[Lsvr] Comments on LSVR with RR peering

Eric Rosen <erosen@juniper.net> Tue, 04 December 2018 14:17 UTC

Return-Path: <erosen@juniper.net>
X-Original-To: lsvr@ietfa.amsl.com
Delivered-To: lsvr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29AF7130DD5 for <lsvr@ietfa.amsl.com>; Tue, 4 Dec 2018 06:17:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.161
X-Spam-Level:
X-Spam-Status: No, score=-4.161 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.46, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HgRlxX8sWsOJ for <lsvr@ietfa.amsl.com>; Tue, 4 Dec 2018 06:17:12 -0800 (PST)
Received: from mx0a-00273201.pphosted.com (mx0a-00273201.pphosted.com [208.84.65.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ACF0C124BAA for <lsvr@ietf.org>; Tue, 4 Dec 2018 06:17:12 -0800 (PST)
Received: from pps.filterd (m0108158.ppops.net [127.0.0.1]) by mx0a-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wB4EEbvr018452 for <lsvr@ietf.org>; Tue, 4 Dec 2018 06:17:12 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : subject : date : message-id : content-type : content-id : content-transfer-encoding : mime-version; s=PPS1017; bh=zkgmY2sm0LOtISb5NdD247wvWlGeBwyDWb85VyBAJIc=; b=bea5o2kUx8Uq2f5G9C+AXx+yNOBYbLABWT7jnvsSIOijWBXs9bCSsWpFSAl/dx9A93bl 7J3AK+oK5A+bvrKJPxss2D6TPc3kcqKpmZeIuaxm/G9F189naR8bA0cmYh0HDTedbMdK NlENryXPxiToJg3r13x14PrnZ+DWVlo63F9iEb75JNn11+D0n7R3cfgaYBfnIrvtQZIa LJG0sPr3qZNthJgY859yt+Z84+kUcUQpUnQ7kOlvE8cf90SCmQi9Sez/eUkivmuknmWE 9ntmrM4RbvXZQW8WESkfO8ZrvEd1B1jtM9KtDRIGmCUx2NAsfVrcmBhlEIJqZ+6itmBr gw==
Received: from nam04-bn3-obe.outbound.protection.outlook.com (mail-bn3nam04lp2059.outbound.protection.outlook.com [104.47.46.59]) by mx0a-00273201.pphosted.com with ESMTP id 2p5qf30d7k-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <lsvr@ietf.org>; Tue, 04 Dec 2018 06:17:12 -0800
Received: from DM5PR0501MB3864.namprd05.prod.outlook.com (10.167.108.27) by DM5PR0501MB3845.namprd05.prod.outlook.com (10.167.108.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1404.14; Tue, 4 Dec 2018 14:17:09 +0000
Received: from DM5PR0501MB3864.namprd05.prod.outlook.com ([fe80::5543:1507:165b:1903]) by DM5PR0501MB3864.namprd05.prod.outlook.com ([fe80::5543:1507:165b:1903%2]) with mapi id 15.20.1404.016; Tue, 4 Dec 2018 14:17:09 +0000
From: Eric Rosen <erosen@juniper.net>
To: "lsvr@ietf.org" <lsvr@ietf.org>
Thread-Topic: Comments on LSVR with RR peering
Thread-Index: AQHUi9wKWk8mpUn4x068f8Q4VXKv3g==
Date: Tue, 04 Dec 2018 14:17:08 +0000
Message-ID: <2384fdea-b8f9-ea6d-5287-83f39908fcb0@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-clientproxiedby: BN3PR03CA0100.namprd03.prod.outlook.com (2603:10b6:400:4::18) To DM5PR0501MB3864.namprd05.prod.outlook.com (2603:10b6:4:7b::27)
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [66.129.241.13]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR0501MB3845; 6:zDPGYiFEzr5MAfHlbpROvaN48iuU60dvQ9uKvAhtQMqln7YVFSdhFynVhG8wcTRewFSvOD/uhiZ64lr78jcgg86ZxfRxUwTMBUYJQzw3Rlny8KMON+Ktc46TDO7Vrij/sAtOK2JlA02D9No1OD37gMFm3wacnM87f/SGGRMZidUUKZh5iSpuyfp43wt7yXzs7HTJMtvcxCB1zkvhvQMOAMukiz8qVX0RWojRiDW8q1Co6EchM8kUFdBh/LThJHDPGxMDT7hF1LJikbNUNcgatr5BSEgWoxiZj7dgNr6hDqG30p0wBrL3A34YzE7qR3yO9zGg355+yT1bYHsCresPv0UfpCgE/byYrZNUce1mZhts1civZYgXiraG9uFTQJSHwYB7d/bTeYXlyRvmbAKIwSk4bzvOthEtd6wbH5JCu0PTzrEaUeoWW14zIU1h2bKgbz7z83jwpOUgP+tF7110ag==; 5:StO5y1kuxxn+Lo1PBdjlKnvm37kG78eAdbXUYUzJnQTpBhBvBvb2H0upaJbsSMPzCvhs+aPPDN7Y6K/oqyeSyQXbFU1dVmPwq4EhSyGBzUSwAl7qE9yS1xfMsistGvknHtLu/VrLVO82K7wHOfyIR1lKDR7SfwYTsgTUtkPwVqk=; 7:rR0gOqFwYekixTF2Z85Tt30qQznsmk799m35IybL6nRsRjYXZnJBG5QqIiBdn+sOKEwgGdPiUTPNGP9cyMZtcbssHw3hbKl1i6QTqtJq20MS50lE7c3kjHHx89OzUMUYJyF0HhoPHscY7mLupryRPA==
x-ms-office365-filtering-correlation-id: d3b05abf-f91a-4ae2-3311-08d659f32cf8
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600074)(711020)(4618075)(2017052603328)(7153060)(7193020); SRVR:DM5PR0501MB3845;
x-ms-traffictypediagnostic: DM5PR0501MB3845:
x-microsoft-antispam-prvs: <DM5PR0501MB3845E325871A32DFF71EDBA4D4AF0@DM5PR0501MB3845.namprd05.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(8121501046)(5005006)(10201501046)(3002001)(93006095)(93001095)(3231455)(999002)(944501493)(52105112)(6055026)(148016)(149066)(150057)(6041310)(20161123562045)(20161123558120)(20161123560045)(201703131423095)(201703061421075)(201703161042150)(20161123564045)(6042181)(201708071742011)(7699051)(76991095); SRVR:DM5PR0501MB3845; BCL:0; PCL:0; RULEID:; SRVR:DM5PR0501MB3845;
x-forefront-prvs: 0876988AF0
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(199004)(189003)(71190400001)(99286004)(102836004)(26005)(186003)(31686004)(53936002)(52116002)(386003)(476003)(6506007)(7736002)(1730700003)(486006)(2616005)(6512007)(305945005)(81166006)(71200400001)(8676002)(81156014)(3846002)(6116002)(31696002)(25786009)(8936002)(2906002)(5660300001)(86362001)(68736007)(97736004)(36756003)(66066001)(5640700003)(2501003)(6436002)(6486002)(14454004)(6916009)(14444005)(256004)(106356001)(105586002)(498600001)(2351001)(557034004); DIR:OUT; SFP:1102; SCL:1; SRVR:DM5PR0501MB3845; H:DM5PR0501MB3864.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-microsoft-antispam-message-info: pE2GCSfKzTwMVTe0q1tHVUU0hkU+6VLnpnJ7vTWuMhChgtPvMVLpyujJj1UMS0AnnHFlaNBwadIkwgkymHY/5YPLTYtzkBA9yniKP/XjnXGzf5Njrakf0ShFNaLC5HalCKGBd18rkVaz+OkFpEW6FXKhwGjMizJH0D+yhSkiosCwzWEJ6ZkFcQJ3FA+vDjpyg6FpTkHibxEPV9gR61KKEoX3BNRGERx6aAl7ikikCZezzzcKe8iZVKFryUESi9Sza0oAYpLh6v8nBigD0a2Tlb6m7Et4ef3S/Gf2+NoFrVy8f6FAvJcz3L74YQ0AkeD1gi/ZLJqppGom+V4CUmkPh76lHxHW9jNqEJ8rHuejnEA=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <8CA68EE35F74CB4C963D781816CBF116@namprd05.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: d3b05abf-f91a-4ae2-3311-08d659f32cf8
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Dec 2018 14:17:08.9642 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR0501MB3845
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2018-12-04_07:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=775 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1812040121
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsvr/XnvHZcnrF73ig02331czDIVybpg>
Subject: [Lsvr] Comments on LSVR with RR peering
X-BeenThere: lsvr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Vector Routing <lsvr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsvr>, <mailto:lsvr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsvr/>
List-Post: <mailto:lsvr@ietf.org>
List-Help: <mailto:lsvr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsvr>, <mailto:lsvr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Dec 2018 14:17:16 -0000

