Re: [mpls] draft-andersson-mpls-mna-fwk

bruno.decraene@orange.com Thu, 09 June 2022 17:00 UTC

Return-Path: <bruno.decraene@orange.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D0812C14CF18 for <mpls@ietfa.amsl.com>; Thu, 9 Jun 2022 10:00:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level:
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S9EVUUkYgohF for <mpls@ietfa.amsl.com>; Thu, 9 Jun 2022 10:00:04 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36AF1C14F693 for <mpls@ietf.org>; Thu, 9 Jun 2022 10:00:04 -0700 (PDT)
Received: from opfedar01.francetelecom.fr (unknown [xx.xx.xx.2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar25.francetelecom.fr (ESMTP service) with ESMTPS id 4LJr1Y73Bhz8tLC; Thu, 9 Jun 2022 19:00:01 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1654794002; bh=OyfPeZGu1H4NlgTXOaarLFLeKdaxyfSi08ovBmzOBpU=; h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version; b=PM1p5RfaANsCLTtGR/38jcByuB2BGcN+FPhTRUPKrg4A9fsNgnLvlPxd5i81TvkBX YAUF//cE442QN/zBuPu/vJk8BVdV7tDTM0coHhZu3Kg55P7OWcEL88QrBn+s2TyuK8 cYoqkokcOlWsarZw4nGsJBmo3sRWvFntGiPm1SvuHbXi0eY3JdJ6g6un8uBp/virqP xQqoI3STtkqVXj/0y5qRfQ49GHLzDx6H2GleKpkr65vJ3fW8FSfJVSM8ldZ3qCgPGt HSp2yPgGR3uIoSSood78os68Sf5W+rbA0FcxafS9b2sI09ePEhSgMs7+7O4rIxOBfL k6NB6wQVq7i7A==
From: bruno.decraene@orange.com
To: Tony Li <tony.li@tony.li>
CC: mpls <mpls@ietf.org>
Thread-Topic: [mpls] draft-andersson-mpls-mna-fwk
Thread-Index: AQHYfA+qDikiFRQYS0iPysC9pWqAE61HQ+lw
Date: Thu, 09 Jun 2022 17:00:01 +0000
Message-ID: <13112_1654794001_62A22711_13112_310_18_c915971a6c31403e9cab5040863566ad@orange.com>
References: <6839_1654697978_62A0AFFA_6839_46_1_e76c4078f46449e3b127bb647052f861@orange.com> <C05F145D-9792-4BEE-8560-4BA0A58F6539@tony.li> <26200_1654766556_62A1BBDC_26200_53_1_fe98be56ce92458c974183d848942b4b@orange.com> <83BF6BB5-04A4-453D-91A6-54C3D1C91C3B@tony.li>
In-Reply-To: <83BF6BB5-04A4-453D-91A6-54C3D1C91C3B@tony.li>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Enabled=true; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_SetDate=2022-06-09T16:59:59Z; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Method=Standard; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Name=Orange_restricted_external.2; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ActionId=11add5f3-276b-4eb0-8345-79808e52a4c8; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ContentBits=2
x-originating-ip: [10.115.27.53]
Content-Type: multipart/alternative; boundary="_000_c915971a6c31403e9cab5040863566adorangecom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/IKJPNUctGdWxJrD2SUjrPlY4xX0>
Subject: Re: [mpls] draft-andersson-mpls-mna-fwk
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Jun 2022 17:00:08 -0000

Hi Tony,


Thanks for your answer.
Please see inline [Bruno]



Orange Restricted
From: Tony Li <tony1athome@gmail.com> On Behalf Of Tony Li
Sent: Thursday, June 9, 2022 4:46 PM



Hi Bruno,

Please see inline.


[Bruno] I'm all for having a common standard. I would not be there otherwise.
I think it would be possible to have a standard Network Action behavior, a standard code for that behavior, but to associate that behavior/code to a specific bit via a "limited domain" specific catalog. A bit like MPLS which associate a behavior/FEC to a given label value. Such approach would reduce the size of the catalog. And this seems an advantage since we both agree that the size of the catalog negatively impacts the efficiency of using bit catalogs.


