Re: [mpls] MPLS-RT review for draft-mirsky-mpls-p2mp-bfd-14

gregory.mirsky@ztetx.com Fri, 20 August 2021 23:43 UTC

Return-Path: <gregory.mirsky@ztetx.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 331913A0D55; Fri, 20 Aug 2021 16:43:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Qff0Y9n-ufN3; Fri, 20 Aug 2021 16:43:39 -0700 (PDT)
Received: from mxus.zteusa.com (mxus.zteusa.com [4.14.134.162]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 518F33A0D4D; Fri, 20 Aug 2021 16:43:37 -0700 (PDT)
Received: from mse-us.zte.com.cn (unknown [10.36.11.29]) by Forcepoint Email with ESMTPS id A9C136DB3B272CD76037; Sat, 21 Aug 2021 07:43:36 +0800 (CST)
Received: from mgapp02.zte.com.cn ([10.36.9.143]) by mse-us.zte.com.cn with SMTP id 17KNhW2B028548; Sat, 21 Aug 2021 07:43:32 +0800 (GMT-8) (envelope-from gregory.mirsky@ztetx.com)
Received: from mapi (mgapp02[null]) by mapi (Zmail) with MAPI id mid81; Sat, 21 Aug 2021 07:43:31 +0800 (CST)
Date: Sat, 21 Aug 2021 07:43:31 +0800
X-Zmail-TransId: 2afa61203e23d66825eb
X-Mailer: Zmail v1.0
Message-ID: <202108210743319497161@zte.com.cn>
Mime-Version: 1.0
From: gregory.mirsky@ztetx.com
To: Italo.Busi@huawei.com
Cc: draft-mirsky-mpls-p2mp-bfd@ietf.org, mpls-chairs@ietf.org, mach.chen@huawei.com, mpls@ietf.org
Content-Type: multipart/mixed; boundary="=====_001_next====="
X-MAIL: mse-us.zte.com.cn 17KNhW2B028548
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/fx-XiZf_z1EF551MEMAAsMFDkio>
Subject: Re: [mpls] MPLS-RT review for draft-mirsky-mpls-p2mp-bfd-14
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Aug 2021 23:43:46 -0000

Hi Italo,


I much appreciate your detailed review, thoughtful comments, and helpful suggestions. I've applied the proposed updates to a new version of the draft. Please find my answers below in-line tagged GIM>>.








Kind regards,


Greg Mirsky






Sr. Standardization Expert
预研标准部/有线研究院/有线产品经营部 Standard Preresearch Dept./Wireline Product R&D Institute/Wireline Product Operation Division









E: gregory.mirsky@ztetx.com 
www.zte.com.cn






Original Mail



Sender: ItaloBusi
To: draft-mirsky-mpls-p2mp-bfd@ietf.org;mpls-chairs@ietf.org;Mach Chen;
CC: mpls@ietf.org;
Date: 2021/08/19 07:26
Subject: [mpls] MPLS-RT review for draft-mirsky-mpls-p2mp-bfd-14


_______________________________________________
mpls mailing list
mpls@ietf.org
https://www.ietf.org/mailman/listinfo/mpls

 

Hi all,





I have been selected as one of the  MPLS-RT reviewers of draft-mirsky-mpls-p2mp-bfd-14.





I think that the document is coherent, is it useful (i.e., it addresses a real need for operational networks), and it is technically sound.





Therefore, I think that the draft is ready to be adopted as a WG document.





I have few comments that can be addressed either before or after WG adoption.


 


1)      The abstract and introduction have a bit confused me when I have started to read the document


 


After having read the whole draft, my understanding is that the document is describing three points:


·       Procedures for BFD over p2mp LSPs


·       Use of LSP Ping to bootstrap a BFD over p2mp LSP session


·       The behavior of the active tail for head notification


 


The first two point apply to any case and not only to active tails with unsolicited notifications mode.


 


Is my understanding correct?


GIM>> Yes, you're abolutely correct.


 


In this case, it may be better to move the content of section 4.2 to a new section 5.


GIM>> I agree and made the appropriate update in the working version of the drtaft.


 


I would also propose the following rephrasing for the abstract (could be further improved):


 


OLD


   This document describes procedures for using Bidirectional Forwarding


   Detection (BFD) for multipoint networks to detect data plane failures


   in Multiprotocol Label Switching (MPLS) point-to-multipoint (p2mp)


   Label Switched Paths (LSPs) using active tails with unsolicited


   notifications mode.  It also describes the applicability of LSP Ping,


   as in-band, and the control plane, as out-band, solutions to


   bootstrap a BFD session in this environment.


NEW


   This document describes procedures for using Bidirectional Forwarding


   Detection (BFD) for multipoint networks to detect data plane failures


   in Multiprotocol Label Switching (MPLS) point-to-multipoint (p2mp)


   Label Switched Paths (LSPs).


