Re: [mpls] New Version Notification for draft-mirsky-mpls-p2mp-bfd-07.txt

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Sun, 16 June 2019 04:31 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3557512009E for <mpls@ietfa.amsl.com>; Sat, 15 Jun 2019 21:31:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -13.374
X-Spam-Level:
X-Spam-Status: No, score=-13.374 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTP_ESCAPED_HOST=1.125, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=Aq9B3gw2; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=ECZBbsSx
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CgarEp6uU51g for <mpls@ietfa.amsl.com>; Sat, 15 Jun 2019 21:31:55 -0700 (PDT)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2429C120025 for <mpls@ietf.org>; Sat, 15 Jun 2019 21:31:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=20545; q=dns/txt; s=iport; t=1560659515; x=1561869115; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=itVbdleHZMZxHLoSer6sGQyGd1UpD7Pak+IKRXLgnAY=; b=Aq9B3gw233ThXhMSpa/WKyQmXIed5+XQU1IzXQzN7i9RBTo/zXmkQq+z 578krd3zUAQjeh/1Vy9YhCe3latEDS4LUg3SzaJzRd7iEagZR12tRMukF 2GmQW2YjMhc5cYNRmCS1PumI7BmtII3gGYZEilkEBbrt4EGt244ugU+NB Y=;
IronPort-PHdr: 9a23:1UGw8x/FQeomDv9uRHGN82YQeigqvan1NQcJ650hzqhDabmn44+8ZR7E/fs4iljPUM2b8P9Ch+fM+4HYEW0bqdfk0jgZdYBUERoMiMEYhQslVcWdCEL9JeLjRyc7B89FElRi+iLzPA==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AYAADFxAVd/5hdJa1cAQkbAQEBAQMBAQEHAwEBAYFRBgEBAQsBgQ4vKScDalUgBAsoCoQMg0cDhFKKD4IyJYlFiR6EU4EuFIEQA1QJAQEBDAEBGAEMCAIBAYRAAheCNSM0CQ4BAwEBBAEBAgEEbRwBC4VKAQEBAQMBARARHQEBJQcJAgEPAgEIEQMBAigDAgICHwYLFAkIAgQOBRsHgwABgR1NAx0BAgybTgKBOIhfcYExgnkBAQWBNgIOQUCCMg0LghAJgTQBhHCGbReBQD+BEAEnDBOCTD6CGkcBAQIBARaBDwUBBwEKAQcXIQYHEYJMMoImi1UbCQWCPYR0I4gnjSg+CQKCEIVsXIZjgjyDaxuCJ2mGGo4GjR2BcIUygWmKUIMIAgQCBAUCDgEBBYE9EzhncXAVGiEqAYJBCTWBUYElAQKCSIUUhT9yAQGBJ4x3gSIBgSABAQ
X-IronPort-AV: E=Sophos;i="5.63,380,1557187200"; d="scan'208,217";a="575102574"
Received: from rcdn-core-1.cisco.com ([173.37.93.152]) by rcdn-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 16 Jun 2019 04:31:53 +0000
Received: from XCH-ALN-006.cisco.com (xch-aln-006.cisco.com [173.36.7.16]) by rcdn-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id x5G4VrBT004054 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 16 Jun 2019 04:31:53 GMT
Received: from xhs-rcd-001.cisco.com (173.37.227.246) by XCH-ALN-006.cisco.com (173.36.7.16) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sat, 15 Jun 2019 23:31:52 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-rcd-001.cisco.com (173.37.227.246) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sat, 15 Jun 2019 23:31:52 -0500
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Sun, 16 Jun 2019 00:31:51 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=itVbdleHZMZxHLoSer6sGQyGd1UpD7Pak+IKRXLgnAY=; b=ECZBbsSxSzLSEZlVN6eT8anVTdKo20BnZT7lCC7YplIxw9iP+3i4meGpGappe95MYVq6j6Wx4NTf76kqgmkF3M0lazvUY3f2Lap0sq6f3QYCVR1BnsK463LCmmc0zmXGUT6P2x9H5/LkX1JEb2Ql7cUiG5qBMXNd1ZOgCmtBsw8=
Received: from BL0PR11MB3028.namprd11.prod.outlook.com (20.177.204.138) by BL0PR11MB3028.namprd11.prod.outlook.com (20.177.204.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1987.10; Sun, 16 Jun 2019 04:31:50 +0000