Sorry, I'm not following you.
[Bruno] I apologize for that. Thank you for efforts.

 I think you're suggesting that MNA should support both standardized and locally defined actions. And that this be encoded by having a bit that indicates whether the catalog is standardized or local.  That's not impossible, but does cost a bit.
[Bruno] I was not suggesting this.

It seems to me that if a solution chooses bit catalogs, then it could also just set aside a few bits for locally defined actions.  This would seem to serve the same purpose.


OLD :
Catalogs are efficient if the number of present network actions is
   relatively high and if the size of the necessary catalog is small.

NEW
Catalogs are efficient if the number of present network actions is
   relatively high and if the size of the necessary catalog is small.
As MPLS works within a limited domain, one way of having a smaller catalog would be to have a private catalog containing only the network actions used within such limited domain. Such benefit would be at the cost of increased signaling or management (to associate bits and network actions) and possibly increased PFE complexity.


Or, are you suggesting some remapping mechanism, whereby all actions are remapped to locally defined bits.  Thus, in my domain entropy might be bit 0.  In your domain, it might be bit 6?
[Bruno] I was suggesting just this.



I'm not sure that [RFC3031) has requirements for LSE which are not a the top of the stack. However, it's probably safer to forbid NAS to use values 0-15 in the "label" part of the LSE, in order to avoid an LSR scanning the whole stack wrongly recognize a wrong bSPL (e.g. EL or the MAN label). If so I think it should be indicated in this document.
This is why MNA should never be sent through systems that don't recognize MNA.  They could easily interpret AD as ELI, for example.

I understand the restriction that you're suggesting, but I don't think we want to go that far.  It grossly limits what we can do with AD.
[Bruno] I agree those are two options with their own trade-offs. This may be a technical detail of a given proposal, but I think we should discuss both options in the WG. At least on my side I was assuming "my" option, while you seem to assume "your" option
I may be missing something obvious, but I'm not sure how one ensure that "MNA should never be sent through systems that don't recognize MNA". In particular the ingress has not absolute control of the path taken by the packet (e.g. Fast ReRoute, IGP convergence on the path, use of Binding SID in SR-MPLS where the binding SID hides the forwarding SIDs hence the path...


We are proposing adding signaling that indicates MNA capable systems.  Any system pushing a stack including MNA should compute a path that only includes MNA routers.  In cases where the path can change without warning, management would need to ensure that all possible alternative paths are MNA enabled.
[Bruno] OK. I'll need some time to think about this.
Preliminary personal feedbacks:
- I think that this should be explicitly indicated in the draft. And if someone clever can spell out the consequences of traversing an MNA incapable router, that would be helpful, at least to me.
- Yes I think that the path can change without warning, in particular for long lives usages of MNA. E.g. if MNA is designed to encode entropy and replace ELI.
- As you are well aware, FRR is a local feature with different flavours (LFA, RLFA, TI-LFA, link protection, node protection, (local) SRLG protection...) each translating into different protection paths. That seems computationally expensive to me for the ingress to compute all possible alternatives paths for all FRR flavours for all nodes/PLR along the path. Plus in many cases, IMHO that set of all paths would, in the end, require all possible transit nodes to be MNA capable. In my environments with multiple vendors, multiple platforms, multiple generations... I would a priori find it hard to have all routers MNA capable in a foreseeable future.
- To me, RFC6790 (EL) had a much friendlier deployment path by mandating that LSE label values (just the EL in RFC6790 case) did not include value in the reserved label space. (ยง3) Same thing for draft-jags-mpls-ext-hdr where we avoided the appearance of reserved SPLs in a LSE.Label field.
- In such case, I would probably call for using post stack data as much as possible, rather than in stack data.

Hopefully, I'm missing something (e.g. too tired or worst). So I need some more time to think about this.

Many thanks for the discussion.
Regards,
--Bruno

Tony


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.