Re: [Lsr] AD Review of draft-ietf-isis-te-app-09

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Sat, 21 March 2020 17:10 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06B923A04BB; Sat, 21 Mar 2020 10:10:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=GN653PzU; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=L1ll7n0V
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LN4ik4PGD1LW; Sat, 21 Mar 2020 10:09:57 -0700 (PDT)
Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AADBC3A0474; Sat, 21 Mar 2020 10:09:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=28796; q=dns/txt; s=iport; t=1584810596; x=1586020196; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=/Byj3bi2fG2fuEqwikPuGw0LuA6cwfuJDTBpz/5w5XI=; b=GN653PzUvmeTLeYUiV4rbOed1/ZXLnAQOCgUYBhvQAEz/3b4RBZYba0o EEP5+D8Wn3+5prZ10/78A+vNf/1iZGUZIIJztIKI3LjNEHzauMVWlCyFZ uzs1XxTRWtRMwblKehr7cKNi7I3JiXzcBWSiVB7hxQTErjU6PaRb/ZERR 8=;
IronPort-PHdr: 9a23:bnQzmR0KJmlQEkqwsmDT+zVfbzU7u7jyIg8e44YmjLQLaKm44pD+JxKGt+51ggrPWoPWo7JfhuzavrqoeFRI4I3J8RVgOIdJSwdDjMwXmwI6B8vQBkz9N/TndSMSF8VZX1gj9Ha+YgBY
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CzAAAgSXZe/4ENJK1mGgEBAQEBAQEBAQMBAQEBEQEBAQICAQEBAYF7gVRQBWxYIAQLKoQYg0UDinCCX4lqjjKCUgNUCQEBAQwBASMKAgQBAYFRgnQCF4INJDgTAgMBAQsBAQUBAQECAQUEbYVWDIVjAQEBAQIBEhERDAEBKQ4BBAcEAgEIDgMEAQEBAgImAgICHxEVCAgCBAENBQgagwWCSwMOIAEOoC4CgTmIYnWBMoJ/AQEFgTMCg2MNC4IMAwaBDiqJY4JMGoFBP4EQAUeBT34+ghtJAQECAYE5GhEVD4JrMoIsjVwkL4JIhhyYSDJECoI8h16JEoFahFqCTIgrBZBdjw2JDYI3kC0CBAIEBQIOAQEFgWkigVhwFYMnUBgNjh0MF4NQhRSFQXSBKYtmAgUhghsBAQ
X-IronPort-AV: E=Sophos;i="5.72,289,1580774400"; d="scan'208";a="493769170"
Received: from alln-core-9.cisco.com ([173.36.13.129]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 21 Mar 2020 17:09:54 +0000
Received: from XCH-RCD-004.cisco.com (xch-rcd-004.cisco.com [173.37.102.14]) by alln-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 02LH9sOk017734 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sat, 21 Mar 2020 17:09:54 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-RCD-004.cisco.com (173.37.102.14) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sat, 21 Mar 2020 12:09:53 -0500
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sat, 21 Mar 2020 13:09:53 -0400
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Sat, 21 Mar 2020 12:09:52 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ejgUjxLnlA0/fdSBvJ0S1ST5QVmCsQsfY9Y/qfMQ5lgvZ8DnlcAYMO/axXPKZUgBE0c5ZJF9Lx44bpl9Pgsi1Kvh4OKr+TCQ4kuxygiF3ss4z/pA7G4VSVOeZkDpPEgQXfIdDazflINWYTasnVH+r3d/ofVgDwDFKgTanUUugatg8CRgzx6pZQ4wMFqpDnz6JDXvCkqlousPbuYLYeqFLaveecUBa/rfJNV0Fs35xnEA8UzFrUeiHZ9cHC/2VSz93DY7UvMWfQ9vSsnWfBDM6jdXW68KQLj+gJfXUN6BlAuOOVADrazVj2plJr6quXWZMrcVN3jScakrdzbxILF02w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;bh=/Byj3bi2fG2fuEqwikPuGw0LuA6cwfuJDTBpz/5w5XI=; b=TRxJRSUiJfqXsluzHCc10uO+Uj3PLaoKtrFeYxM+DekKghewcuVzhgbzOIGMlDSTs5HMD98evi40mmXOrFlYz38U8xIhyBNJECbb1EVjJiTfHrQDzmuknjWo5ns4O0gFYk+WBCoGMMu/217m4JWsuMKXzm0hnL+m97StKNzMaxiQt2sinUzWgfdzUlD2s4/2IRnq8+uDEUTt0oSGR7ffE1GuXx3NTL/0cjT89JlvJbfUcfumXfytu4DutnOKqtHt46D7h49B0xaucdcQcCTmPLROPGuat2cZPUZ6R+xQMLmirUbxi7Xf8tng3l+KgVaOA0X599jtd4TEzS8/+WeRnQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/Byj3bi2fG2fuEqwikPuGw0LuA6cwfuJDTBpz/5w5XI=; b=L1ll7n0VUvvaRAEmn93Y5xxE+sNnVPublSW75tu5Uc3VQiPxQJhxDV7bhfRHBx0wDOb46UfpQbrYpdfedqCheQ4AwlNtPo+RhThP7hzPwkMvbeoPhucLv1o6sxG2thyNYT95DVdZM8X1+pYNn59pczmKUY8LQyIxl8u4H+Leb5s=
