path: <acee@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD20B3A1FF8 for <lsr@ietfa.amsl.com>; Thu, 20 Jan 2022 12:34:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.596
X-Spam-Level:
X-Spam-Status: No, score=-14.596 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=f+8DzsFX; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=Hk/TNz1w
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8sYH0HkrT5Ic for <lsr@ietfa.amsl.com>; Thu, 20 Jan 2022 12:34:17 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 17CBF3A1FF5 for <lsr@ietf.org>; Thu, 20 Jan 2022 12:34:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=30638; q=dns/txt; s=iport; t=1642710856; x=1643920456; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=0hErA2ux2/x+xZh7F5WGxeXV715cQ3UxehS7mBNu7JI=; b=f+8DzsFXapi2WknUFTgzBl23AHAdscBHMFkJKBoYv1bcnJ4FPdGjWQEG GOomJS+eUBASlnqTXp7QNe9HJlWj8T7CfLg4n/SWz+7IjBYRTuuYz2SYY XWaWs6mC8XViZY9YRo+AtfNkoo4Au2W75MFtXh6HmvEDTCq3abjx6194p Q=;
IronPort-PHdr: A9a23:FIB1PxNyuuZNOPpwTSUl6ncDWUAX0o4cdiYZ6Zsi3rRJdKnrv5HvJ1fW6vgliljVFZ7a5PRJh6uz0ejgVGUM7IzHvCUEd5pBBBMAgN8dygonBsPNAEbnLfnsOio9GskKVFJs83yhd0ZPH8OrbFzJqXr05jkXSX3C
IronPort-Data: A9a23:ZgLCeqiGyOZpT35zhPt1FGL0X161kBIKZh0ujC45NGQN5FlHY01jehtvCzvTb//fZGenLdgiboSwphtUu8OBn9MwTARo/3ozECpjpJueD7x1DKtf0wB+jyH7ockOA/w2MrEsF+hpCC+MzvuRGuK59yMkjPvQHuGU5NPsY0ideyc1EE/Ntjo78wIJqtYAbemRW2thi/uryyHsEAfNNwpPD44hw/nrRCWDExjFkGhwUlQWPZintbJF/pUfJMp3yaqZdxMUTmTId9NWSdovzJnhlo/Y1w0mBtXgmbHhfwhbBLXTJgOJzHFRXsBOgDAb+Xd0ifl9ZaFaMBsK49mKt4gZJNFlvJe9RC8iP7bHn6IWVBww/yRWbP0ZoeaYeybh2SCU5wicG5f2+N1qF1sePIAE9KBwG24m3eMRLj8EbxKegcqq27O9Relxj4IkNsatN4V3km1nyyDCDPs6T7jMRqzL4ZlT2zJYrstOGu7GfOISaT13dA+GZAdAUn8eA58zybvwjXjkeDoeo1WQjaYy6nLYig18zLarN8DaEuFm7+09cl2wvGnK+SHyBQsXcY3Zwjue+XXqjejK9R4Xkbk6TNWQnsOGSnXKroDLNCAraA==
IronPort-HdrOrdr: A9a23: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
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AZAADpxelh/5FdJa1aGwEBAQEBAQEBBQEBARIBAQEDAwEBAUCBRgYBAQELAYFRKC4Hd1o3MYRIg0cDhFlghQ6DAgOBE4l6hSeKaoEugSUDVAsBAQENAQEqCwwEAQGFBQIXg0ACJTQJDgECBAEBARIBAQUBAQECAQYEgQkThWgNhkIBAQEBAgEBARALBhEMAQEsCwEPAgEGAhEDAQEBAQICJgICAh8GCxUICAIEAQ0FGweCYgGCZQMNIQEOkjiPNgGBOgKKH3qBMYEBgggBAQYEBIFKQYMCDQuCNwMGgRAqAYMNhB6HByccgg2BFAEnHIFmSjc+giFCAQECAYE0KRcPgnI3gi6QdAEQWw42AyMBAwsSEh4GIi0BCxgIChMcEQgRASQBAQ4CCh4NHg+RWQRYgxiWNpJwawqDRYp8jVQJgQCCYIMYBS6DcYwPl3SWRCCMaoNNkFkPCQSEbAIEAgQFAg4BAQaBYTuBWXAVOyoBgj5RGQ+OIAwWFYM6hRSFSnQCNgIGAQoBAQMJjXSCRgEB
X-IronPort-AV: E=Sophos;i="5.88,303,1635206400"; d="scan'208";a="987117266"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 20 Jan 2022 20:34:15 +0000