One of the more intriguing aspects of LSVR is the apparent ability to 
pass the link state updates through a route reflector, thereby 
minimizing the flooding load (both send and receive) on the routers.

However, this won't work unless there is a method to ensure that each 
router's BGP session to the RR will not become inoperable due to routing 
changes.

So let's look at the following topology (the ascii art requires a fixed 
with font, of course):


RR--1--A--1--B--1--C--1--D--1--E
              |                 |
              |-----5-----F--1--|

The letters represent routers (RR being the Route Reflector), and the 
numbers are link metrics.

Suppose BC goes down, and consider the following sequence of events:

1. B tells RR (via path B-A-RR) that BC is down.

2. RR tells A (via path RR-A) that BC is down.

3. RR tells F (via path RR-A-B-F) that BC is down.

4. RR tells E (via path RR-A-B-F-E) that BC is down.

Note that at this point, neither C nor D can send traffic to RR:

- Since D doesn't yet know about BC's failure, D will think its path to 
RR is DCBA.

- C does know about the BC failure (since the failure is local), so it 
thinks its path to RR is CDEFBA.

As a result, traffic from C or D to RR will loop between C and D.

Since TCP requires two-way connectivity, this means that RR cannot 
reliably talk BGP to C or D until the loop is broken.

To break the loop, RR has to tell D that BC is down.

But RR can't tell D that BC is down until the loop is broken.

This seems like a deadlock that could result in a long-lasting loop.

Did I miss something?