Re: [mpls] Working Group Last Call on draft-ietf-mpls-summary-frr-rsvpte

Tarek Saad <tsaad@juniper.net> Thu, 04 July 2019 13:51 UTC

Return-Path: <tsaad@juniper.net>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C71CC12022B; Thu, 4 Jul 2019 06:51:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sYghNdYsgDWl; Thu, 4 Jul 2019 06:51:38 -0700 (PDT)
Received: from mx0b-00273201.pphosted.com (mx0b-00273201.pphosted.com [67.231.152.164]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5D836120033; Thu, 4 Jul 2019 06:51:38 -0700 (PDT)
Received: from pps.filterd (m0108162.ppops.net [127.0.0.1]) by mx0b-00273201.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x64DZ1qD020274; Thu, 4 Jul 2019 06:51:32 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=PPS1017; bh=09VPgoIAf1acGVHo4Rp0XxaOFhv4TifYJQBHQqSiUpY=; b=F/xTvTxNwjUKe1hXpkv7jRCecBh8wd3NPeSCfLIHWxlRDOiD2c4kAGdBIj41/dwLodVy YyTwzLSlMklEBocI704QyDvAQUwDJqAGcU+IpagyfA7sjdKCES2aXFMKQnirvp7855NG QWfRTtyIgGqLqRs9XhmOgddXbaWbVk0Nu2ibSnBiVpEvI5O3T24falf3+h1nkEdIKM+C 3/9VJoVCURB7VRWpdJEE6ORIjfWk7Xp9+O59jQ4Zk+v6mNf0ERL3NohnCVS+6k2fRDzY fXjrYOxjNZAjji0Ysr38NIgIRaFsr25p6CB2Vu7ElwyLWI/ImX33H8fKcboE6Ws6u9SK KQ==
Received: from nam05-co1-obe.outbound.protection.outlook.com (mail-co1nam05lp2051.outbound.protection.outlook.com [104.47.48.51]) by mx0b-00273201.pphosted.com with ESMTP id 2thg3g07vt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 04 Jul 2019 06:51:32 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WAGcKQTZv38oMXfk+5WLkHxh2pfOy+2Cf7PRjSSNcxREDOypNj7W6da4De6F1inxzbiVCZPcg0eq0gTL27K+jlP+pK+R8RH4fz60PHGYseMtvlg0x27MMNIBnLsu14ypnw/LjlUfSw5zUb49N9/FoH4PCwJT71ES52EWIMuDRpezA4nkpw9vLNT1vuFKw6ez0f9VOTsgUAD3TT3WYIfDEWvLy4Z+TPNJ6rle5IgkOXGeIOZPHewI09vh8qzfeOxOOJNKjvOEf73roFWot0ph0fSODDrfBNdMGKsAQ+cBK/ORUmRfZNnyIToP/JOm7xKWdJbfW8UUHb6ojNpkm/selg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=09VPgoIAf1acGVHo4Rp0XxaOFhv4TifYJQBHQqSiUpY=; b=jHoe9snXovl9SdumJtiP4dGZBc1t5pgulsgBB3MW6mRs1ZNTpyK/Bb/iDiIIVkQUX+aYbq0o08VAgs8V1nXji0Z8gGrPWYKiIzr76zYJhOSeE5W72BTJnq2qtU7K7M47LGWaExsdjVpbkoAN9XTZiRDhuzfN0FtjmGZkV5kYuOHfp0pzQamyWZvy/V8luRkncAlUlaVhjMqDPZ7g4raMAD8oQpt+bhNOYT2vA0d4aPZ3Q8ymoTa6sDr08wm7MiBALQwU5h4cmD8U6ITgOUkikmwYIRyMhYKXt62oHC3jxB8/qwPTEUDc6mWN8sgaQHFZTpyL1RciunDIuk27Yx47Nw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=juniper.net;dmarc=pass action=none header.from=juniper.net;dkim=pass header.d=juniper.net;arc=none
Received: from BYAPR05MB4341.namprd05.prod.outlook.com (52.135.202.29) by BYAPR05MB6312.namprd05.prod.outlook.com (20.178.51.89) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2073.4; Thu, 4 Jul 2019 13:51:28 +0000
Received: from BYAPR05MB4341.namprd05.prod.outlook.com ([fe80::b1f7:984:312c:6689]) by BYAPR05MB4341.namprd05.prod.outlook.com ([fe80::b1f7:984:312c:6689%5]) with mapi id 15.20.2073.004; Thu, 4 Jul 2019 13:51:28 +0000
From: Tarek Saad <tsaad@juniper.net>
To: Alexander Okonnikov <alexander.okonnikov@gmail.com>
CC: "Mike Taillon (mtaillon)" <mtaillon@cisco.com>, Markus Jork <mjork=40128technology.com@dmarc.ietf.org>, "mpls@ietf.org" <mpls@ietf.org>, "draft-ietf-mpls-summary-frr-rsvpte@ietf.org" <draft-ietf-mpls-summary-frr-rsvpte@ietf.org>, "mpls-chairs@ietf.org" <mpls-chairs@ietf.org>
Thread-Topic: [mpls] Working Group Last Call on draft-ietf-mpls-summary-frr-rsvpte
Thread-Index: AQHVBRQLXUUvMo7rzCjB4jswR2iJIqZgIaiAgAACZYCAApdBAIAGfG2AgAAjcoCAATnFgP//7buAgAMsZQCACdYtAIAdQ0KAgCRy3gA=
Date: Thu, 04 Jul 2019 13:51:28 +0000