Received: from mail.cisco.com (xbe-rcd-007.cisco.com [173.37.102.22]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 20KKYFm2030823 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Thu, 20 Jan 2022 20:34:15 GMT
Received: from xfe-aln-001.cisco.com (173.37.135.121) by xbe-rcd-007.cisco.com (173.37.102.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Thu, 20 Jan 2022 14:34:15 -0600
Received: from xfe-rcd-001.cisco.com (173.37.227.249) by xfe-aln-001.cisco.com (173.37.135.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Thu, 20 Jan 2022 14:34:14 -0600
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-001.cisco.com (173.37.227.249) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Thu, 20 Jan 2022 14:34:14 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JbK65ECwAaSTn/0kARMYDZNxMduUbl/h2Yq1ttKRP2VUpZLNEz6xKfjdIFR5xRsa+BEUY1A/qLcKZRgqy22aFC3QYEKq7W3XZxkbJR8uRPBrgn462GumfPzqEx/WExh+K/YnsHdC6Lid7jNnao0tFvpZjJemSOjXkQ7Y0gilxjgIeok8Z/aS6EKJH91hW+muO2G4MnUiJszFGGNX/w5MxS2+VUy94EoviAVLJk0hsBwXLv86DP39i234uIUWK1997TIAc5oVB4vy2jZzlKO2XfvfXPENAcP5iw4TfEfCv2CjJGhhM8N2we2dTwVFdQZ5UxndU/FrTdlTILknKbSndw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0hErA2ux2/x+xZh7F5WGxeXV715cQ3UxehS7mBNu7JI=; b=Wtob6j4ThnoPFyjgcrzFghi9wmEJ5oO+vJwnbyBfsXtJCOUoWJFdbJTOgA7A4agObnHkPvCs7zPAWAiTe5Riz60co33tiJUMd8eOT1IBOcANeoGpsYfUCtVygl14zHyXL/lZPlrdhNBTdcKZHUCid56yrcVtstDzvNSjZa8AkziMIRlKikPLOsfl+GJN5GxjwT66sSyg5aATBjUmHhdj/VP3Nxb9eE2Pm8SI0LPxOYfHWXQFR7a14GrwV9SKGTrJOi/a5oZWknlGm5kQ94sv0Z3peP79eN6ZK7StYkKDtVVdrddtHtNLjmzJK8JJnpweQUL7oQdROwyNeU4leh0TwA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0hErA2ux2/x+xZh7F5WGxeXV715cQ3UxehS7mBNu7JI=; b=Hk/TNz1wBboitL9otF4LWcw00gijk3uFhysptWCmfcZ/bK9WPuqAU5tc4kgezo7wT8Hs8alysA0LoubFzAHzkCD5lOrZCkUVEYd8x8kiqnm5r4d0qgLMC/SN/V6jsVF5IrqRWRkmTBeMBtaU4mflMs7UvQlRaJ0ljnMBkc9Ppxc=
Received: from BYAPR11MB2757.namprd11.prod.outlook.com (2603:10b6:a02:cb::16) by MN2PR11MB4271.namprd11.prod.outlook.com (2603:10b6:208:188::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4909.8; Thu, 20 Jan 2022 20:34:13 +0000
Received: from BYAPR11MB2757.namprd11.prod.outlook.com ([fe80::6127:f268:b965:b195]) by BYAPR11MB2757.namprd11.prod.outlook.com ([fe80::6127:f268:b965:b195%6]) with mapi id 15.20.4909.010; Thu, 20 Jan 2022 20:34:13 +0000
From: "Acee Lindem (acee)" <acee@cisco.com>
To: "Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org>, Christian Hopps <chopps@chopps.org>, Tony Przygienda <tonysietf@gmail.com>