Received: from MW3PR11MB4619.namprd11.prod.outlook.com (2603:10b6:303:5b::15) by MW3PR11MB4618.namprd11.prod.outlook.com (2603:10b6:303:5f::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2835.20; Sat, 21 Mar 2020 17:09:51 +0000
Received: from MW3PR11MB4619.namprd11.prod.outlook.com ([fe80::b87d:76f6:5a2e:951c]) by MW3PR11MB4619.namprd11.prod.outlook.com ([fe80::b87d:76f6:5a2e:951c%3]) with mapi id 15.20.2835.017; Sat, 21 Mar 2020 17:09:51 +0000
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: Alvaro Retana <aretana.ietf@gmail.com>, "Acee Lindem (acee)" <acee@cisco.com>, "draft-ietf-isis-te-app@ietf.org" <draft-ietf-isis-te-app@ietf.org>
CC: "lsr@ietf.org" <lsr@ietf.org>, "lsr-chairs@ietf.org" <lsr-chairs@ietf.org>
Thread-Topic: AD Review of draft-ietf-isis-te-app-09
Thread-Index: AQHVxxGYBGia5SKMtUWRFnZ1BZc6hqgPba2QgBy2DgCABB9qgIAKTAEAgBkcsaA=
Date: Sat, 21 Mar 2020 17:09:51 +0000
Message-ID: <MW3PR11MB4619C2316FCB9BE0C89DF2ABC1F20@MW3PR11MB4619.namprd11.prod.outlook.com>
References: <CAMMESswTr=qepRXrUEJp1AUhwD5RJ49pg=wUs9gLy5ZLYhD8ug@mail.gmail.com> <MWHPR11MB16167ABBD3F7F4C23D03377BC11C0@MWHPR11MB1616.namprd11.prod.outlook.com><CAMMESszvQYgvhjuAWhZeks9OJcKGpqWScyLC7FEiO-dsjTE_mw@mail.gmail.com> <MW3PR11MB4619C8BA0B67DEF1487D9193C1E80@MW3PR11MB4619.namprd11.prod.outlook.com> <CAMMESsyb7-1_FaRZ62UYG5p7Q3hBCBqgj8DwdE1C3ShapJ2UJQ@mail.gmail.com>
In-Reply-To: <CAMMESsyb7-1_FaRZ62UYG5p7Q3hBCBqgj8DwdE1C3ShapJ2UJQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=ginsberg@cisco.com;
x-originating-ip: [2001:420:c0c8:1008::535]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 899fb54a-237b-40d6-72bb-08d7cdbaab31
x-ms-traffictypediagnostic: MW3PR11MB4618:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <MW3PR11MB46185F7AAC4AEADE1C655655C1F20@MW3PR11MB4618.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 034902F5BC
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(39860400002)(346002)(396003)(366004)(376002)(136003)(199004)(76116006)(5660300002)(110136005)(81166006)(9686003)(7696005)(81156014)(71200400001)(2906002)(86362001)(8676002)(186003)(66574012)(33656002)(316002)(55016002)(6506007)(66446008)(53546011)(66476007)(30864003)(4326008)(54906003)(52536014)(966005)(478600001)(66946007)(64756008)(8936002)(66556008)(560514002)(579004); DIR:OUT; SFP:1101; SCL:1; SRVR:MW3PR11MB4618; H:MW3PR11MB4619.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: 93HxGXMppu1j0cJf912DEslyp7TYSjV90CEekqoT4XGYBoLrUfLjy2OtWXZmntxxGa2xNoT0ORbf8XWBeJf5LRnAzgPCHNL6pl471f5kcIxNb2A88bIBclGuknR0lsfBkiLou+wkAzbtne+CluDZBm6iCC2XPwBsOCf2FWvucxA=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 899fb54a-237b-40d6-72bb-08d7cdbaab31
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Mar 2020 17:09:51.5462 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: mmqeQpidj6NFEbaHC5UaPt+ocAx2jmcgJ0Pu+5DoYGF8T3Zhho2MnsqhNtxzEvYPy7hZaQWKBwj+Iw/7pt3swA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW3PR11MB4618
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.14, xch-rcd-004.cisco.com
X-Outbound-Node: alln-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/td-1qXf-UQuayx7BIxGQWl1wRas>
Subject: Re: [Lsr] AD Review of draft-ietf-isis-te-app-09
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 21 Mar 2020 17:10:02 -0000