  


   It also describes the applicability of LSP Ping,


   as in-band, and the control plane, as out-band, solutions to


   bootstrap a BFD session.


  


   It also describes the behavior of the active tail for head notification.


 GIM>> Thank you for the suggested text. It improves the Abstract.


I would also propose the following rephrasing for the abstract (could be further improved):


 


OLD


   [RFC8562] defines a method of using Bidirectional Detection (BFD)


   [RFC5880] to monitor and detect unicast failures between the sender


   (head) and one or more receivers (tails) in multipoint or multicast


   networks.  [RFC8562] added two BFD session types - MultipointHead and


   MultipointTail.  Throughout this document, MultipointHead and


   MultipointTail refer to the value of the bfd.SessionType is set on a


   BFD endpoint.  This document describes procedures for using such


   modes of BFD protocol to detect data plane failures in Multiprotocol


   Label Switching (MPLS) point-to-multipoint (p2mp) Label Switched


   Paths (LSPs).  The document also describes the applicability of out-


   band solutions to bootstrap a BFD session in this environment.


NEW


   [RFC8562] defines a method of using Bidirectional Detection (BFD)


   [RFC5880] to monitor and detect unicast failures between the sender


   (head) and one or more receivers (tails) in multipoint or multicast


   networks.


  


   [RFC8562] added two BFD session types - MultipointHead and


   MultipointTail.  Throughout this document, MultipointHead and


   MultipointTail refer to the value of the bfd.SessionType is set on a


   BFD endpoint.


   


   This document describes procedures for using such


   modes of BFD protocol to detect data plane failures in Multiprotocol


   Label Switching (MPLS) point-to-multipoint (p2mp) Label Switched


   Paths (LSPs).


  


   The document also describes the applicability of out-


   band solutions to bootstrap a BFD session in this environment.


 


   It also describes the behavior of the active tail for head notification.


 GIM>> Thank you for your helpdul suggestion improving the Introduction. Accepted into the new working version of the draft.


2)      Could you provide some reference where the inclusive p-tree and aggregate p-tree are defined?


GIM>> RFC 6513 defines Inclusive Tree (Section 2.2.1) P-Multicast Service Interfaces and Aggregate Tree (Section 6.3).


 


If I understand properly the text, the issue is that the MPLS LSP label is not always present so it is not sufficient to always identify the multipoint tree.


 


Am I missing something?


GIM>> If you're asking about how a tail demultiplexes BFD control packets, then RFC 8562 explains the updated procedure. Because p2mp BFD does not use the three-way handshake, BFD control packets cannot be demultiplexed using the value in the Your Discriminator field. Instead, RFC 8562 defines in Section 5.7 that the three-tuple, source address, My Discriminator, and the identity of the multicast tree must be used. In the draft, we don't assume how the identity of the multicast tree can be verified.


 


3)      The setting of the IP DA in section 3.1 of this draft does not seem the same as in RFC8562:


·       section 3.1 of this draft says: 127.0.0.1/32 for IPv4 or ::1/128 for IPv6


·       RFC8562 says: 127.0.0.0/8 range for IPv4 or 0:0:0:0:0:FFFF:7F00:0/104 range for IPv6


 


Is there any specific reason not to use other values in the range defined by RFC8562?


GIM>> Yes, you're right. In the course of IESG reviewing RFCs 8562 and 8971 BFD for VXLAN, we've received comments (even DISCUSS) on the choice of the destination IP address in the case of IP/UDP encapsulation of the BFD control packet. Initially, using the destination address in MPLS LSP ping was suggested to exercise available ECMP paths and then use the same address for the BFD session. But that was the accepted mechanism before the introduction of the Entropy label in RFC 6790. But the strongest argument to use a single IPv4 loopback address was that that would match with what is used in IPv6.


 


4)      For section 3.2, have you considered re-using the BFD CV codepoint defined in RFC6428 instead of defining a new codepoint?


GIM>> Yes, we had and decided that using a new ACH type may help implementors as the behavior of the remote peer is different from when ACH 0x0022 is used. What do you think?


 


5)      In section 5.1 of RFC8563, it is said that this mechanism "uses the reverse unicast path, but not the forward unicast path"


 


It is therefore not clear then how the head can send the unicast IP/UDP encapsulated BFD Control packet with the Final (F) bit set to the egress LSR


GIM>> Thank you for pointing this out. The Unsolicited Notification mode is described in Section 5.2.1 RFC 8563 somewhat tersely. The mechanism of tail notifying the head is not described and is implicitly out of scope. We may need to discuss whether this document updates RFC 8563 in part how Section 5.2.1 characterizes the unsolicited notification method with BFD WG. On the other hand, the text seems to be only informative without any normative content. What would you suggest?






Italo