Re: [mpls] working group adaption poll (wgap) for draft-hegde-mpls-spring-epe-oam

Shraddha Hegde <shraddha@juniper.net> Thu, 04 June 2020 04:48 UTC

Return-Path: <shraddha@juniper.net>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E55A53A0EDF; Wed, 3 Jun 2020 21:48:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.089
X-Spam-Level:
X-Spam-Status: No, score=-2.089 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net header.b=pRHRS6ER; dkim=pass (1024-bit key) header.d=juniper.net header.b=OyJQzMvX
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CJ_bXRh-rW9z; Wed, 3 Jun 2020 21:48:38 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F20683A0EDE; Wed, 3 Jun 2020 21:48:37 -0700 (PDT)
Received: from pps.filterd (m0108162.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 0544mVGN008930; Wed, 3 Jun 2020 21:48:36 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=HwCQCZnzrYqJHN3O9LmOSeuq+WLE9HUnnP5p2PBVlyY=; b=pRHRS6ERIg2JW2gs6oUytdljOkerhqp7K/zG/SFvWdzztBLL3MQLCaNrQa2RAJSmxQsJ sBz18+bVDyibLn0Es9fsXNNkIMC4A5/BO3HPcKwjkeB+Rqx+R1PnMcZtDwMrL4m9O26o 5r32q5wfbQ69Tqzni/FR6ZnCgK3T2N1vv6w4SmPUhStinWefXcVDwjE4UVSnkZASsXhO IAn7JFDCP/W4Ih1owLDeLg/xreMHQecY23kWD5sFt/WB4cAMMkr7DLiNknCcAakCETln OotkppwpDmAu+RZcI8jTmY8kRcQkQoTM3IhDzhBVh2aIwpFbITvHMtBY1XGFSbMz2Jlw MQ==
Received: from nam10-bn7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2105.outbound.protection.outlook.com [104.47.70.105]) by mx0b-00273201.pphosted.com with ESMTP id 31e1v22aub-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 03 Jun 2020 21:48:35 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=m3A2XZ4FvQOni/UQ9Tc2uLHDRgjqxP6M2fQKdVWsiHXORJRlW0FSjkw+ifX7ByP/lWQcaO0RlEtHuGeR5q91hhe0iswb1OrN11JQ5xyBP8G7bp/BkN+mRf+lugRJ01cvyPS5ncZBjJ6/cUEulSJD9DaqY+Y8Y5ZDtcQZR5UTrYQWXro6nESpusz7QJooQZE73HRnQUp71l5g++4dVYuyZqpQVWjrpQDlpZIvf22EHtYx3nNlGvZmFQvEW5X5//+SGsK8VvtWVYaqsHJbhn+IRXxcvkg+lfnSVHIOpozZ+plrPXcqVeUO1L05qVCXkCPlhDwODpKcZpZ3vHf7NjoJYg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HwCQCZnzrYqJHN3O9LmOSeuq+WLE9HUnnP5p2PBVlyY=; b=LhnrIS1FXiaG+KlHXRi9nU/CVgNAvSImhTbhXb5bVqWa8Plihzu6yIK7aDEfYdvbKJyS1d8AD3VJJ0pP/rfZ+64frI9v6uIocSrElLwqy+dCb0S7VgJg0cCVYBWMrnvDjvtxs5dpkJ/WxHPCLJxCDo4cYTDxZ3yemDFgI6EP+VCGCjsdExF0OGHsfOpZvARgLZqQQHuhRx+TUyAHTvAZcIX+JWss/UptiLJPeIYpxLTln+CeWyMkVxV6DCMwfpMLvol39YlLqI+K7WWogpFACqJj9n70GNADrVG9FVSQS23g3GtiqP5GRcjS2gfeRmrBoQcIFjvm0JW6g6TD3qlVXQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=juniper.net; dmarc=pass action=none header.from=juniper.net; dkim=pass header.d=juniper.net; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HwCQCZnzrYqJHN3O9LmOSeuq+WLE9HUnnP5p2PBVlyY=; b=OyJQzMvXjcVg55Gk4l5OKFEwQDw+/AcP82tNd82rgRzBrZTRDn2o9mkRE92ekbK+vx5HbwFFzqnQDnIL9es2YpkoT6T9hyRU2GiwdlZD82QmvZhGc/dAGWWxDlb3z96graYgM2Q1GrfeUTI1Ea2l+ZAXDp07s8n036XVVAPdFy0=
Received: from CY4PR05MB3576.namprd05.prod.outlook.com (2603:10b6:910:52::22) by CY4PR05MB3542.namprd05.prod.outlook.com (2603:10b6:910:56::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3045.10; Thu, 4 Jun 2020 04:48:29 +0000
Received: from CY4PR05MB3576.namprd05.prod.outlook.com ([fe80::241d:c9c:c8de:e5e5]) by CY4PR05MB3576.namprd05.prod.outlook.com ([fe80::241d:c9c:c8de:e5e5%6]) with mapi id 15.20.3088.000; Thu, 4 Jun 2020 04:48:29 +0000
From: Shraddha Hegde <shraddha@juniper.net>
To: "Ketan Talaulikar (ketant)" <ketant@cisco.com>, Loa Andersson <loa@pi.nu>, "draft-hegde-mpls-spring-epe-oam@ietf.org" <draft-hegde-mpls-spring-epe-oam@ietf.org>
CC: "mpls-chairs@ietf.org" <mpls-chairs@ietf.org>, "mpls@ietf.org" <mpls@ietf.org>
Thread-Topic: [mpls] working group adaption poll (wgap) for draft-hegde-mpls-spring-epe-oam
Thread-Index: AQHWHpsEUfJU88XvSkKAbfbwWgY/HKikqACAgADOeACAAASQAIAhIQVQgAA2XYCAAUE9IA==
