Re: [mpls] Rtgdir early review of draft-ietf-mpls-bfd-directed-07

"Carlos Pignataro (cpignata)" <cpignata@cisco.com> Wed, 05 August 2020 02:39 UTC

Return-Path: <cpignata@cisco.com>
X-Original-To: mpls@ietfa.amsl.com
Delivered-To: mpls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E60CE3A1086; Tue, 4 Aug 2020 19:39:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.597
X-Spam-Level:
X-Spam-Status: No, score=-9.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=fZXIU5hG; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=HbU0092O
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ssJQQSCRlq8G; Tue, 4 Aug 2020 19:39:55 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A85B3A1221; Tue, 4 Aug 2020 19:39:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=57071; q=dns/txt; s=iport; t=1596595195; x=1597804795; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=CuyN1O6lE7Ls8iHsAJHDpQvV9orusn8L//H6Yrq+dkY=; b=fZXIU5hGbXu6YXK9iWWecsA7BeBKUbgNy1g59EkDY1WLrcDe1R4fdgUg /249+RYjf12vKxtcG2tYcsbbLEMMV5M/IKuCALP2udTk29YMUsko7qNuU asEc91xDra5A3Bg7y6CeIqgHIS0h6g+5Xn5weYf7QCywRQ+ideIosdhY4 w=;
IronPort-PHdr: 9a23:2yfLzxLTNDuh3FC2IdmcpTVXNCE6p7X5OBIU4ZM7irVIN76u5InmIFeGvKk/g1rAXIGd4PVB2KLasKHlDGoH55vJ8HUPa4dFWBJNj8IK1xchD8iIBQyeTrbqYiU2Ed4EWApj+He2YkdQEcf6IVbVpy764TsbAB6qMw1zK6z8EZLTiMLi0ee09tXTbgxEiSD7b6l1KUC9rB7asY8dho4xJw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AZAQCwGypf/4gNJK1gGgEBAQEBAQEBAQEDAQEBARIBAQEBAgIBAQEBggqBUiMGKAdvWC8sCoQrg0YDjS4lgQKJAo5egUKBEQNVCwEBAQwBASMKAgQBAYRMAheCDQIkOBMCAwEBCwEBBQEBAQIBBgRthVwMhXEBAQEEEggBCB0BASUECQUBDwIBBgIRAwECIQEGAwICAh8RFAkIAgQOBRsHgwQBgX5NAy4BDpdFkGgCgTmIYXaBMoMBAQEFgUdBgy8NC4IOCYE4gnCCUktCgQGFPhqBQT+BEAEnDBCCGDU+gho3CwIDAYEhBRsZIQYHTIIeM4Itjz0ZCgqDD4Zfgx6IPI9iN08KgmKHYn+JJYMMhHkDHoJ8gSOIK41+hTOUEYhJgmONbE+DVgIEAgQFAg4BAQWBQCojKj1wcBUaSwGCPgk1EhcCDY4fgSUBAoJJhRSFQQF0AjUCBgEHAQEDCXyOFwGBEAEB
X-IronPort-AV: E=Sophos;i="5.75,436,1589241600"; d="scan'208,217";a="522297075"
Received: from alln-core-3.cisco.com ([173.36.13.136]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 05 Aug 2020 02:39:51 +0000
Received: from XCH-ALN-004.cisco.com (xch-aln-004.cisco.com [173.36.7.14]) by alln-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id 0752dpF9005215 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Wed, 5 Aug 2020 02:39:51 GMT
Received: from xhs-aln-001.cisco.com (173.37.135.118) by XCH-ALN-004.cisco.com (173.36.7.14) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 4 Aug 2020 21:39:51 -0500
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 4 Aug 2020 21:39:50 -0500
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Tue, 4 Aug 2020 22:39:50 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XERFNJINUOFiIX2c8oA/mvlzo3a7x3gfzwI6B5FUs7/8Swnli96UGN8W/4MuFSoypf1RAHnw9DiT+rUM0pz9eylKzXvuQ2HwT2zK3skaoLzBEO/eMII+6hF1TIHYQzMeBXvZfaoQCZQWB6DRAifo3PLMonJmg7BXa9rbzZ7qeg6wqwxehqCTqrPNXLiNvbh+ady5vY8N51jaap8Z5WnAgTVKjNwahd9j2BwXiIMI1kjlowqpeEay45bi/orWBWxm6gEKjFjlEf7JwCrffIbtlVBWleRR8S0dYhcylfeMk70q8uBc2zi2u8wrz6clZ/RzSHyfz6YSv5tM5GM7zro6Bg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CuyN1O6lE7Ls8iHsAJHDpQvV9orusn8L//H6Yrq+dkY=; b=TTFlzpgmivS0wzC8DAY+qkREcIBqae3GWUX2R/ay/0G04tBPYISWIvixjH+MiR0QPrPpCNGz1QNkGXq65zerVNnNx5Z5S91VTqRbQNGsgXucwsSYnb5OhFyxfVEbg6PoY0Dn8amPeMnmxisDs5Bjy1CTCynnNHsoZ5KMrocBhsZIvydjbL9s+k/QqXQ84zLWVZ8thy5BmQ3vykOymCB4P8XC3+KF2b/2ce3NFmuYZ+ZaYM5ywsegcG2krArQKuV9HdyiZyHhnB4Lxp9DDNNuhrGZ4x6vZt+VZ46bb5a1RHyrCzLguTmi26t6S/t512rvWV5HVZXgqIrCzJZ9BClUoA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CuyN1O6lE7Ls8iHsAJHDpQvV9orusn8L//H6Yrq+dkY=; b=HbU0092O2CAVNGqVbOBxzFhszodCxG8oXBCAVHXnbTbfrzTaNKu05Svt5Q6TmHqwtXE7Fnt0VFq53TG/5+raliokxdFX/yXhKntiVm+8qINqEoXIE7JFseRzcprbIZFZbpGvkCuuTKUamLNc6MtyRQnEbWmy7/BF3iZtPDIPwp4=