CC: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>, Aijun Wang <wangaijun@tsinghua.org.cn>, "lsr@ietf.org" <lsr@ietf.org>
Thread-Topic: [Lsr] WG Last Call fo "IS-IS Flood Reflection"-draft-ietf-lsr-isis-flood-reflection-05
Thread-Index: AQHYBjyDhN8SGrkxo0iRMxBvxZ8Q6axcdHUA//+zlACAAH3/AIACmTuAgABd3QCAATXGgP//6uiAgABB4wCACxouAA==
Date: Thu, 20 Jan 2022 20:34:12 +0000
Message-ID: <82F444E8-427A-46EC-A615-592132F2ED2B@cisco.com>
References: <71B99595-5777-46E0-A6B9-32A6D83FE3E0@cisco.com> <5F0C96E5-6626-46C3-BBDB-52DA4BEB24E9@tsinghua.org.cn> <0966F70B-3549-42C1-8692-BF4CA70BA366@cisco.com> <CA+wi2hPBsj6rJY9WbyHZ2W4eEJ6DzsduWdY_AAYg3D1z_E4wqg@mail.gmail.com> <2356BC29-EA34-4626-8BC9-55C32D5A5C23@cisco.com> <CA+wi2hPVf1O-_a1Sk7MJ+uz8RMqaGzUt-SD6WFFNgGoWKRnvUw@mail.gmail.com> <m27db3uaob.fsf@ja.int.chopps.org> <32532973-20FB-477D-94DF-7F1C45D3AEB5@cisco.com> <7BF192DE-4FE8-46C6-AE1C-93DEBA529778@cisco.com>
In-Reply-To: <7BF192DE-4FE8-46C6-AE1C-93DEBA529778@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.57.22011101
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0feca647-c7e0-4c90-fbe3-08d9dc543860
x-ms-traffictypediagnostic: MN2PR11MB4271:EE_
x-microsoft-antispam-prvs: <MN2PR11MB4271FFAEEF8928C722994605C25A9@MN2PR11MB4271.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2757.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(8936002)(76116006)(53546011)(6506007)(8676002)(83380400001)(38100700002)(966005)(36756003)(26005)(186003)(30864003)(91956017)(122000001)(54906003)(6512007)(2906002)(33656002)(2616005)(66556008)(66476007)(64756008)(66446008)(6486002)(66946007)(316002)(71200400001)(4326008)(5660300002)(38070700005)(110136005)(86362001)(508600001)(45980500001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <0BD51D5F6C165646AA0999542E7B13B4@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2757.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0feca647-c7e0-4c90-fbe3-08d9dc543860
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jan 2022 20:34:12.9860 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: hWNnO2hMe89P5AjdrkwFFePXgnzsgp8T6ogwcdw+HMLacP2PSBRQSg41skgawu81
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4271
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.22, xbe-rcd-007.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/mEw9JoOHemeFWG_FjkF_sA2v08s>
Subject: Re: [Lsr] WG Last Call fo "IS-IS Flood Reflection"-draft-ietf-lsr-isis-flood-reflection-05
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jan 2022 20:34:22 -0000

