Re: [mpls] draft-andersson-mpls-mna-fwk

bruno.decraene@orange.com Tue, 14 June 2022 09:07 UTC

Return-Path: <bruno.decraene@orange.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AD5BC1649D8 for <mpls@ietfa.amsl.com>; Tue, 14 Jun 2022 02:07:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=orange.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1VNDesArT-QX for <mpls@ietfa.amsl.com>; Tue, 14 Jun 2022 02:07:52 -0700 (PDT)
Received: from relais-inet.orange.com (relais-inet.orange.com [80.12.66.41]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B712DC1649DE for <mpls@ietf.org>; Tue, 14 Jun 2022 02:07:51 -0700 (PDT)
Received: from opfedar00.francetelecom.fr (unknown [xx.xx.xx.11]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by opfedar22.francetelecom.fr (ESMTP service) with ESMTPS id 4LMjJP6LY9z2xLJ; Tue, 14 Jun 2022 11:07:49 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orange.com; s=ORANGE001; t=1655197669; bh=UTtttJucqUJxOdWr6By0zKHzM0Bifr2/wTiYWkb2+x8=; h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version; b=DR9B8Us9t5Tpk3QR7lHo4XKXimU903cDxJuMsTaPH90s1RivG//pGKFGHa+Zz+KC+ n0767uqHAzurLLdBkHZWYIDb4fUnKVKoiplsSOmvi0u2EBqXiAJLkQwIYt3HIx6KJq z1gEBVqXEvOtSkckRDx9s2reCFlXipoyAYEs9xTW08XDzkS8lT+NoGOLDLr0afAxj2 q8ZDoRjCLEUJlCidw1J9SRalgR/zeUswzSgvqDHl34XUIjG6sLvfzrLAsbsd4oMtDa kgYNMhBh2c0j8H5CxPJ0+OHC+hT6P/3aIo1beLTAIGocfCXVz0rEKpHS4Gt+1S+A8+ qaEwFElVX5H8w==
From: bruno.decraene@orange.com
To: Tony Li <tony.li@tony.li>
CC: mpls <mpls@ietf.org>
Thread-Topic: [mpls] draft-andersson-mpls-mna-fwk
Thread-Index: AQHYfQS4rR5R5qkbgkaUs14sMQALaq1Ol/6A
Date: Tue, 14 Jun 2022 09:07:49 +0000
Message-ID: <30650_1655197669_62A84FE5_30650_14_1_d3a3a20aa42e4cbaa3547230c66fe733@orange.com>
References: <6839_1654697978_62A0AFFA_6839_46_1_e76c4078f46449e3b127bb647052f861@orange.com> <C05F145D-9792-4BEE-8560-4BA0A58F6539@tony.li> <26200_1654766556_62A1BBDC_26200_53_1_fe98be56ce92458c974183d848942b4b@orange.com> <83BF6BB5-04A4-453D-91A6-54C3D1C91C3B@tony.li> <13112_1654794001_62A22711_13112_310_18_c915971a6c31403e9cab5040863566ad@orange.com> <CF34DAF6-8944-4735-B69A-D30089E38973@tony.li>
In-Reply-To: <CF34DAF6-8944-4735-B69A-D30089E38973@tony.li>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Enabled=true; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_SetDate=2022-06-14T09:07:47Z; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Method=Standard; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_Name=Orange_restricted_external.2; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_SiteId=90c7a20a-f34b-40bf-bc48-b9253b6f5d20; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ActionId=2924e312-0894-4cd4-825f-bd5eb8fd2c11; MSIP_Label_f47c794b-e3ab-43f0-9e0f-29fc3e503192_ContentBits=2
x-originating-ip: [10.115.27.53]
Content-Type: multipart/alternative; boundary="_000_d3a3a20aa42e4cbaa3547230c66fe733orangecom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/ltB_Ft8xUAO8cCHwciPT3seSvvk>
Subject: Re: [mpls] draft-andersson-mpls-mna-fwk
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Jun 2022 09:07:57 -0000

Hi Tony,



Orange Restricted
From: Tony Li <tony1athome@gmail.com> On Behalf Of Tony Li
Sent: Friday, June 10, 2022 10:00 PM
To: DECRAENE Bruno INNOV/NET <bruno.decraene@orange.com>
Cc: mpls <mpls@ietf.org>
Subject: Re: [mpls] draft-andersson-mpls-mna-fwk


Hi Bruno,

Or, are you suggesting some remapping mechanism, whereby all actions are remapped to locally defined bits.  Thus, in my domain entropy might be bit 0.  In your domain, it might be bit 6?
[Bruno] I was suggesting just this.