Message-ID: <D8A71B1C-7E13-4DBF-B758-59F591B32895@juniper.net>
References: <LEJPR01MB0377540FAEC1EE9448740E78983A0@LEJPR01MB0377.DEUPRD01.PROD.OUTLOOK.DE> <56FE0A66-AD1F-4572-BABF-2B0605B40B06@cisco.com> <CAKe-zUoumWmOrk6EeW7RM1+L7N=vU_6f9k0f+gTbeFmR5gFc7g@mail.gmail.com> <1BFCFD3C-0D3B-425D-AEE4-91ED20F91A93@gmail.com> <D1E9A036-A86B-4C63-BED2-7ADFFA0F6A64@cisco.com> <381C70E4-6A12-4E27-8ABB-D71491F97F87@gmail.com> <C35BDE94-BA4E-42B7-A78B-CC35CAD50748@cisco.com> <FCAB153D-273D-400C-9960-3AD0A7B2C4B8@gmail.com> <0A6682E1-9712-47DA-9ED5-AD8808C536FA@juniper.net> <50F9124B-0C50-4BAC-AE9C-B714B13B92A7@gmail.com> <835661AA-13D3-4F33-B0F0-C97B47AEF310@juniper.net> <48C23481-CB94-48B4-BFA6-74419E2A6484@gmail.com>
In-Reply-To: <48C23481-CB94-48B4-BFA6-74419E2A6484@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1a.0.190609
x-originating-ip: [66.129.241.14]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 94f5422a-42a6-4707-6e65-08d70086b6cc
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:BYAPR05MB6312;
x-ms-traffictypediagnostic: BYAPR05MB6312:
x-ms-exchange-purlcount: 6
x-microsoft-antispam-prvs: <BYAPR05MB6312C75A2794E22DA5436A3DB7FA0@BYAPR05MB6312.namprd05.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0088C92887
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(366004)(376002)(346002)(396003)(39860400002)(136003)(51444003)(189003)(199004)(86362001)(6916009)(3846002)(26005)(186003)(5660300002)(53546011)(102836004)(54906003)(6506007)(486006)(71200400001)(71190400001)(4326008)(99286004)(76176011)(36756003)(5070765005)(76116006)(8936002)(30864003)(6116002)(91956017)(58126008)(66476007)(66556008)(64756008)(66446008)(73956011)(316002)(66946007)(33656002)(81166006)(25786009)(9326002)(66066001)(81156014)(2616005)(53936002)(8676002)(68736007)(11346002)(6246003)(446003)(14454004)(476003)(966005)(7736002)(6512007)(53946003)(6306002)(54896002)(229853002)(236005)(478600001)(256004)(14444005)(2906002)(6436002)(6486002)(606006)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:BYAPR05MB6312; H:BYAPR05MB4341.namprd05.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: juniper.net does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: pSo1C7XNK1mxixr7bhiF0cwU9iVtpd+XftmrmbpjJzseyr1RE1CdpjTs4adRLkq9lE4lD78mnZqvY93H+EAj6pV5iH+/sdTukUK+vs4akFcIXi6iewVg5Qc3KT58O85xxnXFzHINkQuzyO6P/Tn7cjPQUpGSd1wg1EvLYwNJ1whgUVBiOeC9k8q8iUOagJJkXpPaiUG2t/rqyxoOlwIoa+YHKtiyCccfXQZAVqu6Nu8GzHabiY3J2An1I8LRyg2qaMsqN10v6WnY3VyaGSJYsrnru+vW7xA2Urpd3enaxhGGncc+PXhBg+ccclqb2r0IsEI9h2Kfuvxz6zFc//LJdUMj1IZZkHufgAALCxojuU0Fgwqgf0lv/zwNodnC11VJtaUFwoAIDROau3oV4g9R/05HIvlSN/jjD9d12f9h/HE=
Content-Type: multipart/alternative; boundary="_000_D8A71B1C7E134DBFB75859F591B32895junipernet_"
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-Network-Message-Id: 94f5422a-42a6-4707-6e65-08d70086b6cc
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jul 2019 13:51:28.5654 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: tsaad@juniper.net
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR05MB6312
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-07-04_07:, , signatures=0
X-Proofpoint-Spam-Details: rule=outbound_spam_notspam policy=outbound_spam score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1907040171
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/_u6FOtjYeB7i0FRknUAak2wlLCA>
Subject: Re: [mpls] Working Group Last Call on draft-ietf-mpls-summary-frr-rsvpte
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Jul 2019 13:51:44 -0000