Received: from BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::ec33:f4c1:227a:fcb3]) by BL0PR11MB3028.namprd11.prod.outlook.com ([fe80::ec33:f4c1:227a:fcb3%5]) with mapi id 15.20.1987.014; Sun, 16 Jun 2019 04:31:50 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: "gregory.mirsky@ztetx.com" <gregory.mirsky@ztetx.com>
CC: mpls <mpls@ietf.org>, "mpls-chairs@mpls.org" <mpls-chairs@mpls.org>
Thread-Topic: [mpls] New Version Notification for draft-mirsky-mpls-p2mp-bfd-07.txt
Thread-Index: AQHVIBZk7ysCjjNRQkKQv+t2kpmKq6aduKaA
Date: Sun, 16 Jun 2019 04:31:50 +0000
Message-ID: <CF4BE705-3C4D-4490-B2FD-BDAA6023D8B3@cisco.com>
References: <201906111326463830058@zte.com.cn>
In-Reply-To: <201906111326463830058@zte.com.cn>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3445.104.11)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cpignata@cisco.com;
x-originating-ip: [173.38.117.70]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 08c62bf5-0b71-4d98-be27-08d6f2138d1a
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BL0PR11MB3028;
x-ms-traffictypediagnostic: BL0PR11MB3028:
x-ms-exchange-purlcount: 8
x-microsoft-antispam-prvs: <BL0PR11MB302820299AD052AC9E92B69CC7E80@BL0PR11MB3028.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0070A8666B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(366004)(346002)(376002)(136003)(39860400002)(189003)(199004)(22974007)(54906003)(486006)(446003)(33656002)(11346002)(4326008)(25786009)(2616005)(476003)(66946007)(7736002)(478600001)(8676002)(57306001)(413944005)(966005)(15650500001)(2420400007)(81156014)(81166006)(66556008)(64756008)(66446008)(66476007)(8936002)(2501003)(229853002)(6246003)(14454004)(76116006)(73956011)(6916009)(6486002)(5640700003)(6436002)(50226002)(236005)(6306002)(68736007)(54896002)(6512007)(606006)(53936002)(76176011)(186003)(256004)(3846002)(14444005)(6116002)(316002)(7110500001)(2906002)(36756003)(66066001)(99286004)(71200400001)(71190400001)(86362001)(102836004)(66574012)(2351001)(26005)(53546011)(6506007)(5660300002); DIR:OUT; SFP:1101; SCL:1; SRVR:BL0PR11MB3028; H:BL0PR11MB3028.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: OWvmbSe+q6VOVrTt2wYgq5djBbQB42GNdHCUNdtsKT4Mdrj0Fvrk8OnrfwH3fG/NSKB3cut1bFwFCNIhb1l2ldN2z30GhPhyCueSjDV9xlPR4EVIx55GRRhM9ZEes1czwwSvNbmvQXD/ClJ4VvZ41SzslkF/FzuqcVO9k9/ZAQxYyZPipq+z7FVwulT8YDv+qSUQf4f7gpjbSPvCOTRFUhvVPK1OnL/nkgJIFhX6DajB7FOnD3qlbSVtFpFKjeGDn09VUT4oCPsIv/OhTcdGMmj/pwa0C2rLDGXWS9ujbe+ILIOMVsEel/lghGXuQlY79Urb11sHDswErsYzLtuhAEUu9MIFdQ/ApqqkxxD+lf3aIIktEpltvzcgBoyiWCusNsR8CXg6iiWpE8DxeV75xMBg3mUJdBsg4gmu6TXieko=
Content-Type: multipart/alternative; boundary="_000_CF4BE7053C4D4490B2FDBDAA6023D8B3ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 08c62bf5-0b71-4d98-be27-08d6f2138d1a
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Jun 2019 04:31:50.3944 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: cpignata@cisco.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR11MB3028
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.16, xch-aln-006.cisco.com
X-Outbound-Node: rcdn-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/d74KfkCmiaCd0bI8uqEAv8Q2Tws>
Subject: Re: [mpls] New Version Notification for draft-mirsky-mpls-p2mp-bfd-07.txt
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 16 Jun 2019 04:31:59 -0000