Alvaro -

Following some offline discussion with you, V12 of the draft has been posted to address your additional comments.
Some responses inline. Look for "Les3".

> -----Original Message-----
> From: Alvaro Retana <aretana.ietf@gmail.com>
> Sent: Thursday, March 05, 2020 8:54 AM
> To: Les Ginsberg (ginsberg) <ginsberg@cisco.com>; Acee Lindem (acee)
> <acee@cisco.com>; draft-ietf-isis-te-app@ietf.org
> Cc: lsr@ietf.org; lsr-chairs@ietf.org
> Subject: RE: AD Review of draft-ietf-isis-te-app-09
> 
> On February 27, 2020 at 11:00:19 PM, Les Ginsberg wrote:
> 
> 
> Les:
> 
> Hi!  How are you?
> 
> 
> Some of the responses, yours and mine, feel like we're not
> communicating well, like we are talking past each other.  I am
> probably not clearly asking the right questions...  I think it would
> be a good idea to talk live.  Let me know a time that works for you
> and we can set up a short call.  Maybe the Shepherd can help us sort
> through things.
> 
> Nonetheless, I responded to some of your comments.
> 
> 
> Thanks!
> 
> Alvaro.
> 
> 
> ...
> > > > > 177 3. Legacy Advertisements
> > > ...
> > > > > [minor] Please add references to where all the values in this section
> > > > > are defined...if the same as the references above.
> > > > >
> > > > [Les:] Done.
> > >
> > > Sorry, I meant the RFCs where the sub-TLVs are defined, not the
> registries.
> >
> > [Les:] Well, the IANA registry identifies the Reference RFCs - and has the
> > advantage that it gets updated should that ever change. So I would suggest
> > providing a link to the registry is actually better than identifying the RFC
> > for each code point. :-)
> > ??
> 
> [nit] I disagree because the RFC gives you the detail not just the
> value, which is what you originally get from the registry.
> Sure...it's just an indirection.
> 

[Les3:] I have decided to leave the reference to the registry.