Hi Alexander,

Thanks for your feedback. We have added text to clarify that the PLR assigns the same group to LSP(s) that share common group properties (including modified tunnel sender address). Also, the SFRR group(s) carried in the same B-SFRR-Active ASSOCIATION ID will have the same group properties – including the tunnel sender address.

Diff is at: https://tools.ietf.org/rfcdiff?url2=draft-ietf-mpls-summary-frr-rsvpte-05.txt

Regards,
Tarek

From: Alexander Okonnikov <alexander.okonnikov@gmail.com>
Date: Monday, June 10, 2019 at 4:49 AM
To: Tarek Saad <tsaad@juniper.net>
Cc: "Mike Taillon (mtaillon)" <mtaillon@cisco.com>, Markus Jork <mjork=40128technology.com@dmarc.ietf.org>, "mpls@ietf.org" <mpls@ietf.org>, "draft-ietf-mpls-summary-frr-rsvpte@ietf.org" <draft-ietf-mpls-summary-frr-rsvpte@ietf.org>, "mpls-chairs@ietf.org" <mpls-chairs@ietf.org>
Subject: Re: [mpls] Working Group Last Call on draft-ietf-mpls-summary-frr-rsvpte

Hi Tarek,

I'm sorry for late response, and thank you for update. Though it seems that the draft is still not clear regarding assignment of IP address for tunnel sender address by PLR. Without SFRR extension, PLR could assign tunnel sender address independently for each backup LSP. I.e. for backup LSPs that protect transit protected LSPs, PLR could assign the same address that is used by PLR for tunnel sender address in its originated LSPs (usual behavior). PLR will use some different address as tunnel sender address for backup LSPs that protect LSPs originated on PLR. With introduction of SFRR, all protected LSP, that share the same outgoing link and the same bypass tunnel, to be placed into the same bypass group and should share the same tunnel sender address. Thus backup LSPs for transit and locally originated protected LSPs, that share the same outgoing link and the same bypass tunnel, to be placed into the same bypass group.