Date: Thu, 4 Jun 2020 04:48:29 +0000
Message-ID: <CY4PR05MB357638EFBFBF8B1B270D8956D5890@CY4PR05MB3576.namprd05.prod.outlook.com>
References: <6eee6cce-b7b3-dcce-b3b8-2229745e778d@pi.nu> <MW3PR11MB4570253C1341AB1D6F8CA6D2C1BE0@MW3PR11MB4570.namprd11.prod.outlook.com> <1717e4b0-17cf-13f7-d1bc-fd9a849418e1@pi.nu> <MW3PR11MB45706309655EAA2FC15A0FCEC1BF0@MW3PR11MB4570.namprd11.prod.outlook.com> <CY4PR05MB3576826D834B4FA93E4AD1B4D5880@CY4PR05MB3576.namprd05.prod.outlook.com> <MW3PR11MB4570D5E2E194A212B2C099B5C1880@MW3PR11MB4570.namprd11.prod.outlook.com>
In-Reply-To: <MW3PR11MB4570D5E2E194A212B2C099B5C1880@MW3PR11MB4570.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Enabled=true; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SetDate=2020-06-03T06:18:56Z; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Method=Standard; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_Name=0633b888-ae0d-4341-a75f-06e04137d755; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_SiteId=bea78b3c-4cdb-4130-854a-1d193232e5f4; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ActionId=5d9b56cc-13db-4ada-8043-c2f00f7cbf5e; MSIP_Label_0633b888-ae0d-4341-a75f-06e04137d755_ContentBits=2
dlp-product: dlpe-windows
dlp-version: 11.2.0.14
dlp-reaction: no-action
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=juniper.net;
x-originating-ip: [116.197.184.12]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: dbaff8ab-6499-4708-3ace-08d8084286bc
x-ms-traffictypediagnostic: CY4PR05MB3542:
x-microsoft-antispam-prvs: <CY4PR05MB35421A4238EED20FBE151A9DD5890@CY4PR05MB3542.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 04244E0DC5
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: SBaucGuffhXIEfe5XEpCy7ML71aqVKZs/FSVbE8Udum/a0aXYOnkH5KgY+PBSUcfuD8oH5oEWoqmnpXFXkuELRUP3at/eaOrtoQltp627L+3/5btgDaIA5pLrith40poyXlwVoDxq36Eg4djXBXEHAcN+5s0+d/WO3FTulgTxAQjl8IUYBnElDPJtVxwOs3wHmccCjp7Uc2+f/xxFrocQnuzSYWJwzf+DhsKirNGAksGXjgixLh4F5I4vzHvE+rk3ThQVmAWv1nc6tItgegl64wRe/XLwu575uYASOIjfGaRw3LVLqOTLOS7n+0IwzGneogqztWt7D1PBVjeJRvsXe8zDgBsbBrG0n6ENTN37tbf32LEvi4E3jpV3x2DgE0sPPp6DJJBCQ/WcMs8ucMrow==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CY4PR05MB3576.namprd05.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(376002)(39860400002)(396003)(346002)(366004)(136003)(66446008)(316002)(166002)(66574014)(26005)(33656002)(52536014)(66476007)(4326008)(8676002)(478600001)(55016002)(86362001)(66556008)(64756008)(2906002)(8936002)(30864003)(53546011)(9326002)(6506007)(186003)(5660300002)(110136005)(83380400001)(76116006)(7696005)(71200400001)(54906003)(66946007)(9686003)(966005); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CY4PR05MB357638EFBFBF8B1B270D8956D5890CY4PR05MB3576namp_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: dbaff8ab-6499-4708-3ace-08d8084286bc
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jun 2020 04:48:29.3702 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 4/PGSxPQaM52Eole7QQvXXiD4MzyYfHSwMqS34/YmswS3UUEhjqTcC69AK8Z+P6lEz1VyieIUZ1U10MjqxKzpA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR05MB3542
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216, 18.0.687 definitions=2020-06-04_01:2020-06-02, 2020-06-04 signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 malwarescore=0 priorityscore=1501 lowpriorityscore=0 mlxlogscore=999 clxscore=1015 spamscore=0 phishscore=0 mlxscore=0 cotscore=-2147483648 bulkscore=0 adultscore=0 suspectscore=0 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2006040030
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/ySWDKlE58zCihVE5y-arYt8ZlyY>
Subject: Re: [mpls] working group adaption poll (wgap) for draft-hegde-mpls-spring-epe-oam
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jun 2020 04:48:42 -0000