All,
I've captured the objection on multiple solutions in the shepherd's report. We will move forward with this draft on the experimental track. 
Thanks,
Acee

On 1/13/22, 2:02 PM, "Acee Lindem (acee)" <acee=40cisco.com@dmarc.ietf.org> wrote:

    All, 
    I think there is some confusion here (at least on my part). My original message was to gauge how many of the WG members who supported work on deployment considerations for this IS-IS use case of using L1 as transit for L2 felt that this should precede advancement of the flooding reflection draft. It seems we really only had 1 or 2 WG members opposed to advancement. In the past, we haven't mandated deployment considerations prior to solution document advancement. I see now that Chris was actually agreeing with me in that we don't want to hold up advancement (my apologies). As I was conveying below, we have had multiple documents in the same space in the past and it hasn't prevented us from moving forward. Also, as I stated previously and others have agreed, the IS-IS flooding reflection draft takes a different approach than the IS-IS area proxy/TTZ drafts. 

    Given this context, are there further comments? It seems Shraddha and I were the only ones providing detailed technical review (apologies if I missed anyone). 

    Thanks,
    Acee

    On 1/13/22, 10:06 AM, "Lsr on behalf of Acee Lindem (acee)" <lsr-bounces@ietf.org on behalf of acee=40cisco.com@dmarc.ietf.org> wrote:

        Hi Chris, 

        Actually, we have progressed multiple experimental OSPF MANET drafts. Two of the them did have deployment but it is limited and there wasn't enough interest to move any of them to standards track. There are elements of these  drafts in some of the flooding reduction proposals and it somewhat surprises me that we haven't dusted them off. 

        As far as flooding reduction is concerned, we have one frame work that supports any number of centralized or distributed algorithms. I'm certainly glad we didn't relegate ourselves to a single mode or single algorithm. 

        In short, I don't think we should stop progression of experimental drafts just because there are alternative proposals. IMO, the draft in question is a technically different approach than the other two and is it is unlikely that we are going to reach consensus on a single approach.

        Thanks,
        Acee




        On 1/13/22, 6:39 AM, "Christian Hopps" <chopps@chopps.org> wrote:


            Tony Przygienda <tonysietf@gmail.com> writes:

            > I wonder whether this is now a general rule for all future ISIS
            > drafts suggesting extensions or a one off random thing and we can
            > come up for future drafts with arbitrary list of related drafts that
            > we will precondition to gate publish/acceptance/whatever ... 
            >
            > just trying to figure out what the process is here ...

            Well since he was "Speaking as a document shepherd", it can't be a new general rule, b/c document shepherds don't get to set general rules for a WG. :)

            I sense some frustration here, though.

            As a WG, we generally haven't advanced multiple solutions like we have in this case. So, I don't think we can talk about any sort of previously existing standard process. And with my WG chair hat on I'll say: I hope we don't repeat this method very often in the future.

            As WG Member: I didn't intend to pause forward progress when I originally asked if any guidance had been captured to help users select between the multiple options. It was just a natural thing to ask when you mentioned that certain network designs lined up better with one solution or the other.

            Thanks,
            Chris.