Received: from BN8PR11MB3635.namprd11.prod.outlook.com (2603:10b6:408:86::20) by BN6PR11MB3972.namprd11.prod.outlook.com (2603:10b6:405:7f::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3239.18; Wed, 5 Aug 2020 02:39:48 +0000
Received: from BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::dcf:cc9f:b398:6591]) by BN8PR11MB3635.namprd11.prod.outlook.com ([fe80::dcf:cc9f:b398:6591%4]) with mapi id 15.20.3239.021; Wed, 5 Aug 2020 02:39:48 +0000
From: "Carlos Pignataro (cpignata)" <cpignata@cisco.com>
To: Greg Mirsky <gregimirsky@gmail.com>
CC: mpls <mpls@ietf.org>, MPLS Working Group <mpls-chairs@ietf.org>, Routing Directorate <rtg-dir@ietf.org>, "draft-ietf-mpls-bfd-directed@ietf.org" <draft-ietf-mpls-bfd-directed@ietf.org>
Thread-Topic: Rtgdir early review of draft-ietf-mpls-bfd-directed-07
Thread-Index: AQHWarAmTVPGqQG75UqYuGC31NkKHakozf2A
Date: Wed, 05 Aug 2020 02:39:48 +0000
Message-ID: <FA423279-E6A7-4020-BF08-5D8DD3DED346@cisco.com>
References: <149978159930.12344.18347332855391607627@ietfa.amsl.com> <CA+RyBmXR-Lpv3g+q-85Or4t+ccG4mqutQczzyKFg2YCyKjzqBg@mail.gmail.com>
In-Reply-To: <CA+RyBmXR-Lpv3g+q-85Or4t+ccG4mqutQczzyKFg2YCyKjzqBg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.120.23.2.1)
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [136.56.129.159]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4ffb34da-dc30-4721-324c-08d838e8d246
x-ms-traffictypediagnostic: BN6PR11MB3972:
x-microsoft-antispam-prvs: <BN6PR11MB39729DCF1BDCEC02884D4A64C74B0@BN6PR11MB3972.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: rhZccrGUnoiPSGkaFCAhfUWkXTOcUF+9h/g2FoCOKDMPxULcYfFd7H39PoIu8heCxDGtc5OFYjJBpD6DfHrTUJuX9pdzVcVQ1oqSk0T6g1Qt7A03qjsOPd+4w1Vcc3L2UU9h0LvQf6TSR9GEhIXMcPiIBHw+iLTGDxx/HM/SSsC6AwSw/EukGqpKWrb6c+ZI6leLT3x8rt5Yfe+BuJPMy90wPDyxBZtNAxKAU1LtM6gMTvUkFi1uC04HBSVwdo3pKW93QkeEwjsZT19U1kIViJ7F1UDO9uqyW3/OuNpwMRZYXxwr/2+0vq3aP9MeIxVnLp8HQsW4cvSURumE/qmMrhhWe/OJts37Z6kizeLSEy0dh+3CdXfcZwZM3gGgPYdQRaNLq/MvGF4rB+oi/t0O4A==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN8PR11MB3635.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(39860400002)(346002)(376002)(136003)(396003)(366004)(5660300002)(71200400001)(166002)(83380400001)(36756003)(26005)(66946007)(6486002)(86362001)(6512007)(6506007)(53546011)(33656002)(186003)(54906003)(8936002)(966005)(316002)(8676002)(66476007)(6916009)(66446008)(64756008)(4326008)(91956017)(76116006)(2616005)(66556008)(2906002)(30864003)(478600001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_FA423279E6A74020BF085D8DD3DED346ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN8PR11MB3635.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4ffb34da-dc30-4721-324c-08d838e8d246
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Aug 2020 02:39:48.2640 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Q0JoUQeSxnC2hvGXo1TGCKm51I0CXUXFr+rShE2wYTsemS6wW6ijXYGIyEtUpp21H4BvqMLkq5txhaV8LY2suA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB3972
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.14, xch-aln-004.cisco.com
X-Outbound-Node: alln-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/mpls/oAdAFt6ycMqJfQOdlCPtXNInJtE>
Subject: Re: [mpls] Rtgdir early review of draft-ietf-mpls-bfd-directed-07
X-BeenThere: mpls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-Protocol Label Switching WG <mpls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mpls>, <mailto:mpls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mpls/>
List-Post: <mailto:mpls@ietf.org>
List-Help: <mailto:mpls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mpls>, <mailto:mpls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Aug 2020 02:39:59 -0000

