Re: [Lsvr] Comments on LSVR with RR peering

"Acee Lindem (acee)" <acee@cisco.com> Thu, 06 December 2018 02:30 UTC

Return-Path: <acee@cisco.com>
X-Original-To: lsvr@ietfa.amsl.com
Delivered-To: lsvr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27D9F130DD0 for <lsvr@ietfa.amsl.com>; Wed, 5 Dec 2018 18:30:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.959
X-Spam-Level:
X-Spam-Status: No, score=-15.959 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-1.459, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EqzWC5isUMGv for <lsvr@ietfa.amsl.com>; Wed, 5 Dec 2018 18:30:51 -0800 (PST)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0D940130DCD for <lsvr@ietf.org>; Wed, 5 Dec 2018 18:30:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4796; q=dns/txt; s=iport; t=1544063450; x=1545273050; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=PYaJDBuU4MxGciYyEe01O/etbslSpYaJ5fpNQ6FpZKA=; b=GHfIVz9Al5r8ptjm7xmMGyMwi0EGRm08zzCm6TzsaokAsek+HSY8pMRg HXlIHqUKyQtaWLWQdfjRafIdMg/wtNG20a4TwJG5c0KaRaLptgBosMe6c /NUSDFRfItdzB7Di8fxgycldMQlEvuh50KsYiy6bMsDMxFXuAjfR8kzA6 E=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AFAADqiAhc/5pdJa1kGQEBAQEBAQEBAQEBAQcBAQEBAQGBUgMBAQEBAQsBggNmgQInCoNwljOXTIF6CwEBGAuESQIXgnoiNQgNAQMBAQIBAQJtHAyFPAEBAQEDAQEhEToXBAIBCBEEAQEDAiYCAgIlCxUICAIEARKDIQGCAQ+le4EviioFgQuLExeBf4EQAScfgh4ugx4BAYIHgl4xgiYCoFYJApFAGJEviQmPTgIRFIEnIAE2gVVwFTsqAYJBgicXiF6FP0ExikGBHwEB
X-IronPort-AV: E=Sophos;i="5.56,320,1539648000"; d="scan'208";a="495356652"
Received: from rcdn-core-3.cisco.com ([173.37.93.154]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 06 Dec 2018 02:30:49 +0000
Received: from XCH-RTP-011.cisco.com (xch-rtp-011.cisco.com [64.101.220.151]) by rcdn-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id wB62UnEU008926 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 6 Dec 2018 02:30:49 GMT
Received: from xch-rtp-015.cisco.com (64.101.220.155) by XCH-RTP-011.cisco.com (64.101.220.151) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Wed, 5 Dec 2018 21:30:48 -0500
Received: from xch-rtp-015.cisco.com ([64.101.220.155]) by XCH-RTP-015.cisco.com ([64.101.220.155]) with mapi id 15.00.1395.000; Wed, 5 Dec 2018 21:30:48 -0500
From: "Acee Lindem (acee)" <acee@cisco.com>
To: "Jakob Heitz (jheitz)" <jheitz@cisco.com>, Eric Rosen <erosen@juniper.net>, "lsvr@ietf.org" <lsvr@ietf.org>
Thread-Topic: [Lsvr] Comments on LSVR with RR peering
Thread-Index: AQHUjP9eWk8mpUn4x068f8Q4VXKv3qVw8YWAgAAL4QA=
Date: Thu, 06 Dec 2018 02:30:48 +0000
Message-ID: <CDC70072-D4BD-4AC3-8FE9-77D277E8C14E@cisco.com>
References: <03969A4B-D786-47FB-BCD8-A4F6A36B9534@cisco.com> <5f08d81c0c1d48a5ab9e35d06d2e8f97@XCH-ALN-014.cisco.com>
In-Reply-To: <5f08d81c0c1d48a5ab9e35d06d2e8f97@XCH-ALN-014.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.116.152.196]
Content-Type: text/plain; charset="utf-8"
Content-ID: <0857A437B63D474BBB211D179059DE1B@emea.cisco.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Outbound-SMTP-Client: 64.101.220.151, xch-rtp-011.cisco.com
X-Outbound-Node: rcdn-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/lsvr/YhSRDVBNqqlymQQspoOJLocglkU>
Subject: Re: [Lsvr] Comments on LSVR with RR peering
X-BeenThere: lsvr@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Link State Vector Routing <lsvr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lsvr>, <mailto:lsvr-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lsvr/>
List-Post: <mailto:lsvr@ietf.org>
List-Help: <mailto:lsvr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lsvr>, <mailto:lsvr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Dec 2018 02:30:56 -0000