            >
            > -- tony
            >
            > On Wed, Jan 12, 2022 at 5:16 PM Acee Lindem (acee) <acee@cisco.com>
            > wrote:
            >
            >
            >     Speaking as document shepherd:
            >
            >      
            >
            >     Who thinks we should delay this draft while waiting for a
            >     deployment draft? I know some people supported this but I believe
            >     it would be better to move forward with this experimental draft.
            >     Given that there were 3 separate proposals for this topology to
            >     use level-1 as a transit for level-2. We’ve already established
            >     that there is a requirement.
            >
            >      
            >
            >     Also, I agree with Tony in that comments should be technical
            >     rather than simply that you don’t like it or you think it is
            >     complex.
            >
            >      
            >
            >     Thanks,
            >     Acee
            >
            >      
            >
            >     From: Tony Przygienda <tonysietf@gmail.com>
            >     Date: Monday, January 10, 2022 at 2:36 PM
            >     To: Acee Lindem <acee@cisco.com>
            >     Cc: Aijun Wang <wangaijun@tsinghua.org.cn>, Christian Hopps <
            >     chopps@chopps.org>, "Les Ginsberg (ginsberg)" <ginsberg@cisco.com
            >     >, "lsr@ietf.org" <lsr@ietf.org>
            >     Subject: Re: [Lsr] WG Last Call fo "IS-IS Flood
            >     Reflection"-draft-ietf-lsr-isis-flood-reflection-05
            >
            >      
            >
            >     yes, first, if you abstract in _any_ way (except a full mesh for
            >     a single metric) you will end up with suboptimal paths (compared
            >     to global, flat topology view) traversing an abstracted subgraph
            >     and different ECMP behavior in corner cases, it's basic graph
            >     theory (aggravated by hop-by-hop or loose-source route forwarding
            >     planes) and is a well-known problem encountered in any
            >     hierarchical network, be it IGP, seamless MPLS or even BGP (look
            >     @ AIGP). FR deployed with underlying tunnels in L1 does not loop
            >     and neither does it when deployed correctly with prefix leaking. 
            >
            >      
            >
            >     I cannot help it if a single person on this list is harboring
            >     fears, preferences and doubts without hard technical arguments to
            >     make for a meaningful discussion so I think it's time to put that
            >     repetitive sub-thread aside.
            >
            >      
            >
            >     As I said, I will be more than happy to help on a "deployment
            >     considerations" or some such draft once those documents move up
            >     to publication  so we have stable references to talk about ...
            >
            >      
            >
            >     thanks
            >
            >      
            >
            >     -- tony
            >
            >      
            >
            >     On Mon, Jan 10, 2022 at 6:05 PM Acee Lindem (acee) <
            >     acee@cisco.com> wrote:
            >
            >         I'll defer to Tony but my understanding is that there could
            >         be suboptimal paths if there are both Level-1 and Level-2
            >         paths but not loops.
            >         Thanks,
            >         Acee
            >
            >         On 1/10/22, 11:38 AM, "Aijun Wang" <wangaijun@tsinghua.org.cn
            >         > wrote:
            >
            >             But there are unsolved issues for this draft—— BGP has
            >         loop prevention mechanism, current flood reflection draft
            >         hasn’t, the operator must  design the topology/link metric 
            >         carefully to avoid the possible loop.
            >
            >             Aijun Wang
            >             China Telecom
            >
            >             > On Jan 11, 2022, at 00:10, Acee Lindem (acee) <acee=
            >         40cisco.com@dmarc.ietf.org> wrote:
            >             >
            >             > Speaking as a WG member, these documents are all
            >         "experimental" and, IMO, it would really stifle innovation to
            >         require a single experimental solution. We've never done that
            >         in the past. Also,  while all three solutions have the goal
            >         of reducing control plane overhead when using Level-1 areas
            >         as a transit, the flood reflection draft solves the problem
            >         with a different approach than the area proxy and TTZ
            >         drafts.  While the latter two focus on abstracting the
            >         transit area, the former also focusing on reducing the number
            >         of adjacencies and allows the reflector to be out of the data
            >         path (similar to the standardized and widely deployed BGP
            >         route reflection) I see no need to differentiate to stall
            >         advancement.
            >             >
            >             > Thanks,
            >             > Acee
            >             >
            >             > On 1/3/22, 7:05 AM, "Christian Hopps" <
            >         chopps@chopps.org> wrote:
            >             >
            >             >
            >             >    Tony Przygienda <tonysietf@gmail.com> writes:
            >             >
            >             >> One thing Les is missing here is that proxy &
            >         reflection present in
            >             >> terms of deployment requirements and ultimate
            >         properties very
            >             >> different engineering & operational trade-offs.
