Re: [mpls] Working Group Last Call on draft-ietf-mpls-summary-frr-rsvpte

"Mike Taillon (mtaillon)" <mtaillon@cisco.com> Thu, 09 May 2019 12:28 UTC

Return-Path: <mtaillon@cisco.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B61B1200A1; Thu, 9 May 2019 05:28:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=hpZy1620; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=SKUas2+Q
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TAhO3RFGcilW; Thu, 9 May 2019 05:28:48 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2B3D12009E; Thu, 9 May 2019 05:28:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=15043; q=dns/txt; s=iport; t=1557404927; x=1558614527; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=oFBDa3Lh6L7nNeKXtzfNX9zliXwY/pXLqFXG5EV8lQo=; b=hpZy1620gWymH7uo08WDJ0mHkelHHdP8BKlN06y3BnsnDVHItqxAzn0G PH8kWBSZ6zcPhf6WGfVwFydnPVa9tM06XOiQMJo3q8OEPD51rFfoQgakD pANwFv+ijgkQvZa/v6kpiDf6SqZ/1Ctmch66Qk+Yw5KX3th97i3PHDpb5 I=;
IronPort-PHdr: =?us-ascii?q?9a23=3Al0e/ZhHr9C5j0CFx8P0YwZ1GYnJ96bzpIg4Y7I?= =?us-ascii?q?YmgLtSc6Oluo7vJ1Hb+e4z1Q3SRYuO7fVChqKWqK3mVWEaqbe5+HEZON0pNV?= =?us-ascii?q?cejNkO2QkpAcqLE0r+efv2Zi0+GMNEfFRk5Hq8d0NSHZW2ag=3D=3D?=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AIAACHHNRc/5NdJa1kGgEBAQEBAgE?= =?us-ascii?q?BAQEHAgEBAQGBUQUBAQEBCwGBDi9QA2lVIAQLKIQRg0cDhFKKK4wWiRmETYE?= =?us-ascii?q?ugSQDVAYDAQEBDAEBGAEKCgIBAYRAAheBcSM0CQ4BAwEBBAEBAgEEbRwMhUs?= =?us-ascii?q?CBAEBEBEEGQEBLAsBDwIBBgI/AwICAh8GCxQRAQEEDgUigwABgR1NAx0BDpE?= =?us-ascii?q?/kF4CgTWIEgFMcXwzgnkBAQWFAw0Lgg8DBjR+AYtNF4FAP4ERJx+CTD6CGkc?= =?us-ascii?q?BAQKBGyQBAUuCXTKCJop6gl+ETYgKjDEsOQkCggmOfoNUG4IQhkSDb4kUlEC?= =?us-ascii?q?MWwIEAgQFAg4BAQWBTziBVnAVOyoBgkGCDwkag0yFFIU/cgGBKIwegkMBAQ?=
X-IronPort-AV: E=Sophos;i="5.60,450,1549929600"; d="scan'208,217";a="560372222"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by rcdn-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 09 May 2019 12:28:43 +0000
Received: from XCH-ALN-016.cisco.com (xch-aln-016.cisco.com [173.36.7.26]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id x49CShnS012742 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 9 May 2019 12:28:43 GMT
Received: from xhs-aln-001.cisco.com (173.37.135.118) by XCH-ALN-016.cisco.com (173.36.7.26) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 9 May 2019 07:28:42 -0500
Received: from xhs-aln-001.cisco.com (173.37.135.118) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Thu, 9 May 2019 07:28:41 -0500
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (173.37.151.57) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Thu, 9 May 2019 07:28:41 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector1-cisco-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oFBDa3Lh6L7nNeKXtzfNX9zliXwY/pXLqFXG5EV8lQo=; b=SKUas2+QwjWHjQE9JDOCLGvbxDnUxS56133t/SM1PevKwuQPuNv27FtWO2p3/DoLOsHc6Hz5V1nq8MF9zGeNBMntJNg40Yj9HrTF+5z2vpPperixuPNbArxfFyp5aG1ep7+qBpxAhYctpvjPE6zfgO+TBcCdzButCQyfM/kr+XI=
Received: from BL0PR11MB3234.namprd11.prod.outlook.com (10.167.234.14) by BL0PR11MB3332.namprd11.prod.outlook.com (10.167.235.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1856.12; Thu, 9 May 2019 12:28:40 +0000
Received: from BL0PR11MB3234.namprd11.prod.outlook.com ([fe80::54d2:c2a8:b130:7c71]) by BL0PR11MB3234.namprd11.prod.outlook.com ([fe80::54d2:c2a8:b130:7c71%7]) with mapi id 15.20.1856.016; Thu, 9 May 2019 12:28:40 +0000