Hi,

Since I originated the “early review”, and my email is included in the “To” line, I feel I should respond and comment.

The review mentioned below is over 3 years old, over 1,100 days old.

Before and after that ‘early review’ there have been several others.

My perspective continues to be that the method in mpls-bfd-directed is not sensible — what works well for MPLS LSP Ping as a command/response paradigm to choose a return path, does not extend to long-lived sessions such as BFD. Scanning through the current revision of the document, it continues to be underspecified to the point of being harmful.

Best,

Carlos.


2020/08/04 午後6:39、Greg Mirsky <gregimirsky@gmail.com<mailto:gregimirsky@gmail.com>>のメール:


Dear All,
as we've discussed at the MPLS WG meeting at IETF-108, I've been given an action point to match updates to the draft-ietf-mpls-bfd-directed with the RtgDir early review comments. Please find notes from the authors in-line under GIM>> and Mach>> tags.
Welcome your questions, comments.

Regards,
Greg (on behalf of the authors)

---------- Forwarded message ---------
From: Carlos Pignataro <cpignata@cisco.com<mailto:cpignata@cisco.com>>
Date: Tue, Jul 11, 2017 at 7:00 AM
Subject: Rtgdir early review of draft-ietf-mpls-bfd-directed-07
To: <rtg-dir@ietf.org<mailto:rtg-dir@ietf.org>>
Cc: <mpls@ietf.org<mailto:mpls@ietf.org>>, <draft-ietf-mpls-bfd-directed.all@ietf.org<mailto:draft-ietf-mpls-bfd-directed.all@ietf.org>>, <bfd-chairs@ietf.org<mailto:bfd-chairs@ietf.org>>


Reviewer: Carlos Pignataro
Review result: Has Issues

Hello

I have been selected to do a routing directorate “early” review of this draft.
https://datatracker.ietf.org/doc/draft-ietf-mpls-bfd-directed/

The routing directorate will, on request from the working group chair, perform
an “early” review of a draft before it is submitted for publication to the
IESG. The early review can be performed at any time during the draft’s lifetime
as a working group document. The purpose of the early review depends on the
stage that the document has reached.

The MPLS chairs have requested an early review from the directorate with the
objective of improving document quality.  This document has had three
unsuccessful WG LCs.

For more information about the Routing Directorate, please see
http://trac.tools.ietf.org/area/rtg/trac/wiki/RtgDir

Document: draft-ietf-mpls-bfd-directed-07.txt
Reviewer: Carlos Pignataro
Review Date: Early July, 2017
Intended Status: Standards Track

Summary:
I have significant concerns about this document.
I also recommend a BFD WG Chair or appointee to review this document.