Hi Ketan,

Snipping open comments..


> 2) For the Peer Node SID, the control plane definition is https://urldefense.com/v3/__https://tools.ietf.org/html/draft-ietf-idr-bgpls-segment-routing-epe-19*section-4.1__;Iw!!NEt6yMaO-gk!W0-Gp88WKnqRfX4kdfeWV8aIHqrXTj0Pzz9Vl-B2ZVn78SFO60XGBDi2Y6sXdlcY$<https://urldefense.com/v3/__https:/tools.ietf.org/html/draft-ietf-idr-bgpls-segment-routing-epe-19*section-4.1__;Iw!!NEt6yMaO-gk!W0-Gp88WKnqRfX4kdfeWV8aIHqrXTj0Pzz9Vl-B2ZVn78SFO60XGBDi2Y6sXdlcY$>  and the FEC description in this draft is not aligned with the corresponding control plane. The Peer Node SID is meant for the packet to be delivered to a specific BGP peer and it does not matter over which interface it is received. So why have those interface addresses as mandatory in the FEC. The only thing the control plane indicates is the peering session itself.

>

> 3) Same as (2) above, for the Peer Set SID, the interfaces are don't care.

<Shraddha> The reason for need to have interface addresses specified is for incoming interface validation as explained above. For Peer Node SID interfaces are advertised with draft I-D.hegde-idr-bgp-ls-epe-inter-as.I have added this to the reference and updated text as to why it is needed. Also the ingress can send 0 pair of addresses in which case Incoming interface validation will be skipped and success will be sent based on other validations.

Pls check -07 version and let me know if you are OK with it.

[KT] I have a concern here. The semantics of the FEC for Peer Node and Set SIDs does not include (i.e. does not care about the interface over which the packet was received). So the link information is in any case part of the response that is sent back to the requester which can perform this validation. I don't see how it can be included in the FEC definition.