From: "Mike Taillon (mtaillon)" <mtaillon@cisco.com>
To: Alexander Okonnikov <alexander.okonnikov@gmail.com>
CC: Markus Jork <mjork=40128technology.com@dmarc.ietf.org>, "mpls@ietf.org" <mpls@ietf.org>, "draft-ietf-mpls-summary-frr-rsvpte@ietf.org" <draft-ietf-mpls-summary-frr-rsvpte@ietf.org>, "mpls-chairs@ietf.org" <mpls-chairs@ietf.org>
Thread-Topic: [mpls] Working Group Last Call on draft-ietf-mpls-summary-frr-rsvpte
Thread-Index: AdT+bwgaLxlixEv3RLuInt5op2U5CgGpQJWAAAB3goAAAEyYgABS6AWA
Date: Thu, 9 May 2019 12:28:40 +0000
Message-ID: <D1E9A036-A86B-4C63-BED2-7ADFFA0F6A64@cisco.com>
References: <LEJPR01MB0377540FAEC1EE9448740E78983A0@LEJPR01MB0377.DEUPRD01.PROD.OUTLOOK.DE> <56FE0A66-AD1F-4572-BABF-2B0605B40B06@cisco.com> <CAKe-zUoumWmOrk6EeW7RM1+L7N=vU_6f9k0f+gTbeFmR5gFc7g@mail.gmail.com> <1BFCFD3C-0D3B-425D-AEE4-91ED20F91A93@gmail.com>
In-Reply-To: <1BFCFD3C-0D3B-425D-AEE4-91ED20F91A93@gmail.com>
Accept-Language: en-CA, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=mtaillon@cisco.com;
x-originating-ip: [2001:420:c0c8:1004::22e]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5adae240-146f-41c0-4d29-08d6d479de70
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:BL0PR11MB3332;
x-ms-traffictypediagnostic: BL0PR11MB3332:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <BL0PR11MB33324E045D56DA4A5CB65D37D0330@BL0PR11MB3332.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 003245E729
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(136003)(376002)(366004)(39860400002)(396003)(199004)(189003)(6116002)(478600001)(229853002)(6916009)(91956017)(82746002)(606006)(76176011)(73956011)(236005)(446003)(186003)(6486002)(5660300002)(54896002)(6306002)(6512007)(66556008)(66476007)(66446008)(64756008)(99286004)(7736002)(6436002)(76116006)(66946007)(966005)(6506007)(486006)(53546011)(36756003)(8936002)(86362001)(81166006)(81156014)(8676002)(83716004)(54906003)(5070765005)(71190400001)(71200400001)(14444005)(256004)(68736007)(33656002)(14454004)(6246003)(316002)(2616005)(102836004)(2906002)(25786009)(476003)(4326008)(11346002)(46003)(53936002); DIR:OUT; SFP:1101; SCL:1; SRVR:BL0PR11MB3332; H:BL0PR11MB3234.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 11dwZ+mOxzm1yaRLgbky9gHRNlCLHfYc2k5wWfaEoVxW0qm0POmabmAqi9FTiO8PrE4hM54KIsc7TPd4l1gnzR+F1X/xcUQrGGxl+MgZWglYivR9Yhu96AlOVAfAs5MSFEtOpcpLTCqmZLysZ76hn7B6VxtIM5+Jtn164XTbLZ8hXugaGGqjrl7xmaOpHSv6ctjK2YzvHNJ/9mrgV+v3AjyBSOAe3Yu2GRVeN43DqOf77nitsjolyo7roco28GMMgKDkFn429UN3F/z5z2UUA5Hach8ZLcaCLrucjDnGyHGXyqb04H6LZfEB92IRI7ppmS5uFbJOXOi8e7OqOXioixm29mWjUpEVEj8x4OTIFwMm63/As52x6PQIvrDnwkw9oR+KXIBcQ2Nlq5ZY/wfnha0kGcmg5omCDQtwkS5XFTs=
Content-Type: multipart/alternative; boundary="_000_D1E9A036A86B4C63BED27ADFFA0F6A64ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 5adae240-146f-41c0-4d29-08d6d479de70
X-MS-Exchange-CrossTenant-originalarrivaltime: 09 May 2019 12:28:40.4978 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB3332
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.26, xch-aln-016.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/1W9GktuTTwHASDV9q8GC1hVErF4>
Subject: Re: [mpls] Working Group Last Call on draft-ietf-mpls-summary-frr-rsvpte
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 May 2019 12:28:51 -0000