Comments:

First, I have a general concern about the architectural approach in this
document.

This document is modeled after RFC 7110. RFC 7110 describes the specification
of a return path for MPLS LSP Ping. MPLS LSP Ping uses a request/reply
command/response paradigm, in which receipt of an Echo Request elicits the
generation of an Echo Reply.

BFD for MPLS, however, uses a different approach and paradigm (as per RFC
5884). An MPLS LSP Ping packet is used as a bootstrap, signaling discriminator
value for a persistent BFD session. After the MPLS LSP Ping signals the
Discriminator (via MPLS LSP Ping TLV) to use, then BFD control messages are
sent back and forth.

However, while the BFD session is UP and  BFD control messages and being sent
back and forth, and while no MPLS LSP Ping packets are sent after bootstrapping
-- what happens if the return path changes (e.g., the return LSP goes down,
gets unconfigured, etc.)?
GIM>> Need to note that after bootstrapping a BFD session over MPLS LSP with the MPLS LSP Ping that includes the BFD Discriminator TLV,
MPLS LSP Ping is periodically sent according to Section 3.2 RFC 5884:
   Hence, BFD is used in conjunction with LSP Ping for MPLS LSP fault
   detection:
...
    iii) LSP Ping is used to periodically verify the control plane
         against the data plane by ensuring that the LSP is mapped to
         the same FEC, at the egress, as the ingress.
[Mach] If the return LSP goes down, then the BFD session should go down as well, this's one of the goals that this solution is trying to achieve. For example, in some case, it want the forward and reverse paths share the same route and fate.  The return path down normally means the forward path is down as well.

In that case, not only this mechanism can actually make things worst, because
it results in a false negative, but also the document does not specify how the
system should recover.
[Mach] As above, this result is desired in the case that requires the forward and reverse path share route and fate. It should be kept down until the specified return path recovered.

The I-D seems to assume complete topological
invariability for it to work long-term, since it does not specify any mechanism
to update or to deal with such a failure or change scenario.
GIM>> We've added the Operational Considerations section that describes how the local BFD system using periodic MPLS LSP Ping can monitor the viability of the Reverse path. Particularly, the text that describes this:
   If any of defined in
   [RFC7110] sub-TLVs used in BFD Reverse Path TLV, then the periodic
   verification of the control plane against the data plane, as
   recommended in Section 4 [RFC5884], MUST use the Return Path TLV, as
   per [RFC7110], with that sub-TLV.  By using the LSP Ping with Return
   Path TLV, an operator monitors whether at the egress BFD node the
   reverse LSP is mapped to the same FEC as the BFD session.  Selection
   and control of the rate of LSP Ping with Return Path TLV follows the
   recommendation of [RFC5884]: "The rate of generation of these LSP
   Ping Echo request messages SHOULD be significantly less than the rate
   of generation of the BFD Control packets.  An implementation MAY
   provide configuration options to control the rate of generation of
   the periodic LSP Ping Echo request messages."

On the other hand, there is already a BFD mechanism without the bootstrapping
setup and with a command/response like behavior, that is S-BFD, RFC 7881. That
one is notably missing from this draft.
GIM>> The goal of the proposed mechanism is not to avoid bootstrapping a BFD over MPLS LSP session or simulate Echo Response/Reply behavior but to control the path the remote BFD system uses to transmit BFD control packets in BFD Asynchronous mode.
[Mach] The purpose of this draft is to specify a particular return path, S-BFD cannot specify the return path, thus cannot satisfy the requirement.

Further, there seem to be a number of potentially erroneous assumptions made,
see below.

Additional Comments:

     Bidirectional Forwarding Detection (BFD) Directed Return Path

The title should include that this is *only* for MPLS BFD.
GIM>> Thank you for the helpful editorial suggestion.

   When a BFD session monitors an explicitly routed unidirectional path
   there may be a need to direct egress BFD peer to use a specific path
   for the reverse direction of the BFD session.

Scope: is this solution targeted only for "explicitly routed unidirectional
path", and the solution to have the reply come back the exact reverse
direction? That does not seem to be the case and the solution.
GIM>> The path from the remote BFD system may traverse the same nodes and links traversed by the BFD control packets transmitted from the ingress LER, i.e., be co-routed. But the proposed mechanism is more generic and allows an operator to control the path traversed by a BFD control packet transmitted by the egress LER.