<Shraddha>Lets say you have ASBR A connecting two different ASBRs in different ASes B and C. Lets assume there are multiple links between A->B and A->C.

                     Lets say there is a multi-hop eBGP session between A->B  between A->C.

                     Lets say peerNode SID has been advertised for A->B and A->C.  The Link descriptors for the PeerNode Sid include the BGP session local addresses and for a multi-hop BGP

                      BGP session its going to be loopback addresses so from available information, it is not possible to derive which interface the traffic will be flowing.

                      Now lets say  there is a requirement that certain application should use a guaranteed 10G bandwidth on these

                     Inter-as links. If the EPE controller does not know which interfaces the traffic will be flowing, it cannot figure out which peerNodeSID to pick to build the path.

                    Draft-hegde-idr-bgp-ls-epe-inter-as talks about the usecases and required protocol extensions.

                  For any reasonable traffic engineering using peerNodeSID I think that this information is required.

                 It is also useful to know if the control plane and dataplane are in sync with OAM. If the control plane is advertising peerNodeSID to be

                Going over some link but the actual traffic flow is on a different link, it will screw-up the traffic engineering. MPLS WG has built OAM has tools/techniques

                For years to find these kind of problems.We are trying to  apply these to EPE SIDs.



       Rgds
Shraddha





Juniper Business Use Only
From: Ketan Talaulikar (ketant) <ketant@cisco.com>
Sent: Wednesday, June 3, 2020 2:48 PM
To: Shraddha Hegde <shraddha@juniper.net>et>; Loa Andersson <loa@pi.nu>nu>; draft-hegde-mpls-spring-epe-oam@ietf.org
Cc: mpls-chairs@ietf.org; mpls@ietf.org
Subject: RE: [mpls] working group adaption poll (wgap) for draft-hegde-mpls-spring-epe-oam

[External Email. Be cautious of content]


Hi Shraddha,



Thanks for your response and update. Please check inline below.



-----Original Message-----
From: Shraddha Hegde <shraddha@juniper.net<mailto:shraddha@juniper.net>>
Sent: 03 June 2020 11:49
To: Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>; Loa Andersson <loa@pi.nu<mailto:loa@pi.nu>>; draft-hegde-mpls-spring-epe-oam@ietf.org<mailto:draft-hegde-mpls-spring-epe-oam@ietf.org>
Cc: mpls-chairs@ietf.org<mailto:mpls-chairs@ietf.org>; mpls@ietf.org<mailto:mpls@ietf.org>
Subject: RE: [mpls] working group adaption poll (wgap) for draft-hegde-mpls-spring-epe-oam



Hi ketan,



Thanks for the detailed review and comments. Pls see inline for response.





Juniper Business Use Only



-----Original Message-----

From: Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>

Sent: Wednesday, May 13, 2020 9:38 AM

To: Loa Andersson <loa@pi.nu<mailto:loa@pi.nu>>; draft-hegde-mpls-spring-epe-oam@ietf.org<mailto:draft-hegde-mpls-spring-epe-oam@ietf.org>

Cc: mpls-chairs@ietf.org<mailto:mpls-chairs@ietf.org>; mpls@ietf.org<mailto:mpls@ietf.org>

Subject: RE: [mpls] working group adaption poll (wgap) for draft-hegde-mpls-spring-epe-oam



[External Email. Be cautious of content]





Hi  Loa,



There is no doubt about the need for LSP ping and traceroute operations to cover BGP EPE SIDs. So the requirement is real and something that the WG should be taking up.



My concerns is that the proposal in the draft is diverging from the control plane protocol semantics for what constitutes the FEC (or context) and how it is to be validated. These are some core aspects that IMHO need to be addressed before adoption while the rest may be taken up during its life as a WG document. I would suggest to wait for the authors response.