> 
> 
> ...
> > > > > [major] In a mixed network, where some routers support this
> > > > > specification, but other don't, it seems that setting the L-flag would
> > > > > be useful as all applications would "fall back" to the legacy
> > > > > advertisements. However, not setting the L-flag seems to have the
> > > > > potential for the routers to use different information resulting in
> > > > > (at best) inconsistent decisions if the values are not the same.
> > > > >
> > > > [Les:] The revised Deployment considerations section now addresses
> this.
> > >
> > > [nit] In the new §6.3.3 (Interoperability with Legacy Routers) it
> > > might be good to mention the setting of the L-flag. For example,
> > > extend Step 1, "Receiving routers continue to use legacy
> > > advertisements" to include a mention of the L-flag being set.
> > >
> > [Les:] This isn't a nit - it is a misunderstanding.
> > We aren't using L-bit here at all.
> > We are accommodating the coexistence of legacy/non-legacy routers.
> >
> > Legacy routers only send/receive legacy advertisements. They don't
> understand
> > the new advertisements - let alone the L-bit.
> >
> > To migrate to all new routers - at which point legacy advertisements can be
> > deprecated - you must follow the three steps described. The transition
> > between steps is controlled by some implementation specific knob.
> >
> > Please reread and let me know if it is clear.
> 
> 
> What I think I missed (even in the initial review) is this text (now
> in §6.1 - Use of Legacy Advertisements) which talks about the knob you
> mention:
> 
>    Under the conditions defined above, implementations which support the
>    extensions defined in this document have the choice of using legacy
>    advertisements or application specific advertisements in support of
>    SRTE and/or LFA.  This will require implementations to provide
>    controls specifying which type of advertisements are to be sent/
>    processed on receive for these applications.  Further discussion of
>    the associated issues can be found in Section 6.3.
> 
> 
> The steps in §6.3.3 are:
> 
>    1)Send application specific advertisements while continuing to
>    advertise using legacy (all advertisements are then duplicated).
>    Receiving routers continue to use legacy advertisements.
> 
>    2)Enable the use of the application specific advertisements on all
>    routers
> 
>    3)Remove legacy advertisements
> 
> 
> I agree that this transition can be achieved with a knob.  But it can
> also be achieved if the L-flag is set (during steps 1 and 2), right?
> Sure, the legacy routers won't know what the L-flag is, but the new
> ones will -- and will then use the legacy advertisements.
> 
> The difference that I see is that the L-flag affects *all* the
> applications in the bit mask while the knob may be more specific.  It
> would be very nice if some text was added about this to avoid more
> people misunderstanding.
> 

[Les3:] The use of the L-flag is of no value in this case. Since legacy routers will never
send the ASLA sub-TLV (w or w/o the L-flag), new routers have to have a knob which says "only process legacy sub-TLVs". They cannot depend on the presence
of ASLA w L-flag since not all routers will send it.

When routers start sending ASLA (Step #1) they might as well keep L-flag clear because the local knob means they will never look at the ASLA sub-TLV anyway.

At Step #2 when routers start using ASLA you do not want L-flag set as that
would simply introduce an extra step in preparation for removing legacy
advertisements i.e., readvertise ASLA w L-flag clear and actual link attribute values present.

Some clarifying text has been added.

> 
> 
> ...
> > > > > [major] "Undefined bits MUST be transmitted as 0 and MUST be
> ignored
> > > > > on receipt." What if the sender and the receiver support a different
> > > > > set of applications? For example, suppose that the sender supports a
> > > > > new application identified by the N-bit, and sets only that bit; the
> > > > > receiver treats the N-bit as undefined and ignores it. The result is
> > > > > that, for the receiver, there seems to be no indication of an
> > > > > application. Is "no application" a valid indication, or should at
> > > > > least one bit always be set?
> > > > >
> > > > [Les:] Just like unknown TLVs, unknown bits MUST be ignored.
> > > > I have added text.
> > >
> > > Yes, that is ok.
> > >
> > > [major] But you didn't answer my question: Is "no application" a valid
> > > indication, or should at least one bit always be set? I guess that
> > > the receiver wouldn't see anything it understands... Would this be
> > > equivalent to zero-length masks?
> > >
> > [Les:] There are three cases:
> >
> > 1)You have application specific advertisements - which you send with the
> > appropriate bit(s) set in the mask.
> >
> > 2)You have application specific advertisements but want all applications to
> > use them. You send with zero-length bit mask.
> >
> > 3)You have no advertisements.
> 
> 
> Maybe I'm not asking the question correctly...
> 
> Let's talk about case 1, rtrA sets the appropriate bits...but rtrB
> (the receiver) doesn't understand any of them.  Why not?  It may be
> that rtrA is signaling a set of new applications and rtrB hasn't been
> upgraded.
> 
> IOW, rtrA is doing the right thing: sending application specific
> advertisements with the appropriate bits set in the mask.  But because
> rtrB doesn't understand the bits (and ignores them) then it looks like
> no bits are set.
> 

[Les3:] It is not correct to say that no bits are set.
In the case of rtrB in your example, it would be correct to say that no bits are set which are supported by rtrB.

