Re: [mpls] MPLS-RT review for draft-mirsky-mpls-p2mp-bfd-14
Greg Mirsky <gregimirsky@gmail.com> Wed, 08 September 2021 02:37 UTC
Return-Path: <gregimirsky@gmail.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCB913A0D5E; Tue, 7 Sep 2021 19:37:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.696
X-Spam-Level:
X-Spam-Status: No, score=-0.696 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_COMMENT_SAVED_URL=1.391, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_HTML_ATTACH=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KqrvOesSFgf8; Tue, 7 Sep 2021 19:36:58 -0700 (PDT)
Received: from mail-ed1-x531.google.com (mail-ed1-x531.google.com [IPv6:2a00:1450:4864:20::531]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D6023A0D5F; Tue, 7 Sep 2021 19:36:57 -0700 (PDT)
Received: by mail-ed1-x531.google.com with SMTP id eb14so741432edb.8; Tue, 07 Sep 2021 19:36:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=sPUIhow+E/e5LMxD1/+EbHLzm1F1hNkqz/udpNR+VPY=; b=XdvT00FBqS8oHknftavI1FV1DIPsynnjeZtQ4oFUjLIlhNdzcisbNQWnrfi8CriL1d 7T5tNQYZLguhO1edOwWrEv7tW0r1eDoCL/cNfZVjaVDMalrNnwSMf1xRx2rYURFw4da9 314nAL4RxxEh1dvz4qFUwO/1j9ABWVw9YF9COcF0Nw5FT71O94TwrZl9dWndKC7uQ9ND 96dhBs//q5SkZZENut7s1HXxXhfsEuSyTole0TC4crRrpmJUz7cFGMfK/s+ilaP4ub12 zEi8SP2z+uyukTh7AhTEsruOZ47LcHWx0kA0YbAGqGCX7bXTPogNWb/Uyqg46zH3+jru foVA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=sPUIhow+E/e5LMxD1/+EbHLzm1F1hNkqz/udpNR+VPY=; b=OY1WGr54eCIGGiS4TqaHj/ecioOsHZegAqBoedNcTAzptWRSoevmI+3+dFukjkS7Y1 XGdhm4xXOazOxupL4CudaROZpeX8q59TgEcpVjeiBxJwOIcLikXkhgTGCcauBsoLHaqP rpDQfajXzGWS1Se8jeEwrWNGq8mc0xbh6tHiylEU/C9r+EyMVPT5xCeDkwWG4oY87zQv 5Quacf12bRWrxeN2JAVjtPcWPkhxcoqYQKI6PUaGUCD9PLz1C6e3k28hBZvQdjor2Xbo a10isZGQxlFIBQvZwJw2f6rp/S3B97GsI3ueMOMnR3hCmka66zSIWxHhCHdnh/NQsvCd C/Sg==
X-Gm-Message-State: AOAM532+S1uCKaqxJIbqMUtIvQJuCiJnPT/tbOePwL9NgBLCs9QvX/Sb ZYFqTBJtk5g2ia5FixuAox0Zfc8pp8CxjnF6x3elgViSQKE=
X-Google-Smtp-Source: ABdhPJw85j5kIaNcVLYK354xUuJtdMzypa0ln/QbhevdECBPQBZ5LiXn/9loDl6MMLW87G0z19VNHawbrdysTO38wcg=
X-Received: by 2002:aa7:de16:: with SMTP id h22mr1414421edv.3.1631068615630; Tue, 07 Sep 2021 19:36:55 -0700 (PDT)
MIME-Version: 1.0
References: <202108210743319497161@zte.com.cn> <6ebe2968eec540c496be4ec357c7507a@huawei.com>
In-Reply-To: <6ebe2968eec540c496be4ec357c7507a@huawei.com>
From: Greg Mirsky <gregimirsky@gmail.com>
Date: Tue, 07 Sep 2021 19:36:43 -0700
Message-ID: <CA+RyBmVBx9FJ9Cx=kfAXj3EAezbNOp=xQwxrk9Jtz27vucwd5Q@mail.gmail.com>
To: Italo Busi <Italo.Busi@huawei.com>
Cc: "gregory.mirsky@ztetx.com" <gregory.mirsky@ztetx.com>, "draft-mirsky-mpls-p2mp-bfd@ietf.org" <draft-mirsky-mpls-p2mp-bfd@ietf.org>, "mpls-chairs@ietf.org" <mpls-chairs@ietf.org>, Mach Chen <mach.chen@huawei.com>, "mpls@ietf.org" <mpls@ietf.org>
Content-Type: multipart/mixed; boundary="00000000000071d89b05cb72c15d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/h19OCdBL7xIUDZyZSvxfM8HdXR4>
Subject: Re: [mpls] MPLS-RT review for draft-mirsky-mpls-p2mp-bfd-14
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Sep 2021 02:37:06 -0000
Hi Italo, many thanks for your follow-up notes that helped me make more improvements to the draft. Please find my new notes in-lined below under the GIM2>> tag. A new working version and the diff are attached. Regards, Greg On Mon, Sep 6, 2021 at 6:45 AM Italo Busi <Italo.Busi@huawei.com> wrote: > Hi Greg, > > > > Thanks for your prompt reply and sorry to be late (still processing my > mail log after holidays) > > > > See some feedbacks in line marked with [[Italo Busi]] > > > > Thanks, Italo > > > > *From:* gregory.mirsky@ztetx.com [mailto:gregory.mirsky@ztetx.com] > *Sent:* sabato 21 agosto 2021 01:44 > *To:* Italo Busi <Italo.Busi@huawei.com> > *Cc:* draft-mirsky-mpls-p2mp-bfd@ietf.org; mpls-chairs@ietf.org; Mach > Chen <mach.chen@huawei.com>; mpls@ietf.org > *Subject:* Re:[mpls] MPLS-RT review for draft-mirsky-mpls-p2mp-bfd-14 > > > > Hi Italo, > > I much appreciate your detailed review, thoughtful comments, and helpful > suggestions. I've applied the proposed updates to a new version