Thanks,

Ketan



-----Original Message-----

From: Loa Andersson <loa@pi.nu<mailto:loa@pi.nu>>

Sent: 13 May 2020 09:22

To: Ketan Talaulikar (ketant) <ketant@cisco.com<mailto:ketant@cisco.com>>; draft-hegde-mpls-spring-epe-oam@ietf.org<mailto:draft-hegde-mpls-spring-epe-oam@ietf.org>

Cc: mpls-chairs@ietf.org<mailto:mpls-chairs@ietf.org>; mpls@ietf.org<mailto:mpls@ietf.org>

Subject: Re: [mpls] working group adaption poll (wgap) for draft-hegde-mpls-spring-epe-oam



Ketan,



Anything of this that need to addressed before wg adoption?





Authors



I leave the wgap opeb a few extra days to llow you to respond to this.





/Loa



On 12/05/2020 23:32, Ketan Talaulikar (ketant) wrote:

> Hello Authors,

>

> I have the following comments on this draft and would be good if you could clarify/respond.

>

> 1)The FEC description should match the "context" that is advertised in

> the control plane for Peer Adj SID. E.g. the local/remote Interface

> IDs are not being included from

> https://urldefense.com/v3/__https://tools.ietf.org/html/draft-ietf-idr<https://urldefense.com/v3/__https:/tools.ietf.org/html/draft-ietf-idr>

> -bgpls-segment-routing-epe-1__;!!NEt6yMaO-gk!W0-Gp88WKnqRfX4kdfeWV8aIH

> qrXTj0Pzz9Vl-B2ZVn78SFO60XGBDi2Y-5xIny8$

> 9#section-4.2



<Shraddha> The EPE draft mandates interface-ids and allows remote interface-id to be zero.

Remote interface ID being zero does not help in validating the incoming interface which is very Useful OAM functionality. For this reason, this draft recommends sending interface addresses in the PeerADJ SID Link descriptors which is optional.



I have updated the PeerAdj SID section with this information and also updated with the possibility of sending zero In which case incoming interface validation should be skipped. This is to accommodate cases when the advertising node does not send the interface addresses

[KT] Ack - this sounds good to me. Thanks.



>

> 2) For the Peer Node SID, the control plane definition is https://urldefense.com/v3/__https://tools.ietf.org/html/draft-ietf-idr-bgpls-segment-routing-epe-19*section-4.1__;Iw!!NEt6yMaO-gk!W0-Gp88WKnqRfX4kdfeWV8aIHqrXTj0Pzz9Vl-B2ZVn78SFO60XGBDi2Y6sXdlcY$<https://urldefense.com/v3/__https:/tools.ietf.org/html/draft-ietf-idr-bgpls-segment-routing-epe-19*section-4.1__;Iw!!NEt6yMaO-gk!W0-Gp88WKnqRfX4kdfeWV8aIHqrXTj0Pzz9Vl-B2ZVn78SFO60XGBDi2Y6sXdlcY$>  and the FEC description in this draft is not aligned with the corresponding control plane. The Peer Node SID is meant for the packet to be delivered to a specific BGP peer and it does not matter over which interface it is received. So why have those interface addresses as mandatory in the FEC. The only thing the control plane indicates is the peering session itself.

>

> 3) Same as (2) above, for the Peer Set SID, the interfaces are don't care.

<Shraddha> The reason for need to have interface addresses specified is for incoming interface validation as explained above. For Peer Node SID interfaces are advertised with draft I-D.hegde-idr-bgp-ls-epe-inter-as.I have added this to the reference and updated text as to why it is needed. Also the ingress can send 0 pair of addresses in which case Incoming interface validation will be skipped and success will be sent based on other validations.

Pls check -07 version and let me know if you are OK with it.

[KT] I have a concern here. The semantics of the FEC for Peer Node and Set SIDs does not include (i.e. does not care about the interface over which the packet was received). So the link information is in any case part of the response that is sent back to the requester which can perform this validation. I don't see how it can be included in the FEC definition.