> I'm guessing that rtrB would just ignore the complete set of
> application specific advertisements: it wouldn't use them at all
> because there are no bits set (it ignores the ones that are).  Is that
> the correct/expected behavior?

[Les3:] Yes - this is the correct/expected behavior.
Standard protocol behavior - whether for a TLV/sub-TLV that is not supported or for an unsupported bit is to ignore it.

> 
> Besides wanting to take guessing out of a specification, I'm asking
> all this because the other case where no bits are set is when the
> zero-length bit mask is used.  In that case any application can use
> the parameters...

[Les3:] If the mask length is 0, then there are no application bits transmitted. It is not correct to say "no bits are set" in this case.

> 
> 
> 
> 
> > > > > [minor] Following on the previous comment... It seems that a
> > > > > requirement is for the routers/nodes in the domain to agree on the
> > > > > meaning of the bits: support the same Standard Applications and
> > > > > interpret the User Defined bit mask the same way. Please add this
> > > > > type of information to the Deployment Considerations Section.
> > > > >
> > > > [Les:] Standard Applications by definition have bits which are assigned
> > > > by IANA. There is therefore no need to say routers have to agree
> > > > on their meaning.
> > > > User Defined Applications are - by definition - outside the scope of this
> > > > specification. They can do whatever they want.
> > >
> > > Let me try again...
> > >
> > > What issues can arise from the routers supporting a different set of
> > > applications/bits? I can imagine several ways for this to occur, for
> > > example: routers that have not been upgraded to support the latest
> > > assignments...bad configuration practices there the UDAs are not
> > > consistently instantiated in the whole network...
> > >
> > > IOW, if a new application is implemented in the network, but not all
> > > the routers are aware of the corresponding bit (because they're
> > > running old software or were not configured correctly, for example),
> > > then it is possible that the network will not operate as expected.
> > >
> > [Les:] How a router indicates that it supports a given application is outside
> > the scope of this specification.
> > For example,
> > https://tools.ietf.org/html/draft-ietf-lsr-flex-algo-06#section-10 describes
> > how this is done for flex-algo.
> 
> 
> I'm not asking you to make it in scope.  Even if there is a way to
> advertise what is supported a router can still send advertisements for
> applications that not all the routers support.  Yes, it may be a bug,
> it ma be a rogue router, etc..
> 
> If that happens, what are the issues?
> 

[Les3:] Text has been added requiring specifications which define new applications to discuss deployment issues in cases where routers which do not support the new application are present in the network.