of the > draft. Please find my answers below in-line tagged GIM>>. > > > > Kind regards, > > Greg Mirsky > > > > Sr. Standardization Expert > 预研标准部/有线研究院/有线产品经营部 Standard Preresearch Dept./Wireline Product R&D > Institute/Wireline Product Operation Division > > > > > E: gregory.mirsky@ztetx.com > www.zte.com.cn > > Original Mail > > *Sender: *ItaloBusi > > *To: *draft-mirsky-mpls-p2mp-bfd@ietf.org;mpls-chairs@ietf.org;Mach Chen; > > *CC: *mpls@ietf.org; > > *Date: *2021/08/19 07:26 > > *Subject: [mpls] MPLS-RT review for draft-mirsky-mpls-p2mp-bfd-14* > > _______________________________________________ > mpls mailing list > mpls@ietf.org > https://www.ietf.org/mailman/listinfo/mpls > > Hi all, > > I have been selected as one of the MPLS-RT reviewers of > draft-mirsky-mpls-p2mp-bfd-14. > > I think that the document is coherent, is it useful (i.e., it addresses a > real need for operational networks), and it is technically sound. > > Therefore, I think that the draft is ready to be adopted as a WG document. > > I have few comments that can be addressed either before or after WG > adoption. > > > > 1) The abstract and introduction have a bit confused me when I have > started to read the document > > > > After having read the whole draft, my understanding is that the document > is describing three points: > > · Procedures for BFD over p2mp LSPs > > · Use of LSP Ping to bootstrap a BFD over p2mp LSP session > > · The behavior of the active tail for head notification > > > > The first two point apply to any case and not only to active tails with > unsolicited notifications mode. > > > > Is my understanding correct? > > GIM>> Yes, you're abolutely correct. > > > > In this case, it may be better to move the content of section 4.2 to a new > section 5. > > GIM>> I agree and made the appropriate update in the working version of > the drtaft. > > > > I would also propose the following rephrasing for the abstract (could be > further improved): > > > > OLD > > This document describes procedures for using Bidirectional Forwarding > > Detection (BFD) for multipoint networks to detect data plane failures > > in Multiprotocol Label Switching (MPLS) point-to-multipoint (p2mp) > > Label Switched Paths (LSPs) using active tails with unsolicited > > notifications mode. It also describes the applicability of LSP Ping, > > as in-band, and the control plane, as out-band, solutions to > > bootstrap a BFD session in this environment. > > NEW > > This document describes procedures for using Bidirectional Forwarding > > Detection (BFD) for multipoint networks to detect data plane failures > > in Multiprotocol Label Switching (MPLS) point-to-multipoint (p2mp) > > Label Switched Paths (LSPs). > > > > It also describes the applicability of LSP Ping, > > as in-band, and the control plane, as out-band, solutions to > > bootstrap a BFD session. > > > > It also describes the behavior of the active tail for head notification. > > GIM>> Thank you for the suggested text. It improves the Abstract. > > I would also propose the following rephrasing for the abstract (could be > further improved): > > > > OLD > > [RFC8562] defines a method of using Bidirectional Detection (BFD) > > [RFC5880] to monitor and detect unicast failures between the sender > > (head) and one or more receivers (tails) in multipoint or multicast > > networks. [RFC8562] added two BFD session types - MultipointHead and > > MultipointTail. Throughout this document, MultipointHead and > > MultipointTail refer to the value of the bfd.SessionType is set on a > > BFD endpoint. This document describes procedures for using such > > modes of BFD protocol to detect data plane failures in Multiprotocol > > Label Switching (MPLS) point-to-multipoint (p2mp) Label Switched > > Paths (LSPs). The document also describes the applicability of out- > > band solutions to bootstrap a BFD session in this environment. > > NEW > > [RFC8562] defines a method of using Bidirectional Detection (BFD) > > [RFC5880] to monitor and detect unicast failures between the sender > > (head) and