On 12/5/18, 8:56 PM, "Jakob Heitz (jheitz)" <jheitz@cisco.com> wrote:

    Route reflectors work in traditional BGP, because there is an IGP
    that connects the BGP speakers.
    
    I think Eric is pointing out that if you are using the routes
    on the controller to connect to the controller, you are on very
    fragile ground.

I agree - you wouldn't want to do this. 

Thanks,
Acee
    
    Regards,
    Jakob.
    
    -----Original Message-----
    From: Lsvr <lsvr-bounces@ietf.org> On Behalf Of Acee Lindem (acee)
    Sent: Wednesday, December 5, 2018 5:03 PM
    To: Eric Rosen <erosen@juniper.net>; lsvr@ietf.org
    Subject: Re: [Lsvr] Comments on LSVR with RR peering
    
    Hi Eric, 
    
    I don't think such a topology would work very well even with traditional BGP. We'll document some reasonable scoping rules on sparse peering in the  LSVR Applicability document. 
    
    Thanks,
    Acee 
    
    On 12/4/18, 9:17 AM, "Lsvr on behalf of Eric Rosen" <lsvr-bounces@ietf.org on behalf of erosen@juniper.net> wrote:
    
        One of the more intriguing aspects of LSVR is the apparent ability to 
        pass the link state updates through a route reflector, thereby 
        minimizing the flooding load (both send and receive) on the routers.
        
        However, this won't work unless there is a method to ensure that each 
        router's BGP session to the RR will not become inoperable due to routing 
        changes.
        
        So let's look at the following topology (the ascii art requires a fixed 
        with font, of course):
        
        
        RR--1--A--1--B--1--C--1--D--1--E
                      |                 |
                      |-----5-----F--1--|
        
        The letters represent routers (RR being the Route Reflector), and the 
        numbers are link metrics.
        
        Suppose BC goes down, and consider the following sequence of events:
        
        1. B tells RR (via path B-A-RR) that BC is down.
        
        2. RR tells A (via path RR-A) that BC is down.
        
        3. RR tells F (via path RR-A-B-F) that BC is down.
        
        4. RR tells E (via path RR-A-B-F-E) that BC is down.
        
        Note that at this point, neither C nor D can send traffic to RR:
        
        - Since D doesn't yet know about BC's failure, D will think its path to 
        RR is DCBA.
        
        - C does know about the BC failure (since the failure is local), so it 
        thinks its path to RR is CDEFBA.
        
        As a result, traffic from C or D to RR will loop between C and D.
        
        Since TCP requires two-way connectivity, this means that RR cannot 
        reliably talk BGP to C or D until the loop is broken.
        
        To break the loop, RR has to tell D that BC is down.
        
        But RR can't tell D that BC is down until the loop is broken.
        
        This seems like a deadlock that could result in a long-lasting loop.
        
        Did I miss something?
        
        
        
        
        
        
        _______________________________________________
        Lsvr mailing list
        Lsvr@ietf.org
        https://www.ietf.org/mailman/listinfo/lsvr
        
    
    _______________________________________________
    Lsvr mailing list
    Lsvr@ietf.org
    https://www.ietf.org/mailman/listinfo/lsvr