Ok.  Proposed text:

                                A solution may include a bit remapping mechanism so that a given domain may optimize for its commonly used actions.

[Bruno2] Much better than my text. Thank you. Works for me.

We are proposing adding signaling that indicates MNA capable systems.  Any system pushing a stack including MNA should compute a path that only includes MNA routers.  In cases where the path can change without warning, management would need to ensure that all possible alternative paths are MNA enabled.
[Bruno] OK. I’ll need some time to think about this.
Preliminary personal feedbacks:
- I think that this should be explicitly indicated in the draft.


Please see section 2.3. If the wording seems unclear, please feel free to propose clarifications.

[Bruno2] §2.3 explains the need for signaling and is mostly fine, although the last paragraph refers to ingress behavior. §2.2 describes partial processing on nodes and probably could talk about this.
If we want to follow that path (of been not backward compatible) I’d propose the following clarification:
§2 “Legacy transit SR compliant with RFC3031 are allowed to scan the whole label stack. This framework allows for MNA to encode, in the LSE.Label field, a value in the reserved label space (0-15) [RFC3032]. This may not be backward compatible with existing and future used of reserved label. In order to avoid ‘train wreck’ the ingress LER pushing the MNA in the LSE MUST ensure that all downstream nodes supports MNA.”

However, my preference would be for a solution being backward compatible with existing transit LSR (not needing to act on the MSA) and avoiding ‘train wreck’.
I would prefer that this framework do not take position for one option. But describe both with there tradeoffs.

And if someone clever can spell out the consequences of traversing an MNA incapable router, that would be helpful, at least to me.


The words ’train wreck’ come to mind. :)
[Bruno2] Works for me 😉



- Yes I think that the path can change without warning, in particular for long lives usages of MNA. E.g. if MNA is designed to encode entropy and replace ELI.


I agree.



- As you are well aware, FRR is a local feature with different flavours (LFA, RLFA, TI-LFA, link protection, node protection, (local) SRLG protection…) each translating into different protection paths. That seems computationally expensive to me for the ingress to compute all possible alternatives paths for all FRR flavours for all nodes/PLR along the path.


Presumably an LSP is only expecting some small number of types of FRR. No point in worrying about non-applicable situations.
[Bruno2] Yes, the number of types for FRR which have been implemented and deployed. The point is that the ingress would need to know and consider that. Even for the typical FRR types (LFA, RLFA, TI-LFA, and assuming that the type of protection (link vs node) is consistent along the path which IMO is debatable as I would likely configure node protection only for node which are prone to failures) that would typically require the ingress to compute at multiple SPFs per node in the flooding domain. I’m not convinced that ingress would do that. So if the consequence of not doing that is possible train wreck, I think that this merit further WG discussions.



Plus in many cases, IMHO that set of all paths would, in the end, require all possible transit nodes to be MNA capable. In my environments with multiple vendors, multiple platforms, multiple generations… I would a priori find it hard to have all routers MNA capable in a foreseeable future.


And for all actions.  Yes, this is why signaling needs to be specific.
[Bruno2] Signaling is fine. Requiring MNA support on nodes which are required to act on a given action is fine. What I find debatable is requiring MNA support on all possible downstream nodes, under any (rerouting) conditions. And failure to achieve this translating in train wreck.
My personal preference would be to have a solution allowing legacy nodes on the path without having train wreck.



- To me, RFC6790 (EL) had a much friendlier deployment path by mandating that LSE label values (just the EL in RFC6790 case) did not include value in the reserved label space. (§3) Same thing for draft-jags-mpls-ext-hdr where we avoided the appearance of reserved SPLs in a LSE.Label field.


Understood, but with more generality, placing a similar constraint on all of the in-stack data seems onerous, whereas we are already going to have signaling requirements, regardless.
[Bruno2] I agree that there are tradeoffs. I feel that they should to be discussed in the WG and at minimum that the framework should allow for solution exploring both paths.
I can see that the tradeoffs may be quite different depending on the deployments conditions (e.g. mono vendor vs multi-vendor, size of the network, greenfield vs brownfield). On my side, I’d expect issues with some of the network that I’m aware of.
Signaling is not the issue. IMHO the issue is mandating that the ingress guarantee that the MNA only cross MNA capable LSR whatever possible features/rerouting conditions on downstream nodes, and the consequences been train wreck.

--Bruno

Tony


_________________________________________________________________________________________________________________________

Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.

This message and its attachments may contain confidential or privileged information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
Thank you.