Hi Alexander,

I beleive MTU handling post FRR is not covered in base RFC4090 and is therefore an existing gap.
It kinda defeats the purpose if headend needs to adjust MTU after FRR to prevent drops… and would presume most deployments assume that backup MTU can accomandate MTU of primary LSP (plus any added MP labels).

Issue deserves discussion, but think its out of scope from this document.


-mike

On May 7, 2019, at 4:54 PM, Alexander Okonnikov <alexander.okonnikov@gmail.com<mailto:alexander.okonnikov@gmail.com>> wrote:

Hi authors,

As far as Summary FRR LSPs are not being signaled via Path messages over bypass tunnel after failure, information on head-ends about actual path MTU of protected LSPs can be corrupted. For example, path MTU of protected LSP is 1500 bytes (provided that ADSPEC is used), and path MTU of bypass tunnel is, for example, 1500 bytes. As far as Path messages for protected LSPs are not being sent over bypass tunnel, MP will use ADSPEC received in Path messages of those protected LSPs previoulsy (before they have been rerouted onto bypass tunnel), i.e. 1500 bytes in place of 1496 bytes. To avoid this problem PLR would have to signal path MTU of its bypass tunnel in B-SFRR-Active object (alternatively, MP could inherit this value from ADSPEC of PSB of the bypass tunnel), and 2) MP would have to choose minimal of MTU values from ADSPEC objects while merging Summary FRR protected LSP. But, even in this case MP will have to generate trigger Path messages (with updated ADSPEC) for protected LSPs and then, after receiving Resv messages with updated FLOWSPEC, send them to PLR. I.e. summary refresh in MP->PLR direction with high probability will be inapplicable, due to trigger messages.

Thanks.

7 мая 2019 г., в 23:46, Markus Jork <mjork=40128technology.com@dmarc.ietf.org<mailto:mjork=40128technology.com@dmarc.ietf.org>> написал(а):

As a co-author,  I believe this document is ready for publication.
-Markus



On Apr 30, 2019, at 4:33 AM, N.Leymann@telekom.de<mailto:N.Leymann@telekom.de> wrote:

Working Group,

This mail initiates the two weeks working group last call on draft-ietf-mpls-summary-frr-rsvpte which is considered mature and ready for a final working group review.

Please read this document if you haven't read the most recent version yet, and send your comments to the mpls wg mailing list (mpls@ietf.org<mailto:mpls@ietf.org>), not later than 17th of May.

There is one IPR disclosure against draft-ietf-mpls-summary-frr-rsvpte

This working group last call ends May 17th, 2019 (there is at least in some countries a public holiday this week, therefore the call is a bit longer than usual).

Best regards

Nic

_______________________________________________
mpls mailing list
mpls@ietf.org<mailto:mpls@ietf.org>
https://www.ietf.org/mailman/listinfo/mpls