>

> 4) The draft just says that the procedures are borrowed from RFC8287 but I don't think this is so straightforward or trivial. E.g. https://urldefense.com/v3/__https://tools.ietf.org/html/rfc8287*section-7.2__;Iw!!NEt6yMaO-gk!W0-Gp88WKnqRfX4kdfeWV8aIHqrXTj0Pzz9Vl-B2ZVn78SFO60XGBDi2Y3Z0DrZ_$<https://urldefense.com/v3/__https:/tools.ietf.org/html/rfc8287*section-7.2__;Iw!!NEt6yMaO-gk!W0-Gp88WKnqRfX4kdfeWV8aIHqrXTj0Pzz9Vl-B2ZVn78SFO60XGBDi2Y3Z0DrZ_$>  has the following:

>

>     The network node that is immediately downstream of the node that

>     advertised the Adjacency Segment ID is responsible for generating the

>     FEC Stack Change sub-TLV for POP operation for the Adjacency Segment

>     ID.

>



<shraddha> A new section for EPE FEC validation has been added in -06 version. This section specifies the details when return code 3 Has to be sent. As per  RFC 8029 sec 3.4.1.3 FEC stack change and IS_EGRESS code are treated identically.

" A Downstream Detailed Mapping TLV containing only one FEC stack

       change sub-TLV with pop operation is equivalent to IS_EGRESS

       (Return Code 3, Section 3.1) for the outermost FEC in the FEC

       stack.  The ingress router performing the LSP traceroute MUST

       treat such a case as an IS_EGRESS for the outermost FEC."



I don't see the need to re-iterate RFC 8029 sections in this draft. If it is still not clear let me know.

[KT] Sure. I think we can work through this once we converge on the FEC definition.



> In the case of IGPs, the downstream node does have the label and context for adjacency SID (which is functionally closest to BGP EPE SIDs). In the BGP-EPE SIDs case, this is not always the case. So I believe, it would be better if the entire operation were described.

<Shraddha> EPE SID validation section is added. Pls take a look and let me know if it looks good.

[KT] Same as previous comment.



>

> 5) The ping or traceroute done to any of the BGP EPE SID corresponding to an eBGP session may result in the packet being sent to another entity. The security consideration talk about it, but the problem is not addressed by the remote AS dropping the packets. The security issue is that the OAM packet could expose the FECs and information of the local AS to a remote AS. So it is more as an caveat for the operators performing the OAM operation to be mindful of this fact.

>

<Shraddha> Yes. This was raised in RT review and security section has been updated with this info in -06 version.



> In general, some more description that set the stage for the introduction of the new extensions and elaborate more on the operations (some considerations above on what is mandatory to evaluate and what is optional).

<Shraddha> Sure. Pls check the -07 version which I'll be posting soon and let me know if you have further comments.

[KT] Thanks again for the update. I believe we can work through the remaining/open points over course of time.



Thanks,

Ketan



>

> Thanks,

> Ketan

>

> -----Original Message-----

> From: mpls <mpls-bounces@ietf.org<mailto:mpls-bounces@ietf.org>> On Behalf Of Loa Andersson

> Sent: 30 April 2020 08:26

> To: mpls@ietf.org<mailto:mpls@ietf.org>

> Cc: mpls-chairs@ietf.org<mailto:mpls-chairs@ietf.org>; draft-hegde-mpls-spring-epe-oam@ietf.org<mailto:draft-hegde-mpls-spring-epe-oam@ietf.org>

> Subject: [mpls] working group adaption poll (wgap) for

> draft-hegde-mpls-spring-epe-oam

>

> Working Group,

>

> This is to start a two week poll on adopting draft-hegde-mpls-spring-epe-oam as a MPLS working group document.

>

> Please send your comments (support/not support) to the mpls working group mailing list (mpls@ietf.org<mailto:mpls@ietf.org>). Please give a technical motivation for your support/not support, especially if you think that the document should not be adopted as a working group document.

>

> There is one IPR disclosure against this document.

>

> The authors have stated on the MPLS wg mailing list that they are unaware of any IPRs that relates to this document.

>

> The working group adoption poll ends May 15, 2020.

>

> /Loa

>



--



My mail server from time to time has come under DOS attacks, we are working to fix it but it may take some time. If you get denial of service sending to me plz try to use loa.pi.nu@gmail<mailto:loa.pi.nu@gmail>





Loa Andersson                        email: loa@pi.nu<mailto:loa@pi.nu>

Senior MPLS Expert

Bronze Dragon Consulting             phone: +46 739 81 21 64