            >         Different customers
            >             >> follow different philosophies here IME
            >             >>
            >             >> So we are not strictly standardizing here 2 solutions
            >         for the same
            >             >> thing, we are standardizing two solutions that meet
            >         very different
            >             >> deployment and operational requirements albeit from
            >         20K feet view all
            >             >> that stuff looks the same of course as any other thing
            >         does ...
            >             >
            >             >    Have we captured these "different deployment and
            >         operational requirements" anywhere? I think might be very
            >         useful...
            >             >
            >             >    Thanks,
            >             >    Chris.
            >             >    [as wg member]
            >             >
            >             >
            >             >> -- tony
            >             >>
            >             >> On Tue, Dec 7, 2021 at 7:17 PM Les Ginsberg (ginsberg)
            >         <ginsberg=
            >             >> 40cisco.com@dmarc.ietf.org> wrote:
            >             >>
            >             >>
            >             >>    When I look at this request, I see it in a larger
            >         context.
            >             >>
            >             >>
            >             >>
            >             >>    There are two drafts which attempt to address the
            >         same problem in
            >             >>    very different ways:
            >             >>
            >             >>
            >             >>
            >             >>    https://datatracker.ietf.org/doc/
            >             >>    draft-ietf-lsr-isis-flood-reflection/
            >             >>
            >             >>
            >             >>
            >             >>    and
            >             >>
            >             >>
            >             >>
            >             >>    https://datatracker.ietf.org/doc/
            >         draft-ietf-lsr-isis-area-proxy/
            >             >>
            >             >>
            >             >>
            >             >>    Both of them discuss in their respective
            >         introductions the
            >             >>    motivation – which is to address scaling issues in
            >         deployment
            >             >>    scenarios where the existing IS-IS hierarchy is
            >         being asked to
            >             >>    “stand on its head” i.e., interconnection between
            >         different L1
            >             >>    areas is not to be achieved by utilizing an L2
            >         backbone – rather
            >             >>    it is the L1 areas themselves which are required to
            >         be used for
            >             >>    interconnection of sites (e.g., two datacenters)
            >         and the scaling
            >             >>    properties of the existing protocol hierarchy when
            >         used in this
            >             >>    way are not attractive.
            >             >>
            >             >>
            >             >>
            >             >>    I find no technical basis on which to choose
            >         between the two
            >             >>    proposed solutions – so in my mind a last call for
            >             >>    “Flood-Reflection” presupposes a last call for
            >         “Area Proxy” – and
            >             >>    therein lies my angst.
            >             >>
            >             >>    The end result will be that multiple incompatible
            >         solutions to
            >             >>    the same problem will be defined. It will then be
            >         left to
            >             >>    customers to try to determine which of the
            >         solutions seems best
            >             >>    to them – which in turn will put the onus on
            >         vendors to support
            >             >>    both solutions (depending on the set of customers
            >         each vendor
            >             >>    supports).
            >             >>
            >             >>    This – to me – represents an utter failure of the
            >         standards
            >             >>    process. We are reduced to a set of constituencies
            >         which never
            >             >>    find common ground – the end result being
            >         sub-optimal for the
            >             >>    industry as a whole.
            >             >>
            >             >>
            >             >>
            >             >>    It seems to me that the proper role of the WG is to
            >         address the
            >             >>    big questions first:
            >             >>
            >             >>
            >             >>
            >             >>    1)Is this a problem which needs to be solved by
            >         link-state
            >             >>    protocols?
            >             >>
            >             >>    We certainly have folks who are clever enough to
            >         define solutions
            >             >>    – the two drafts are a proof of that.
            >             >>
            >             >>    But whether this is a wise use of the IGPs I think
            >         has never been
            >             >>    fully discussed/answered.
            >             >>
            >             >>    Relevant to this point is past experience with
            >         virtual links in
            >             >>    OSPF – use of which was problematic and which has
