Re: [Lsr] Alvaro Retana's Discuss on draft-ietf-lsr-ospf-reverse-metric-08: (with DISCUSS and COMMENT)

Ketan Talaulikar <ketant.ietf@gmail.com> Thu, 06 October 2022 12:13 UTC

Return-Path: <ketant.ietf@gmail.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65436C1524C1; Thu, 6 Oct 2022 05:13:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x2-krhkPFdLS; Thu, 6 Oct 2022 05:13:40 -0700 (PDT)
Received: from mail-ua1-x930.google.com (mail-ua1-x930.google.com [IPv6:2607:f8b0:4864:20::930]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D344EC14F741; Thu, 6 Oct 2022 05:13:40 -0700 (PDT)
Received: by mail-ua1-x930.google.com with SMTP id e22so563785uar.5; Thu, 06 Oct 2022 05:13:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=L5oOVT+Le40nOd6qsI7GAg4aqwkxw+MgFHMrsFH1uJY=; b=ozLdSJr26hNpjqta8fDAFpwRKSDaF8OJ07SrbhZ52JiA9XIHPcotmbcOdbzV8HDIXZ fB2UEjkW8Xgm+w0f3XOdRoBzaSQ5tM646dOt2k34c9CHe3GviH6IwkDECGPw+z1y2fzV poR2qSCJ5lh4Rzti9/WtXJHox38UfESCMnC9UwNSK/6eYAP0t1d76IVDXudXIwCa24hr m39gNxW6czf90uLzrMUh0dI4UBrbuFz03m9wovFy1Zdh/vEYxjw93oPYZLjAyaYi2ymn tqBnvkv6q+SxSZiTGYu6CdaKesUIW9cJY/povr0haueVJmHj4U22bPtIsYQUiico7EWX sTkQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=L5oOVT+Le40nOd6qsI7GAg4aqwkxw+MgFHMrsFH1uJY=; b=a6JXPOxtUznwHnkdW4w+ReDA8EaREadmFY3NU2Bc5Kit5XoToDDQMeiEXvZHmNugJW Iio7gtCGogexLX8VIaSY2dCbdXGULsg8SNeJYAJWJukQuVG9xQHRfPXHUAUZ5VE0vQEi ZqPdErXtD2YKAO0OO9MgNUXnSgH3i2fkyBpUqjD7XOLAqp/r9M4Ixx5VbrGfofjh68LQ rKppkKwF/mW8qn1WdgwKVYt3agzuLSGEZOibDz3+JE3vNwnuh8s2TPQVuVjTLkXZdimB 8zt2FI4gRIfOMILc6cwStbeDKksN9gk5AkV3GORY7zhOs092pKE3c5MqYhoIk5caVkI3 49Xg==
X-Gm-Message-State: ACrzQf2FnXmpMiR6OD5Vgy38gxr+sPl1niHWnUFr2fU7xMDG52F/UrtF b7WuOB1rimokNp9SA5HUaXv/6AGPITqYvgonlJo=
X-Google-Smtp-Source: AMsMyM5F8LwaH2+MLVM8Nt6O32SDPzcrKqsQ5X88/X1P+1pPn0RLpmRHz1AJSl5Q1KfFMWkLnhtDOe8lYkua8Oa+IEk=
X-Received: by 2002:ab0:78d:0:b0:3da:ecc4:bdc6 with SMTP id c13-20020ab0078d000000b003daecc4bdc6mr2516164uaf.27.1665058419874; Thu, 06 Oct 2022 05:13:39 -0700 (PDT)
MIME-Version: 1.0
References: <166501751908.33806.8188107382468860325@ietfa.amsl.com> <CAH6gdPxBic506B9U_+-JAvn05_LhuNgR8ErQX4X++=Wa712w+A@mail.gmail.com> <CAMMESsw1Euc2uvwbxyiEV1q2w9ewW7VCU-PZmBJ_BW9u19MntQ@mail.gmail.com> <CAH6gdPwH02EjP4an7--_kaeNH6+5pw=k22mN9bX1UPQc8fLEKA@mail.gmail.com> <CAMMESsypbfuEoPtdaT4H3kk3btLG1tyKYODYnZaBwd50fGFH+g@mail.gmail.com>
In-Reply-To: <CAMMESsypbfuEoPtdaT4H3kk3btLG1tyKYODYnZaBwd50fGFH+g@mail.gmail.com>
From: Ketan Talaulikar <ketant.ietf@gmail.com>
Date: Thu, 06 Oct 2022 17:43:28 +0530
Message-ID: <CAH6gdPzA4QS1MEaNhgbDaRDrqo5CQpi-bFF4XHbgq4tqurFUkg@mail.gmail.com>
To: Alvaro Retana <aretana.ietf@gmail.com>
Cc: acee@cisco.com, The IESG <iesg@ietf.org>, draft-ietf-lsr-ospf-reverse-metric@ietf.org, lsr-chairs@ietf.org, lsr@ietf.org, chopps@chopps.org
Content-Type: multipart/alternative; boundary="000000000000a59eb305ea5c9f9f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/vvt07DBve0AlISDiPgHTMJ-3_3I>
Subject: Re: [Lsr] Alvaro Retana's Discuss on draft-ietf-lsr-ospf-reverse-metric-08: (with DISCUSS and COMMENT)
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Oct 2022 12:13:45 -0000