> 
> 
> ...
> > > > > 337 4.2. Application Specific Link Attributes sub-TLV
> > > ...
> > > > > 361 Multiple Application Specific Link Attribute sub-TLVs for the same
> > > > > 362 link MAY be advertised. When multiple sub-TLVs for the same link
> are
> > > > > 363 advertised, they SHOULD advertise non-conflicting application/
> > > > > 364 attribute pairs. A conflict exists when the same application is
> > > > > 365 associated with two different values of the same link attribute for
> a
> > > > > 366 given link. In cases where conflicting values for the same
> > > > > 367 application/attribute/link are advertised all the conflicting values
> > > > > 368 MUST be ignored.
> > > > >
> > > > > 370 For a given application, the setting of the L-flag MUST be the
> same
> > > > > 371 in all sub-TLVs for a given link. In cases where this constraint is
> > > > > 372 violated, the L-flag MUST be considered set for this application.
> > > > >
> > > > > [major] Tying these two paragraphs together... If one of the sub-TLVs
> > > > > has the L-flag set, then all the sub-TLVs that include at least one
> > > > > common application MUST be considered as having the L-flag set as
> > > > > well. This seems to become an attack vector: a rogue IS can set the
> > > > > L-flag (and/or set application bits) in all/some of the
> > > > > sub-TLVs...which may result in no attribute information (if the
> > > > > sub-sub-TLVs were the only source of information and are ignored)
> for
> > > > > a link...
> > > > >
> > > > [Les:] The text says:
> > > >
> > > > "Link attribute sub-sub-TLVs for the corresponding link attributes MUST
> > > > NOT be advertised for the set of applications specified in the
> > > > Standard/User Application Identifier Bit Masks and all such
> > > > advertisements MUST be ignored on receipt."
> > > >
> > > > There is no reason to send multiple sub-TLVs w L-bit set on a given link
> > > > because by definition such a sub-TLV MUST NOT have any sub-sub-
> TLVs.
> > > >
> > > > Authentication (as always) is our protection against attacks.
> > >
> > > [major] No, not against an IS that has been taken over: an attacker
> > > has access to it, its configuration, etc., it is rogue.
> > > Authentication only proves that the IS is the IS it says it is, not
> > > that it is not sending malicious information.
> > >
> > > To be clear, I'm not asking for the rogue node problem to be solved in
> > > this document. Just that the risks are recognized.
> > >
> > > I'm mentioning this point about rogue nodes because that is the new
> > > focus of the SEC area. I really don't want to go forward with
> > > Security Considerations consisting of a single line...but if you
> > > prefer to discuss with the SecDir/SEC AD, I'm fine with it. :-)
> > >
> > [Les:] Security discussions always seem to be a bit of a tug-of-war.
> > What you seem to be saying is that if an attacker gets "the keys", it
> > can fill a TLV with misinformation. I totally agree. But how are the new
> > TLVs defined in this document any different in this regard than existing
> > TLVs?
> >
> > An attacker today - given it has the keys - could advertise bogus neighbors
> > or bogus metrics or...
> >
> > ??
> 
> True.  However, this documents introduces something new that the
> attacker can do: it can signal application specific information.
> Before this document, the attacker didn't have the ability to pinpoint
> the attack to specific applications...
> 

[Les3:] Text has been added to the security section mentioning that the fact that advertisements may be application specific the impact of an attacker may be limited to a specific application.

> The case mentioned above (inconsistently setting the L-flag to cause
> the advertisements to be ignored) is also not a simple thing to
> troubleshoot!
> 
> 
> 
> ...
> > > 634 This document requests a new IANA registry be created to control
> the
> > > 635 assignment of sub-sub-TLV codepoints for the Application Specific
> > > 636 Link Attributes sub-TLV. The suggested name of the new registry is
> > > 637 "sub-sub-TLV code points for application specific link attributes".
> > > 638 The registration procedure is "Expert Review" as defined in
> > > 639 [RFC8126]. The following assignments are made by this document:
> ...
> > > [major] If the legacy specifications are extended, is it expected that
> > > new sub-sub-TLVs will also be created? If so, there need to be
> > > explicit instructions to the DEs in the legacy registries.
> > >
> > [Les:] Since the draft specifies that new applications MUST NOT use legacy
> > sub-TLVs, the case you are concerned with cannot arise.
> 
> I was thinking more of the existing applications extending the legacy...
> 

[Les3:] Existing text says:

" Note to designated experts: If a link attribute can be advertised
   both as a sub-TLV of TLVs 22, 23, 25, 141, 222, and 223 and as a sub-
   sub-TLV of the Application Specific Link Attributes sub-TLV defined
   in this document, then the same numerical code should be assigned to
   the link attribute whenever possible."

I believe this covers the case you mention.

> 
> 
> > > ...
> > > 663 This document requests a new IANA registry be created, under the
> > > 664 category of "Interior Gateway Protocol (IGP) Parameters", to
> > > control
> > > 665 the assignment of Application Identifier Bits. The suggested name
> > > of
> > > 666 the new registry is "Link Attribute Applications". The registration
> > > 667 policy for this registry is "Standards Action" ([RFC8126] and
> > > 668 [RFC7120]). The following assignments are made by this document:
> > >
> > > [minor] If we're setting up a applications, why not make it generic:
> > > "IGP Applications", for example...??
> > >
> > [Les:] Because this is defining bit positions which only apply to the
> > SABM/UDABM fields in the new ASLA sub-TLV.
> 
> For now...
> 

[Les3:] You are speculating that we will find some other use case for SABM?