I see follow possible approaches:

1. PLR always assigns IP for tunnel sender address in backup LSPs (for both transit and locally originated protected LSPs), that differs from IP address that PLR assigns for locally originated protected LSPs. In case there is only one IP address on PLR, tunnel sender address of backup LSPs for transit protected LSPs will be that address, and locally originated LSPs will not be protected on PLR (the same as before SFRR extension).

2. PLR places backup LSPs for transit and locally originated protected LSPs into two separated bypass groups, each of which is assigned with its own tunnel sender address; Two groups still could share the same outgoing link and the same bypass tunnel. During local repair PLR will send two B-SFRR-Active objects (one for transit LSPs and one for locally originated LSPs) in bypass Path message.

3. PLR uses two different bypass tunnels - one for transit protected LSPs and one for locally originated protected LSPs - such that backup LSPs will be automatically grouped into two different groups (due to different bypass tunnels). Obviously not desired.

Thank you.


23 мая 2019 г., в 0:56, Tarek Saad <tsaad@juniper.net<mailto:tsaad@juniper.net>> написал(а):

Hi Alexander,

Thanks much for your inputs and comments. We have uploaded a new revision of the draft at: https://tools.ietf.org/html/draft-ietf-mpls-summary-frr-rsvpte-04<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_html_draft-2Dietf-2Dmpls-2Dsummary-2Dfrr-2Drsvpte-2D04&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Kd6NW5ctLWr7GB646PVmMByvi8wQxPILpKhHvGQeRHY&m=z7BQ72xOSIHW7hMUvtGqZv_ETXDcrBaC5H7aN6ofjn8&s=DkjR4uRsDmukxUEHh9h5fpXZyYl1PuHgBJQiftrt-dA&e=> which addresses the points you raise below.
The diffs are https://tools.ietf.org/rfcdiff?url2=draft-ietf-mpls-summary-frr-rsvpte-04.txt<https://urldefense.proofpoint.com/v2/url?u=https-3A__tools.ietf.org_rfcdiff-3Furl2-3Ddraft-2Dietf-2Dmpls-2Dsummary-2Dfrr-2Drsvpte-2D04.txt&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Kd6NW5ctLWr7GB646PVmMByvi8wQxPILpKhHvGQeRHY&m=z7BQ72xOSIHW7hMUvtGqZv_ETXDcrBaC5H7aN6ofjn8&s=FivJHeqHdTmO95XxzH42A94XSujYRtYOh3x6PWzCBqU&e=>

Please have a look, and let us know if you have further comments.

The updates include

·         Added explicit tunnel sender address in the B-SFRR-Active ASSOCIATION ID and its respective handling by the MP

·         Added IPv4 and IPv6 versions of the B-SFRR-Active ASSOCIATION ID

·         Some minor edits

Regards,
Tarek

From: Alexander Okonnikov <alexander.okonnikov@gmail.com<mailto:alexander.okonnikov@gmail.com>>
Date: Thursday, May 16, 2019 at 7:43 AM
To: Tarek Saad <tsaad@juniper.net<mailto:tsaad@juniper.net>>
Cc: "Mike Taillon (mtaillon)" <mtaillon@cisco.com<mailto:mtaillon@cisco.com>>, Markus Jork <mjork=40128technology.com@dmarc.ietf.org<mailto:mjork=40128technology.com@dmarc.ietf.org>>, "mpls@ietf.org<mailto:mpls@ietf.org>" <mpls@ietf.org<mailto:mpls@ietf.org>>, "draft-ietf-mpls-summary-frr-rsvpte@ietf.org<mailto:draft-ietf-mpls-summary-frr-rsvpte@ietf.org>" <draft-ietf-mpls-summary-frr-rsvpte@ietf.org<mailto:draft-ietf-mpls-summary-frr-rsvpte@ietf.org>>, "mpls-chairs@ietf.org<mailto:mpls-chairs@ietf.org>" <mpls-chairs@ietf.org<mailto:mpls-chairs@ietf.org>>
Subject: Re: [mpls] Working Group Last Call on draft-ietf-mpls-summary-frr-rsvpte

Hi Tarek,

Thank you for answer. Yes, I'm fine with proposed update.