one or more receivers (tails) in multipoint or multicast > > networks. > > > > [RFC8562] added two BFD session types - MultipointHead and > > MultipointTail. Throughout this document, MultipointHead and > > MultipointTail refer to the value of the bfd.SessionType is set on a > > BFD endpoint. > > > > This document describes procedures for using such > > modes of BFD protocol to detect data plane failures in Multiprotocol > > Label Switching (MPLS) point-to-multipoint (p2mp) Label Switched > > Paths (LSPs). > > > > The document also describes the applicability of out- > > band solutions to bootstrap a BFD session in this environment. > > > > It also describes the behavior of the active tail for head notification. > > GIM>> Thank you for your helpdul suggestion improving the Introduction. > Accepted into the new working version of the draft. > > 2) Could you provide some reference where the inclusive p-tree and > aggregate p-tree are defined? > > GIM>> RFC 6513 <https://datatracker.ietf.org/doc/html/rfc6513> defines > Inclusive Tree (Section 2.2.1) P-Multicast Service Interfaces and Aggregate > Tree (Section 6.3). > > *[[Italo Busi] ] Thanks: I would suggest to add this (as informative) also > in the draft* > GIM2>> Based on the comment below, I agree that this is unnecessary and the text can be removed.. > > > If I understand properly the text, the issue is that the MPLS LSP label is > not always present so it is not sufficient to always identify the > multipoint tree. > > > > Am I missing something? > > GIM>> If you're asking about how a tail demultiplexes BFD control packets, > then RFC 8562 explains the updated procedure. Because p2mp BFD does not use > the three-way handshake, BFD control packets cannot be demultiplexed using > the value in the Your Discriminator field. Instead, RFC 8562 defines in > Section 5.7 that the three-tuple, source address, My Discriminator, and the > identity of the multicast tree must be used. In the draft, we don't assume > how the identity of the multicast tree can be verified. > > *[[Italo Busi] ] I am trying to fully understand the general message you > wish to convey with this text:* > > <...> The p2mp MPLS LSP label MAY provide the identification of > > the multipoint tree in case of an inclusive p-tree or upstream- > > assigned label in case of aggregate p-tree. > > *If your intention is to leave the assumption of how the identity of the > multicast tree can be verified out of scope of the draft, I would suggest > to be explicit about that* > > *Thinking further, I am having the feeling that if the p2mp MPLS LSP label > is not in the packet (e.g., because of PHP), then the tail cannot verify > the identity of the multicast tree and that, in any case, the source > address and the My Discriminator are sufficient to identify the BFD session > at the tail.* > GIM2>> Thank you for pointing it out to me. Indeed, the combination of the Source IP address and My Discriminator value provide enough information to demultiplex a BFD session at a tail in all scenarios, e.g., multiple BFD p2mp sessions from the same Head. I've removed the text. > 3) The setting of the IP DA in section 3.1 of this draft does not > seem the same as in RFC8562: > > · section 3.1 of this draft says: 127.0.0.1/32 for IPv4 or ::1/128 > for IPv6 > > · RFC8562 says: 127.0.0.0/8 range for IPv4 or > 0:0:0:0:0:FFFF:7F00:0/104 range for IPv6 > > > > Is there any specific reason not to use other values in the range defined > by RFC8562? > > GIM>> Yes, you're right. In the course of IESG reviewing RFCs 8562 and > 8971 BFD for VXLAN, we've received comments (even DISCUSS) on the choice of > the destination IP address in the case of IP/UDP encapsulation of the BFD > control packet. Initially, using the destination address in MPLS LSP ping > was suggested to exercise available ECMP paths and then use the same > address for the BFD session. But that was the accepted mechanism before the > introduction of the Entropy label in RFC 6790. But the strongest argument > to use a single IPv4 loopback address was