Re: [mpls] Rtgdir last call review of draft-ietf-mpls-p2mp-bfd-06

Joel Halpern <jmh@joelhalpern.com> Sat, 24 February 2024 22:39 UTC

Return-Path: <jmh@joelhalpern.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 672B4C14F6B7; Sat, 24 Feb 2024 14:39:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.104
X-Spam-Level:
X-Spam-Status: No, score=-7.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H2LBmxFcj3iJ; Sat, 24 Feb 2024 14:39:49 -0800 (PST)
Received: from mailb2.tigertech.net (mailb2.tigertech.net [208.80.4.154]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85A44C14F6A9; Sat, 24 Feb 2024 14:39:44 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mailb2.tigertech.net (Postfix) with ESMTP id 4Tj1z41BPlz1nsdf; Sat, 24 Feb 2024 14:39:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1708814384; bh=z/PmO2aDWbL/7j7mqgAvmYwHVkWdbj9AYLydJ7Xz3Kg=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=ZXVtAB6njaCVh1VTtm0tAMMUZxk6y5z1Dtlb7mVCNF6GiEUU3+5tY1v/pTs34qtLa MDK9Uqpv/jxKD+obdxKRehYna7hL2Tku2ZU6six0ZH7FIG5qjep5OEA/HbCL5/U7PI 0n1lzHgXK4dZyf9l7AorJKeAtLGLR2DbZC+FcUx0=
X-Quarantine-ID: <VOFU_W-1-Jy8>
X-Virus-Scanned: Debian amavisd-new at b2.tigertech.net
Received: from [192.168.20.146] (unknown [50.233.136.230]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mailb2.tigertech.net (Postfix) with ESMTPSA id 4Tj1z33SdVz1nsc5; Sat, 24 Feb 2024 14:39:43 -0800 (PST)
Content-Type: multipart/alternative; boundary="------------kzj6PWrpjFUdfuYm0hBt1QsQ"
Message-ID: <176e1397-5b01-487f-8ae0-078bfe2f8ee7@joelhalpern.com>
Date: Sat, 24 Feb 2024 17:39:40 -0500
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: Greg Mirsky <gregimirsky@gmail.com>
Cc: rtg-dir@ietf.org, draft-ietf-mpls-p2mp-bfd.all@ietf.org, last-call@ietf.org, mpls@ietf.org
References: <170864700898.14065.4946299905740369098@ietfa.amsl.com> <CA+RyBmXitJr-57P3y_=pYEqwoHeMo4HKqPKOud-ZZ2dQQb_gGQ@mail.gmail.com>
From: Joel Halpern <jmh@joelhalpern.com>
In-Reply-To: <CA+RyBmXitJr-57P3y_=pYEqwoHeMo4HKqPKOud-ZZ2dQQb_gGQ@mail.gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/P-ir1wh7bnH0IPD0XnF9QevRBn4>
Subject: Re: [mpls] Rtgdir last call review of draft-ietf-mpls-p2mp-bfd-06
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Feb 2024 22:39:54 -0000

That covers part of my concern.  But....  A failure near the root means 
that a lot of leaves will see failure, and they will all send 
notifications converging on the root.  Those notifications themselves, 
not just the final messages, seem able to cause congestion.  I am not 
sure what can be done about it, but we aren't allowed to ignore it.

Yours,

Joel

On 2/24/2024 3:34 PM, Greg Mirsky wrote:
> Hi Joel,
> thank you for your support of this work and the suggestion. Would the 
> following update of the last paragraph of Section 5 help:
> OLD TEXT:
>    An ingress LSR that has received the BFD Control packet, as described
>    above, sends the unicast IP/UDP encapsulated BFD Control packet with
>    the Final (F) bit set to the egress LSR.
> NEW TEXT:
>    As described above, an ingress LSR that has received the BFD Control
>    packet sends the unicast IP/UDP encapsulated BFD Control packet with
>    the Final (F) bit set to the egress LSR.  In some scenarios, e.g.,
>    when a p2mp LSP is broken close to its root, and the number of egress
>    LSRs is significantly large, the control plane of the ingress LSR
>    might be congested by the BFD Control packets transmitted by egress
>    LSRs and the process of generating unicast BFD Control packets, as
>    noted above.  To mitigate that, a BFD implementation that supports
>    this specification is RECOMMENDED to use a rate limiter of received
>    BFD Control packets passed to processing in the control plane of the
>    ingress LSR.
>
> Regards,
> Greg
>
> On Thu, Feb 22, 2024 at 4:10 PM Joel Halpern via Datatracker 
> <noreply@ietf.org> wrote:
>
>     Reviewer: Joel Halpern
>     Review result: Ready
>
>     Hello,
>
>     I have been selected as the Routing Directorate reviewer for this
>     draft. The
>     Routing Directorate seeks to review all routing or routing-related
>     drafts as
>     they pass through IETF last call and IESG review, and sometimes on
>     special
>     request. The purpose of the review is to provide assistance to the
>     Routing ADs.
>     For more information about the Routing Directorate, please see
>     https://wiki.ietf.org/en/group/rtg/RtgDir
>
>     Although these comments are primarily for the use of the Routing
>     ADs, it would
>     be helpful if you could consider them along with any other IETF
>     Last Call
>     comments that you receive, and strive to resolve them through
>     discussion or by
>     updating the draft.
>
>     Document: draft-name-version
>     Reviewer: your-name
>     Review Date: date
>     IETF LC End Date: date-if-known
>     Intended Status: copy-from-I-D
>
>     Summary:  This document is ready for publication as a Proposed
>     Standard.
>         I do have one question that I would appreciate being considered.
>
>     Comments:
>         The document is clear and readable, with careful references
>     for those
>         needing additional details.
>
>     Major Issues: None
>
>     Minor Issues:
>         I note that the security considerations (section 6) does refer to
>         congestion issues caused by excessive transmission of BFD
>     requests.   I
>         wonder if section 5 ("Operation of Multipoint BFD with Active
>     Tail over
>         P2MP MPLS LSP") should include a discussion of the congestion
>     implications
>         of multiple tails sending notifications at the rate of 1 per
>     second to the
>         head end, particularly if the failure is near the head end. 
>     While I
>         suspect that the 1 / second rate is low enough for this to be
>     safe,
>         discussion in the document would be helpful.
>
>