I have some comments regarding choosing address for RSVP_HOP and SENDER_TEMPLATE on PLR and MP.

1) The draft doesn't say that PLR should choose the same Sender address for SENDER_TEMPLATE of backup LSPs as chosen one for corresponding bypass tunnel. Hence it could be that two will be different. It will cause to use different sender address for SENDER_TEMPLATE by PLR and MP.

2) The draft doesn't say that address in RSVP_HOP for backup LSPs and address in SENDER_TEMPLATE for corresponding bypass tunnel should be different. Hence, it could be that addresses in RSVP_HOP of SFRR-Active and in SENDER_TEMPLATE of bypass tunnel are the same. In case when PLR is head-end, it could pose problem for MP in part of choosing sender address for SENDER_TEMPLATE of backup LSP. It could be presumed that address for RSVP_HOP in SFRR-Active is taken from egress transit interface for originated bypass tunnel, and address for SENDER_TEMPLATE of bypass tunnel is loopback address of PLR, and thus they will be different. But in case of unnumbered interface on PLR, that is used as egress by bypass tunnel, election of address for RSVP_HOP is not so straightforward. It could be well possible that for RSVP_HOP of backup LSPs the same loopback address of PLR will be chosen as for SENDER_TEMPLATE of bypass tunnel. Also, RFC 4090 doesn't prescribe how PLR chooses address for RSVP_HOP.

3) The draft says that all protected LSPs, that share the same egress link and are protected by the same bypass tunnel, are assigned to the same bypass group. It is not a problem, if mentioned above inconsitencies will be addressed. Otherwise, there could be problem, because, based on current text, all backup LSPs of the same group should share SENDER_TEMPLATE (i.e. Sender Address in SENDER_TEMPLATE). Though on MP there will be two groups of backup LSPs in the same bypass group: that take address for SENDER_TEMPLATE from SENDER_TEMPLATE of bypass tunnel (transit protected LSP), and that take address for SENDER_TEMPLATE from RSVP_HOP of SFRR-Active (for protected LSPs originated on PLR). For the latter SENDER_TEMPLATE on PLR and MP will be different.

4) The draft says that RSVP_HOP and SENDER_TEMPLATE for backup LSPs of the same bypass group should be the same. I guess that it should say that Sender Address in SENDER_TEMPLATE should be common, rather than SENDER_TEMPLATE itself. SENDER_TEMPLATE will be different for each backup LSP due to different LSP_IDs.

Hence, I would like to see details of choosing addresses for RSVP_HOP and SENDER_TEMPLATE of backup LSPs to be cleaned. Also, I think that it would be better to signal Sender Address for backup LSPs in SFRR-Active explicitly, rather than derive it by MP indirectly from SENDER_TEMPLATE of bypass tunnel.

Thank you.



14 мая 2019 г., в 18:16, Tarek Saad <tsaad@juniper.net<mailto:tsaad@juniper.net>> написал(а):

Hi Alexander,

Thanks for your suggestions and comments. We discussed this further amongst authors. We think the PLR has to do a proactive check of the MTU on the bypass tunnel for proper FRR to work correctly at all times.
We will introduce an addition in section 3.3.1 of the I-D to describe this:

“When using procedures defined in this document, the PLR MUST ensure bypass tunnel assignment can satisfy the protected LSP MTU requirements post FRR. This is to avoid any packets from getting dropped due to exceeding the MTU size of the bypass tunnel after FRR.”

Let us know if this addresses your concerns.