that that would match with what > is used in IPv6. > > *[[Italo Busi] ] I think it would be better to add some text explaining > this to the draft and to mark the draft as an update of RFC8562 (I expect > that not all the readers are familiar with the IESG discussion)* > GIM2>> I've added the following text: NEW TEXT: Note that that is different from how the destination IP address selection is defined in Section 7 [RFC5884]. Firstly, because only one loopback address ::1/128 is defined in IPv6. And also, it is recommended to use the Entropy Label [RFC6790] to discover multiple alternate paths in an MPLS network. Using a single loopback address both for IPv4 and IPv6 encapsulation makes it consistent and more straightforward for an implementation. I am not sure that our proposal updates RFC 8562 (or RFC 5884). I think of it as a simplification of the specification that makes IPv4 and IPv6 encapsulations look consistent. > > > 4) For section 3.2, have you considered re-using the BFD CV > codepoint defined in RFC6428 instead of defining a new codepoint? > > GIM>> Yes, we had and decided that using a new ACH type may help > implementors as the behavior of the remote peer is different from when ACH > 0x0022 is used. What do you think? > > *[[Italo Busi] ] It’s fine for me* > > > > 5) In section 5.1 of RFC8563, it is said that this mechanism "uses > the reverse unicast path, but not the forward unicast path" > > > > It is therefore not clear then how the head can send the unicast IP/UDP > encapsulated BFD Control packet with the Final (F) bit set to the egress LSR > > GIM>> Thank you for pointing this out. The Unsolicited Notification mode > is described in Section 5.2.1 RFC 8563 somewhat tersely. The mechanism of > tail notifying the head is not described and is implicitly out of scope. We > may need to discuss whether this document updates RFC 8563 in part how > Section 5.2.1 characterizes the unsolicited notification method with BFD > WG. On the other hand, the text seems to be only informative without any > normative content. What would you suggest? > > *[[Italo Busi] ] I would suggest to mark the draft as an update of RFC8563 > since in section 5.2.1 (not section 5.1 as I have originally written > incorrectly) RFC8563 clearly states that the forward unicast path is not > used* > GIM2>> I've read the first paragraph in Section 5.2.1 again and probably confused myself more: In this scenario, the tail sends unsolicited BFD packets in response to the detection of a multipoint path failure. It uses the reverse unicast path, but not the forward unicast path. I'll need an expert opinion on which element is meant in the "It uses ...". Is it the tail that sends an unsolicited BFD control packet or the characterizes the method as a whole. I hope it is okay to hold off marking this as an update until we have a clearer interpretation of the text in RFC 8563. > *BTW, is the forward unicast path required to be an IP path? If I > understand correctly, the tail node will use the Your Discriminator field > to associate the unicast BFD control packet with a local BFD session, so > this packet can also be encapsulated within a G-ACh* > GIM2>> A very interesting question, thank you. I think that we can make the following update: OLD TEXT: o BFD Control packet is encapsulated in IP/UDP with the destination IP address of the ingress LSR and the UDP destination port number set to 4784 per [RFC5883] NEW TEXT: o BFD Control packet MAY be encapsulated in IP/UDP with the destination IP address of the ingress LSR and the UDP destination port number set to 4784 per [RFC5883]. If non-IP encapsulation is used, then a BFD Control packet is encapsulated using PW-ACH encapsulation (without IP/UDP Headers) (0x0007) [RFC5885]; What is your opinion? > > > Italo > > > > >
- [mpls] MPLS-RT review for draft-mirsky-mpls-p2mp-… Italo Busi
- Re: [mpls] MPLS-RT review for draft-mirsky-mpls-p… gregory.mirsky
- Re: [mpls] MPLS-RT review for draft-mirsky-mpls-p… Italo Busi
- Re: [mpls] MPLS-RT review for draft-mirsky-mpls-p… Greg Mirsky