The problem with changing the name as you suggest is that it would allow
for an application which is not associated with a Link Attribute e.g., some 
sort of node context. In which case that bit couldn't be advertised 
in the existing sub-TLVs. We would then have to specify which standard
bit values are legal to set in the ASLA advertisements and which are not.

I don't find this complication attractive.

> 
> 
> > > [minor] s/"Standards Action" ([RFC8126] and [RFC7120])./"Standards
> > > Action" [RFC8126]. Standards Action is only defined in rfc8126;
> > > the reference to rfc7120 is not needed.
> > >
> > [Les:] I copied this from RFC8665. Are you saying that document is
> incorrect?
> 
> I am.

[Les:3] Appropriate corrections have been made.

> 
> 
> ...
> > > 670 Bit # Name
> > > 671 ---------------------------------------------------------
> > > 672 0 RSVP-TE (R-bit)
> > > 673 1 Segment Routing Traffic Engineering (S-bit)
> > > 674 2 Loop Free Alternate (F-bit)
> > >
> > > [major] Add a line to cover the rest of the range and call it "Unassigned".
> > >
> > [Les:] Done
> 
> The registry can't say "Additional bits are undefined".  The correct
> text shold be:
> 
>    3-1015   Unassigned

[Les3:] In earlier versions SABM Length  is unbounded. But per our discussion, I have introduced an arbitrary upper bound on this length (8 - which translates to a maximum of 64 application bits). This then allows the corrected text you suggested.
As a practical matter, limiting SABM Length makes some sense since it ensures there will be room in the sub-TLV for link attribute information.
I believe 64 applications is well beyond the number that will ever be defined.

> 
> 
> 
> > > 676 This document requests a new IANA registry be created to control
> the
> > > 677 assignment of sub-TLV types for the application specific SRLG TLV.
> > > 678 The suggested name of the new registry is "Sub-TLVs for TLV 238".
> > > 679 The registration procedure is "Expert Review" as defined in
> > > 680 [RFC8126]. The following assignments are made by this document:
> > >
> > > [major] Indicate where this registry should be created.
> > >
> > [Les:] Done
> 
> That didn't make it in.

[Les3:] Thanx - corrected.

> 
> 
> 
> ...
> > > 682 Value Description
> > > 683 ---------------------------------------------------------
> > > 684 0-3 Unassigned
> > > 685 4 Link Local/Remote Identifiers (see [RFC5307])
> > > 686 5 Unassigned
> > > 687 6 IPv4 interface address (see [RFC5305])
> > > 688 7 Unassigned
> > > 689 8 IPv4 neighbor address (see [RFC5305])
> > > 690 9-11 Unassigned
> > > 691 12 IPv6 Interface Address (see [RFC6119])
> > > 692 13 IPv6 Neighbor Address (see [RFC6119])
> > > 693 14-255 Unassigned
> > >
> > > [major] Do you want the reference to the assignments to be this
> > > document, the RFC where the encoding is defined, or both? I would
> > > suggest both. Please add a column to reflect that: e.g.,
> > > "[RFC5307] [This Document]"...and take out the "(see ...)" text.
> > >
> > [Les:] I added another column for "Encoding Reference"
> 
> [nit] That's fine, but please add a note to indicate that the
> reference (for new values) should be the document where the encoding
> is defined and not where the value is assigned (which is what most
> people consider the default).
> 

[Les3:] Done

> 
> 
> > > 695 9. Security Considerations
> ...
> > > And then there are possible vulnerabilities introduced by this
> > > document. I put some comments above about the ability of a rogue
> > > router to render the data unusable by setting, for example the L-flag,
> > > or sending conflicting values. At best, this action could result in
> > > sub-optimal paths (by taking some links out of consideration)...
> > > Consider adding text related to that.
> >
> > [Les:] I have a harder time with this suggestion and so did not incorporate
> > it. See my replies above.
> 
> See my replies above...

[Les3:]  As previously mentioned, some text has been added.

   Les