Regards,
Tarek

From: Alexander Okonnikov <alexander.okonnikov@gmail.com<mailto:alexander.okonnikov@gmail.com>>
Date: Tuesday, May 14, 2019 at 8:21 AM
To: "Mike Taillon (mtaillon)" <mtaillon@cisco.com<mailto:mtaillon@cisco.com>>
Cc: Markus Jork <mjork=40128technology.com@dmarc.ietf.org<mailto:mjork=40128technology.com@dmarc.ietf.org>>, "mpls@ietf.org<mailto:mpls@ietf.org>" <mpls@ietf.org<mailto:mpls@ietf.org>>, "draft-ietf-mpls-summary-frr-rsvpte@ietf.org<mailto:draft-ietf-mpls-summary-frr-rsvpte@ietf.org>" <draft-ietf-mpls-summary-frr-rsvpte@ietf.org<mailto:draft-ietf-mpls-summary-frr-rsvpte@ietf.org>>, "mpls-chairs@ietf.org<mailto:mpls-chairs@ietf.org>" <mpls-chairs@ietf.org<mailto:mpls-chairs@ietf.org>>
Subject: Re: [mpls] Working Group Last Call on draft-ietf-mpls-summary-frr-rsvpte
Resent-From: <alias-bounces@ietf.org<mailto:alias-bounces@ietf.org>>
Resent-To: <mtaillon@cisco.com<mailto:mtaillon@cisco.com>>, Tarek Saad <tsaad@juniper.net<mailto:tsaad@juniper.net>>, Rakesh Gandhi <rgandhi@cisco.com<mailto:rgandhi@cisco.com>>, <adeshmukh@juniper.net<mailto:adeshmukh@juniper.net>>, <mjork@128technology.com<mailto:mjork@128technology.com>>, <vbeeram@juniper.net<mailto:vbeeram@juniper.net>>
Resent-Date: Tuesday, May 14, 2019 at 8:21 AM

Hi Mike,

If we don't talk about gap in procedure of Path messages merging by MP, then I don't see other gaps in RFC 4090. But I see that gap with MTU adjusting appears with introduction of Summary FRR.

Current behavior is follow:

1) PLR sends backup LSP Path to MP with actual MTU in ADSPEC;
2) MP sends backup LSP Resv to PLR with actual MTU in FLOWSPEC (derived from ADSPEC);
3) PLR merges FLOWSPECs of protected and backup Resv messages (according to RFC 2210) and sends Resv upstream with actual MTU in FLOWSPEC.

New behavior with Summary FRR:

1) PLR sends SFRR-Active Path to MP;
2) MP does summary refresh for backup LSPs;
3) PLR sends Resv with unchanged MTU of protected LSP upstream, as before failure. This is because FLOWSPEC for backup LSP has not been updated, and resulting FLOWSPEC thus has not been updated.

I cannot agree that head-end not need to be aware about path MTU changes. If head-end is irrespective to actual path MTU, it could cause blackholing of packets that are larger than actual path MTU. Also, I'm not aware about implementations of PLR that take into account MTU in SENDER_TSPEC of protected LSPs and choose bypass tunnels accordingly. My knowledge that many of them agnostic to this.

Thank you.




13 мая 2019 г., в 20:38, Mike Taillon (mtaillon) <mtaillon@cisco.com<mailto:mtaillon@cisco.com>> написал(а):

Hi Alexander

By gap, I mean its not mentioned/covered at all.

To give alternate perspective, I disagree with trying to merge state of primary and backup LSP.
And would think it unncessary for either the MP or the headend to be aware, or make any MTU changes post FRR.

I do agree with your last statement where PLR should ensure the MTU of backup can accomdate the primary LSP MTU (plus any encap added to transport over the backup LSP).
And surely most implementations are already doing this, or FRR wouldn’t be that successful...

Do you not agree this issue/gap is out of scope of (ie. not specific to ) this document ?

-mike





On May 13, 2019, at 11:31 AM, Alexander Okonnikov <alexander.okonnikov@gmail.com<mailto:alexander.okonnikov@gmail.com>> wrote:

Hi Mike,

Do you mean the gap in merging of Path messages by MP in part of choosing ADSPEC of protected LSP rather than merging ADSPECs (choosing minimal MTU, particularly)? Oh, agree. Though if we would assume that MP did perform merging of ADSPEC (and probably other objects where applicable), there would be problem with signaling backup LSP MTU to MP after failure.