Dear Greg,


On Jun 11, 2019, at 1:26 AM, gregory.mirsky@ztetx.com<mailto:gregory.mirsky@ztetx.com> wrote:


Dear Carlos,

thank you for your comments. Please find my answers and notes in-line tagged GIM>>.

You are welcome — please find my follow-ups inline.


Regards,

Greg Mirsky


Hello,

I’ve not looked at this whole document, but this email triggered me to check the encapsulation of BFD. So, while not commenting on the value of this document, I do have two questions: one on the encapsulation, one on the proposed new TLV.

The IP BFD encapsulation described here is the same for p2p and for multipoint, based on RFC 8562 and Section 3.1 of this doc, using destination UDP port 3784.

However, Section 3.2 requests a new G-ACh Channel Type (see Section 3.1) for “Multipoint BFD Session”, different than BFD over G-ACh as per RFC 5885.
GIM>> If BFD control packet transmitted over MPLS LSP, whether p2p or p2mp, using IP/UDP encapsulation, then it may be achieved without the use of any G-ACh. Over a PW, BFD control packet in IP/UDP encapsulation can be transmitted using ACH type 0x0021 (IPv4) or 0x0057 (IPv6). The new G-ACh is proposed for the scenario when a BFD control packet for p2mp BFD session to be transmitted without IP/UDP encapsulation, in so-called PW-ACH encapsulation (without IP/UDP Headers).

I understand what you write, but it does not answer my question.

What are the technical reasons for your document to request a new “Multipoint BFD Session” code point and not use:
    0x0007  BFD Control, PW-ACH encapsulation (without IP/UDP Headers)


 Will clarify the description in the IANA Considerations section.

Why this difference? What is the reason to have to differentiate with a new Channel Type?
GIM>> The reason is that RFC 8562 changes how the tail demultiplexes BFD control packet. Because the Your Discriminator field in BFD control packet received by a tail will always be 0, RFC 8562 defined:
   IP and MPLS multipoint tails MUST demultiplex BFD packets based on a
   combination of the source address, My Discriminator, and the identity
   of the multipoint path that the multipoint BFD Control packet was
   received from.  Together they uniquely identify the head of the
   multipoint path.

Again, if you use the same code point for IP encapsulation for p2p and mp. Why does non-IP use different ones?
Why not use 0x0007 for this document’s non-IP encapsulation?

The new G-ACh type is to indicate that TLV that carries the source address immediately follows the BFD control packet.
   Also, the “CC/CV MEP-ID TLV” is specified in RFC 6428, which is scoped to MPLS-TP. See also the scope in RFC 7276, defining usage of BFD in MPLS-TP. How is that proposed to be used for MPLS?
   GIM>> Thank you for catching it. References to "MEP ID" are unnecessary and will be removed in the next version.


The real question is: What is this document defining really? What specific behavior needs specifying?

Best,

Carlos.


Best,

Carlos.

On Jun 5, 2019, at 4:40 PM, Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com><mailto:gregimirsky@gmail.com>> wrote:

Dear All,
the new version includes updates:

  *   request for the allocation of a new G-ACh type "Multipoint BFD Session"
  *   an extended explanation for the use of non-IP encapsulation of BFD control packet in multipoint BFD session over MPLS LSP
  *   updated references to RFC 8562 BFD for Multipoint Networks

Hope it helps to get WG AP decision.

Regards,
Greg

---------- Forwarded message ---------
From: <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org><mailto:internet-drafts@ietf.org>>
Date: Tue, Jun 4, 2019 at 6:19 PM
Subject: New Version Notification for draft-mirsky-mpls-p2mp-bfd-07.txt
To: Gregory Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com><mailto:gregimirsky@gmail.com>>



A new version of I-D, draft-mirsky-mpls-p2mp-bfd-07.txt
has been successfully submitted by Greg Mirsky and posted to the
IETF repository.

Name:           draft-mirsky-mpls-p2mp-bfd
Revision:       07
Title:          BFD for Multipoint Networks over Point-to-Multi-Point MPLS LSP
Document date:  2019-06-04
Group:          mpls
Pages:          8
URL:            https://www.ietf.org/internet-drafts/draft-mirsky-mpls-p2mp-bfd-07.txtStatus:         https://datatracker.ietf.org/doc/draft-mirsky-mpls-p2mp-bfd/Htmlized:       https://tools.ietf.org/html/draft-mirsky-mpls-p2mp-bfd-07Htmlized:       https://datatracker.ietf.org/doc/html/draft-mirsky-mpls-p2mp-bfdDiff:           https://www.ietf.org/rfcdiff?url2=draft-mirsky-mpls-p2mp-bfd-07Abstract:
   This document describes procedures for using Bidirectional Forwarding
   Detection (BFD) for multipoint networks to detect data plane failures
   in Multiprotocol Label Switching (MPLS) point-to-multipoint (p2mp)
   Label Switched Paths (LSPs).  It also describes the applicability of
   LSP Ping, as in-band, and the control plane, as out-band, solutions
   to bootstrap a BFD session in this environment.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org<http://tools.ietf.org/><http://tools.ietf.org%3Chttp//tools.ietf.org/%3E.>;.

The IETF Secretariat

_______________________________________________
mpls mailing list
mpls@ietf.org<mailto:mpls@ietf.org><mailto:mpls@ietf.org>https://www.ietf.org/mailman/listinfo/mpls