Re: [Lsr] draft-ietf-isis-mpls-elc & draft-ietf-ospf-mpls-elc

"Les Ginsberg (ginsberg)" <ginsberg@cisco.com> Mon, 19 November 2018 18:00 UTC

Return-Path: <ginsberg@cisco.com>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 668DD12D4E9; Mon, 19 Nov 2018 10:00:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.97
X-Spam-Level:
X-Spam-Status: No, score=-14.97 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.47, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zAS_suNM37Cf; Mon, 19 Nov 2018 10:00:26 -0800 (PST)
Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C26CA130DC7; Mon, 19 Nov 2018 10:00:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=15572; q=dns/txt; s=iport; t=1542650425; x=1543860025; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=O8PuJyvBOhueQ72ZUKVq+cWAaN9MMpuO3xjc8IIUwtk=; b=LN1lKwpOAZyJrqHlZY6zAJU3V6m3hiYbSyFsTTCMfyG7tYLwsxxsaxRP RZUNMu3n2ObYfqxNUEhtL6AinC38SE4/vdeozN91pEH7Ab3cC+GNCNCKZ FbvayHZXLHHWkW20U5hnRGanyi0KsrM273mQ3L7D+FnP6+5LRkptttAVl I=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ADAADc+PJb/49dJa1jGQEBAQEBAQEBAQEBAQcBAQEBAQGBUQQBAQEBAQsBgQ12ZoECJwqMBot9gg16kGiFVBSBZgsBAYRsAoNtIjQJDQEDAQECAQECbSiFPAEBAQEDLUELEAIBCBEEAQEvMh0IAQEEAQ0FCBODB4EdZKkUih+MBReBQD+BEYJdNYRLARIBhXoCiQCFeIYzikQJApEdIIFYhQiKHZdvAhEUgScfOGRxcBU7gmyCJxeOHEExjBENFweBAYEfAQE
X-IronPort-AV: E=Sophos;i="5.56,253,1539648000"; d="scan'208,217";a="481814520"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 19 Nov 2018 18:00:15 +0000
Received: from XCH-RCD-003.cisco.com (xch-rcd-003.cisco.com [173.37.102.13]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id wAJI0Bwb013924 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Mon, 19 Nov 2018 18:00:14 GMT
Received: from xch-aln-001.cisco.com (173.36.7.11) by XCH-RCD-003.cisco.com (173.37.102.13) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Mon, 19 Nov 2018 12:00:12 -0600
Received: from xch-aln-001.cisco.com ([173.36.7.11]) by XCH-ALN-001.cisco.com ([173.36.7.11]) with mapi id 15.00.1395.000; Mon, 19 Nov 2018 12:00:11 -0600
From: "Les Ginsberg (ginsberg)" <ginsberg@cisco.com>
To: "stephane.litkowski@orange.com" <stephane.litkowski@orange.com>, "lsr@ietf.org" <lsr@ietf.org>
CC: "spring@ietf.org" <spring@ietf.org>
Thread-Topic: draft-ietf-isis-mpls-elc & draft-ietf-ospf-mpls-elc
Thread-Index: AdR4OJWYmH00pYTzTK6gvxR+PFXbGgH+ARaQ
Date: Mon, 19 Nov 2018 18:00:11 +0000
Message-ID: <a68386836e63444b940d5d49fcf39496@XCH-ALN-001.cisco.com>
References: <9208_1541773820_5BE599FC_9208_47_1_9E32478DFA9976438E7A22F69B08FF924B746E6A@OPEXCLILMA4.corporate.adroot.infra.ftgroup>
In-Reply-To: <9208_1541773820_5BE599FC_9208_47_1_9E32478DFA9976438E7A22F69B08FF924B746E6A@OPEXCLILMA4.corporate.adroot.infra.ftgroup>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.42.169]
Content-Type: multipart/alternative; boundary="_000_a68386836e63444b940d5d49fcf39496XCHALN001ciscocom_"
MIME-Version: 1.0
X-Outbound-SMTP-Client: 173.37.102.13, xch-rcd-003.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/xxKrFXIncKWW9OTFv2upvUnz2oc>
Subject: Re: [Lsr] draft-ietf-isis-mpls-elc & draft-ietf-ospf-mpls-elc
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Nov 2018 18:00:31 -0000

Stephane -

The use case for this proposal is to support inter-AS scenarios in the absence of a controller.
If the WG agrees that this use case needs to be addressed I believe the proposal below is a good and viable compromise.

I say "compromise" because - as you mention below - ELC/ELRD are functionally node capabilities. But the inter-AS use case requires signaling between AS's and the vehicle we have for doing that is a prefix advertisement. The compromise is to advertise ELC associated with a prefix - but not do so for ERLD.
This seems reasonable to me.

One change to what you state below - I think "when a prefix is leaked or redistributed, the ELC associated to the prefix MUST also be leaked/redistributed.".

   Les


From: Lsr <lsr-bounces@ietf.org> On Behalf Of stephane.litkowski@orange.com
Sent: Friday, November 09, 2018 6:30 AM
To: lsr@ietf.org
Cc: spring@ietf.org
Subject: [Lsr] draft-ietf-isis-mpls-elc & draft-ietf-ospf-mpls-elc

Hi WG,

Some discussions occurred on the mailing list on how to encode the entropy label capability for SR but we hadn't found a consensus on the target solution.
IETF 103 was the opportunity to meet face to face various people that have participated to this discussion.

Following this discussion, we are coming with the following proposal that the WG need to validate:

The entropy label capability is still considered as a per node property (for simplicity reason, we do not want to have an ELC per linecard).
The ERLD is considered as a per node property (for simplicity reason, we do not want to have an ERLD per linecard).

However IGPs may advertise prefixes that are not belonging to the node itself in addition to the local prefixes of the nodes.
A typical use case is when two IGP domains (running the same protocol or a different one) are redistributing routes between each other.
The inter-area use case is also creating a similar situation.

When an ingress node pushes an entropy label below a segment  it must ensure that the tail-end of the segment is entropy label capable otherwise packets will be dropped.

As a consequence, when prefixes are redistributed, the entropy label capability of the node who has firstly originated the prefix, should be associated to the prefix during the redistribution.

In terms of encoding, we propose to associate an entropy label capability for each prefix advertised by a node.
The entropy label capability will be encoded as part of the Prefix Attributes IGP extension (RFC7794 and RFC7684).
The entropy label capability may be set for local prefixes (e.g. loopbacks) by a local configuration and for leaked/redistributed prefixes. When a prefix is leaked or redistributed, the ELC associated to the prefix may be also leaked/redistributed.

An ingress should set the entropy label below a Node/Prefix segment only if the prefix associated to the Node/Prefix segment as the ELC set in the Prefix Attributes.
An ingress should set the entropy label below an Adjacency segment only if the adjacent neighbor of the node that has advertised the Adj SID is advertising an ERLD (and so is entropy label capable).

For the binding SID, as IGPs are not involved in the signaling of the binding SID, there is nothing to do in these drafts.


Let us know your comments/feedback on this proposal so we can progress these documents.

Brgds,

Stephane


_________________________________________________________________________________________________________________________



Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc

pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler

a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,

Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.



This message and its attachments may contain confidential or privileged information that may be protected by law;

they should not be distributed, used or copied without authorisation.

If you have received this email in error, please notify the sender and delete this message and its attachments.

As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.

Thank you.