I agree that guaranting enough MTU size on all links in the network is good practice, but in reality it not always could be provided, or could be provided with significant penalty on manageability.

Per my understanding, reliable solution would be for head-end:

1) to specify minimum LSP MTU as a constraint (like resource affinities, BW, etc.) for CSPF and take link MTUs from TEDB into consideration, and

2) to signal to downstream LSRs minimum LSP MTU (by virtue of SENDER_TSPEC, like BW), such that PLRs would be able to make decision about availability of bypass tunnels, which can accomodate requested MTU.

Thank you!




9 мая 2019 г., в 15:28, Mike Taillon (mtaillon) <mtaillon@cisco.com<mailto:mtaillon@cisco.com>> написал(а):


Hi Alexander,

I beleive MTU handling post FRR is not covered in base RFC4090 and is therefore an existing gap.
It kinda defeats the purpose if headend needs to adjust MTU after FRR to prevent drops… and would presume most deployments assume that backup MTU can accomandate MTU of primary LSP (plus any added MP labels).

Issue deserves discussion, but think its out of scope from this document.


-mike




On May 7, 2019, at 4:54 PM, Alexander Okonnikov <alexander.okonnikov@gmail.com<mailto:alexander.okonnikov@gmail.com>> wrote:

Hi authors,

As far as Summary FRR LSPs are not being signaled via Path messages over bypass tunnel after failure, information on head-ends about actual path MTU of protected LSPs can be corrupted. For example, path MTU of protected LSP is 1500 bytes (provided that ADSPEC is used), and path MTU of bypass tunnel is, for example, 1500 bytes. As far as Path messages for protected LSPs are not being sent over bypass tunnel, MP will use ADSPEC received in Path messages of those protected LSPs previoulsy (before they have been rerouted onto bypass tunnel), i.e. 1500 bytes in place of 1496 bytes. To avoid this problem PLR would have to signal path MTU of its bypass tunnel in B-SFRR-Active object (alternatively, MP could inherit this value from ADSPEC of PSB of the bypass tunnel), and 2) MP would have to choose minimal of MTU values from ADSPEC objects while merging Summary FRR protected LSP. But, even in this case MP will have to generate trigger Path messages (with updated ADSPEC) for protected LSPs and then, after receiving Resv messages with updated FLOWSPEC, send them to PLR. I.e. summary refresh in MP->PLR direction with high probability will be inapplicable, due to trigger messages.

Thanks.




7 мая 2019 г., в 23:46, Markus Jork <mjork=40128technology.com@dmarc.ietf.org<mailto:mjork=40128technology.com@dmarc.ietf.org>> написал(а):

As a co-author,  I believe this document is ready for publication.
-Markus



On Apr 30, 2019, at 4:33 AM, N.Leymann@telekom.de<mailto:N.Leymann@telekom.de> wrote:

Working Group,

This mail initiates the two weeks working group last call on draft-ietf-mpls-summary-frr-rsvpte which is considered mature and ready for a final working group review.

Please read this document if you haven't read the most recent version yet, and send your comments to the mpls wg mailing list (mpls@ietf.org<mailto:mpls@ietf.org>), not later than 17th of May.

There is one IPR disclosure against draft-ietf-mpls-summary-frr-rsvpte

This working group last call ends May 17th, 2019 (there is at least in some countries a public holiday this week, therefore the call is a bit longer than usual).

Best regards

Nic

_______________________________________________
mpls mailing list
mpls@ietf.org<mailto:mpls@ietf.org>
https://www.ietf.org/mailman/listinfo/mpls<https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_mpls&d=DwMFaQ&c=HAkYuh63rsuhr6Scbfh0UjBXeMK-ndb3voDTXcWzoCI&r=Kd6NW5ctLWr7GB646PVmMByvi8wQxPILpKhHvGQeRHY&m=8ugk0fj6GyOtsYCkrvM6x1jpwt7T7bGkBhQ9Le-SI6k&s=0zgSQxWhO9k94N9On89so_wtqNQ0mXruYDy6Dka6-Lc&e=>