Hi Alvaro,

Please check inline with KT3 for response.


On Thu, Oct 6, 2022 at 5:29 PM Alvaro Retana <aretana.ietf@gmail.com> wrote:

> On October 6, 2022 at 7:44:51 AM, Ketan Talaulikar wrote:
>
>
> Ketan:
>
>
> > > > > (1) The main behavior in this document (using the reverse metric)
> is
> > > > > covered in the following sentences:
> > > > >
> > > > > §6:
> > > > > A router receiving a Hello packet from its neighbor that contains
> the
> > > > > Reverse Metric TLV on a link SHOULD use the RM value to derive the
> > > > > metric for the link to the advertising router in its Router-LSA...
> > > > >
> > > > > ...
> > > > > The neighbor SHOULD use the reverse TE metric value...
> > > > >
> > > > > §7:
> > > > > Implementations SHOULD NOT accept the RM from its neighbors by
> default
> > > > > and SHOULD provide a configuration option to enable the acceptance
> of
> > > > > the RM from neighbors on specific links.
> > > > >
> > > > > For all cases, why is this behavior recommended and not required?
> When
> > > > > is it ok to not use the RM, or to accept it by default?
> > > >
> > > > KT> This feature is expected to be used in specific deployments and
> use
> > > > cases. This behavior is not something that is enabled by default -
> this
> > > > applies to both the sending and the receiving side. If the feature
> is not
> > > > properly configured/enabled, e.g. if there is a misbehaving router
> (as in
> > > > the case pointed out by Martin), we don't want this to affect the
> network.
> > >
> > > I understand all that.
> > >
> > > However, the specification should be written and interpreted in the
> > > context of using the extension. IOW, if the RM is being used what
> > > should be the behavior? Is it only recommended that the RM be used
> > > (even after enabling the configuration knob)? Or should it be
> > > required?
> > >
> > > From your answer I would expect §7 to require configuration (default =
> > > off). Why is it only recommended?
> >
> > KT2> I think that I now understand your point. Indeed, we need the MUST
> for
> > both the config for sending and receiving/accepting part. How about the
> > following change?
> >
> > <OLD>
> > Implementations MUST NOT signal reverse metric to neighbors by default
> and
> > MUST provide a configuration option to enable the signaling of reverse
> metric
> > on specific links. Implementations SHOULD NOT accept the RM from its
> neighbors
> > by default and SHOULD provide a configuration option to enable the
> acceptance
> > of the RM from neighbors on specific links.
> > </OLD>
> >
> > <NEW>
> > Implementations MUST NOT signal reverse metric to neighbors by default
> and
> > MUST provide a configuration option to enable the signaling of reverse
> metric
> > on specific links. Implementations MUST NOT accept the RM from its
> neighbors
> > by default and MUST provide a configuration option to enable the
> acceptance of
> > the RM from neighbors on specific links.
> > </NEW>
>
> Yes, that works.
>
> What about the SHOULDs from §6?  If accepting RM has been enabled,
> when is it ok to not accept it?   I'm assuming that if the
> configuration was turned on then the user wants to receive the RM, and
> that a misbehavior is addressed separately (back-off, etc.).
>

KT3> That SHOULD is qualified by what is in the brackets (i.e., reference
to sec 7 for enablement). Plus, we have also recently added text in
security considerations when the receiver would ignore RM if it saw
instability in the RM signaling.

Thanks,
Ketan


>
>
> Alvaro.
>