            >         largely fallen
            >             >>    out of use.
            >             >>
            >             >>    Also, many datacenters use BGP (w or w/o IGP) and
            >         therefore have
            >             >>    other ways to address such issues.
            >             >>
            >             >>    Although I am familiar with the “one protocol is
            >         simpler”
            >             >>    argument, whether that justifies altering the IGPs
            >         in any of the
            >             >>    proposed ways is still an important question to
            >         discuss.
            >             >>
            >             >>
            >             >>
            >             >>    2)If link state protocols do need to solve this
            >         problem, what is
            >             >>    the preferred way to do that?
            >             >>
            >             >>    This requires meaningful dialogue and a willingness
            >         to engage on
            >             >>    complex technical issues.
            >             >>
            >             >>
            >             >>
            >             >>    The alternative is to do what we seem to be doing –
            >         allowing
            >             >>    multiple solutions to move forward largely without
            >         comment. In
            >             >>    which case I see no basis on which to object –
            >         anyone who can
            >             >>    demonstrate a deployment case should then be
            >         allowed to move a
            >             >>    draft forward – and there are then no standardized
            >         solutions.
            >             >>
            >             >>    (The Experimental Track status for these drafts
            >         reflects that
            >             >>    reality.)
            >             >>
            >             >>
            >             >>
            >             >>       Les
            >             >>
            >             >>
            >             >>
            >             >>    P.S.  (Aside: There is a third draft offering a
            >         solution in this
            >             >>    space https://datatracker.ietf.org/doc/
            >         draft-ietf-lsr-isis-ttz/
            >             >>     - but as that draft continues to promote its
            >         primary usage as a
            >             >>    means of more easily changing area boundaries
            >         (merging/splitting)
            >             >>    I have not discussed it here. However, if the
            >         authors of that
            >             >>    draft claim it as a solution to the same problem
            >         space claimed by
            >             >>    Area Proxy/Flood Reflection then the WG would have
            >         no basis but
            >             >>    to also progress it – which would result in three
            >         solutions being
            >             >>    advanced.)
            >             >>
            >             >>
            >             >>
            >             >>
            >             >>
            >             >>
            >             >>
            >             >>    From: Lsr <lsr-bounces@ietf.org> On Behalf Of Acee
            >         Lindem (acee)
            >             >>    Sent: Monday, November 22, 2021 11:47 AM
            >             >>    To: lsr@ietf.org
            >             >>    Subject: [Lsr] WG Last Call fo "IS-IS Flood
            >         Reflection"
            >             >>    -draft-ietf-lsr-isis-flood-reflection-05
            >             >>
            >             >>
            >             >>
            >             >>    This begins the WG Last for
            >             >>    draft-ietf-lsr-isis-flood-reflection-05. Please
            >         post your support
            >             >>    or objection to this list by 12:00 AM UTC on Dec 14
            >         ^th , 2021.
            >             >>    Also please post your comments on the draft. I’m
            >         allowing as
            >             >>    extra week as I like to get some additional reviews
            >         – although my
            >             >>    comments have been addressed.
            >             >>
            >             >>
            >             >>
            >             >>    Thanks,
            >             >>    Acee
            >             >>
            >             >>
            >             >>
            >             >>    _______________________________________________
            >             >>    Lsr mailing list
            >             >>    Lsr@ietf.org
            >             >>    https://www.ietf.org/mailman/listinfo/lsr
            >             >>
            >             >>
            >             >>
            >             >> _______________________________________________
            >             >> Lsr mailing list
            >             >> Lsr@ietf.org
            >             >> https://www.ietf.org/mailman/listinfo/lsr
            >             >
            >             >
            >             > _______________________________________________
            >             > Lsr mailing list
            >             > Lsr@ietf.org
            >             > https://www.ietf.org/mailman/listinfo/lsr
            >
            >
            >
            >
            > _______________________________________________
            > Lsr mailing list
            > Lsr@ietf.org
            > https://www.ietf.org/mailman/listinfo/lsr


        _______________________________________________
        Lsr mailing list
        Lsr@ietf.org
        https://www.ietf.org/mailman/listinfo/lsr