Re: [Lsr] Comments on Requested Codepoints for draft-li-lsr-isis-area-proxy

Christian Hopps <chopps@chopps.org> Thu, 25 June 2020 00:17 UTC

Return-Path: <chopps@chopps.org>
X-Original-To: lsr@ietfa.amsl.com
Delivered-To: lsr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C4703A1205; Wed, 24 Jun 2020 17:17:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Sq0MUVhkryf3; Wed, 24 Jun 2020 17:17:51 -0700 (PDT)
Received: from smtp.chopps.org (smtp.chopps.org [54.88.81.56]) by ietfa.amsl.com (Postfix) with ESMTP id E91DF3A11EE; Wed, 24 Jun 2020 17:17:50 -0700 (PDT)
Received: from stubbs.int.chopps.org (047-050-069-038.biz.spectrum.com [47.50.69.38]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by smtp.chopps.org (Postfix) with ESMTPSA id 477FC60F30; Thu, 25 Jun 2020 00:17:50 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
From: Christian Hopps <chopps@chopps.org>
In-Reply-To: <3276AA3E-F540-41B6-A4DC-4FCD1CD57EFF@tony.li>
Date: Wed, 24 Jun 2020 20:17:49 -0400
Cc: Christian Hopps <chopps@chopps.org>, Les Ginsberg <ginsberg@cisco.com>, "draft-li-lsr-isis-area-proxy.authors@ietf.org" <draft-li-lsr-isis-area-proxy.authors@ietf.org>, "lsr@ietf.org" <lsr@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <BB07F8C1-DC0A-4D84-900F-753AAFF3993E@chopps.org>
References: <BY5PR11MB4337892CA6ADFD4F2E9B653FC1990@BY5PR11MB4337.namprd11.prod.outlook.com> <EB07BFF9-B4AF-41BE-94F0-25E229FA25FD@tony.li> <BY5PR11MB4337E58E8B775A7086281C21C1990@BY5PR11MB4337.namprd11.prod.outlook.com> <29A0CD92-1D33-4B06-B0CF-D17BE89A9B60@tony.li> <BY5PR11MB4337A5745218D4C36D45ACDCC1960@BY5PR11MB4337.namprd11.prod.outlook.com> <3276AA3E-F540-41B6-A4DC-4FCD1CD57EFF@tony.li>
To: Tony Li <tony.li@tony.li>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsr/ymaon3lhD5dpORIXwtjxpF_UCm4>
Subject: Re: [Lsr] Comments on Requested Codepoints for draft-li-lsr-isis-area-proxy
X-BeenThere: lsr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Routing Working Group <lsr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsr>, <mailto:lsr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsr/>
List-Post: <mailto:lsr@ietf.org>
List-Help: <mailto:lsr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsr>, <mailto:lsr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jun 2020 00:17:56 -0000


> On Jun 21, 2020, at 12:50 PM, tony.li@tony.li wrote:
> 
> 
> Les,
> 
>> We don’t have to resolve this now.
>> One of my motivations for sending this was related to Early Allocation of code points. Since you have already asked once, I am assuming that if WG adoption is achieved it will be swiftly followed by an early allocation request – and as one of the Designated Experts I wanted to share my concerns sooner rather than later.
> 
> 
> I appreciate that.  Do others share Les’ perspective on the relative tradeoffs?  Especially our other Desginated Experts?

[Designated Expert hat]

I agree that we should try and reduce the number of top-level TLV allocations being made here.

[WG member hat]

I think using router capabilities to eliminate the Area Proxy TLV is one choice, and you shouldn't be afraid of storing some capability related extra octets in it, plenty of other users do this already.

However, if you're still going to need a top-level TLV for "Inside Node" (perhaps b/c we fear using a Router Capability TLVs in pseudo-node?), then why not create a single top level "Area Proxy TLV" for all Area Proxy uses (i.e., make the current "Area Proxy TLV" and "Inside Node TLV" sub-TLVs of that top-level container) instead?

Thanks,
Chris.
[see above for hats]

> 
> 
>> Would this argue for advertising “this is a boundary circuit” in pseudo-node LSPs for boundary circuits rather than advertising “inside” on all inside pseudo-nodes?
>>   
>> You could do it that way.  It inverts the semantics and inverts the deployment.  Logically, it should have the same effect.  However, it then is seen by outside nodes.  Since they need not support Area Proxy, this seemed like a riskier approach, thus we opted for marking inside pseudonodes.
>>  
>> [Les:] My point was largely motivated by the statement in the draft:
>>  
>> “Area Proxy Boundary multi-access circuits (i.e.  Ethernets in LAN
>>    mode) with multiple Inside Edge Routers on them are not supported.”
>>  
>> So it seems advantageous to be able to prevent this from happening – which requires some signaling on the circuit in question.
> 
> 
> 
> I think that the case that you’re concerned about is already easily detected.  Recall that an Inside Edge router will generate IIH’s onto a boundary circuit using the Proxy system ID.  Thus, if an Inside Edge router receives an IIH with a source address of it’s own proxy system id, then it has encountered this issue.
> 
> Tony
> 
> 
> _______________________________________________
> Lsr mailing list
> Lsr@ietf.org
> https://www.ietf.org/mailman/listinfo/lsr