   [RFC5880], [RFC5881], and [RFC5883] established the BFD protocol for
   IP networks.  [RFC5884] and [RFC7726] set rules of using BFD
   asynchronous mode over IP/MPLS LSPs.  These standards implicitly
   assume that the egress BFD peer will use the shortest path route
   regardless of route being used to send BFD control packets towards
   it.

Is "These standards" referring to the three former or the four latter?
GIM>> Two latter two. We've clarified that by the following update:
OLD TEXT:
   [RFC5884] and [RFC7726] set rules of using BFD
   asynchronous mode over IP/MPLS LSPs.  These standards implicitly
   assume that the egress BFD peer will use the shortest path route
   regardless of route being used to send BFD control packets towards
   it.
NEW TEXT:
[RFC5884] and [RFC7726] set rules for using BFD
   asynchronous mode over IP/MPLS LSPs, while not defining means to
   control the path an egress BFD system uses to send BFD control
   packets towards the ingress BFD system.

   For the case where a LSP is explicitly routed it is likely that the
   shortest return path to the ingress BFD peer would not follow the
   same path as the LSP in the forward direction.  The fact that BFD
   control packets are not guaranteed to follow the same links and nodes
   in both forward and reverse directions is a significant factor in
   producing false positive defect notifications, i.e. false alarms, if
   used by the ingress BFD peer to deduce the state of the forward
   direction.

There may be an implicit mis-assumption in this text and overall approach: the
fact that traffic flows on one direction does not imply that the reverse
direction using the same interfaces and nodes would actually be consequently
properly programmed and working.
GIM>> If the objective of controlling the path from the egress to the ingress system is to monitor such path, then detecting a defect in the forwarding path fulfills the objective.

   This document defines the BFD Reverse Path TLV as an extension to LSP
   Ping [RFC8029] and proposes that it is to be used to instruct the
   egress BFD peer to use an explicit path for its BFD control packets
   associated with a particular BFD session.

This text assumes that the BFD return path is MPLS. However, my understanding
from RFC 5884 is that this is not necessarily the case, and the return can be
IP.
GIM>> The document defines an optional mechanism to control the BFD Reverse path. The default behavior, if the BFD Reverse Path TLV is not included in the MPLS LSP Ping with the BFD Discriminator TLV, remains, as you've noted - over IP.

   When BFD is used to monitor unidirectional explicitly routed path,
   e.g.  MPLS-TE LSP, BFD control packets in forward direction would be
   in-band using the mechanism defined in [RFC5884] and [RFC5586].

Which BFD uses RFC 5586? RFC5586 says that is not needed:
GIM>> We've removed references to RFC 5586.

   "Some of these functions can be supported using existing
   tools such as Virtual Circuit Connectivity Verification (VCCV)
   [RFC5085], Bidirectional Forwarding Detection for MPLS LSPs (BFD-
   MPLS) [BFD-MPLS], LSP-Ping [RFC4379], or BFD-VCCV [BFD-VCCV]."

And then:

   o  a failure detection by ingress node on the reverse path cannot be
      interpreted as bi-directional failure unambiguously and thus
      trigger, for example, protection switchover of the forward
      direction without possibility of being a false positive.

   To address this scenario the egress BFD peer would be instructed to
   use a specific path for BFD control packets.

But using a specific path for return cannot either imply "interpreted as
bi-directional failure unambiguously", so the scenario is not *addressed*.

   The BFD Reverse Path TLV carries information about the path onto
   which the egress BFD peer of the BFD session referenced by the BFD
   Discriminator TLV MUST transmit BFD control packets.  The format of
   the BFD Reverse Path TLV is as presented in Figure 1.

What does the remote endpoint do with that "MUST" if the return FEC goes away?
GIM>> The Operational Considerations section includes the following text:
   Suppose an operator planned network maintenance activity that
   possibly affects FEC used in the BFD Reverse Path TLV.  In that case,
   the operator MUST avoid the unnecessary disruption using the LSP Ping
   with a new FEC in the BFD Reverse Path TLV.  But in some scenarios,
   proactive measures cannot be taken.  Because the frequency of LSP
   Ping messages will be lower than the defect detection time provided
   by the BFD session.  As a result, a change in the reverse-path FEC
   will first be detected as the BFD session's failure.  In such a case,
   the ingress BFD node SHOULD immediately transmit the LSP Ping Echo
   request with Return Path TLV to verify whether the FEC is still
   valid.  If the failure was caused by the change in the FEC used for
   the reverse direction of the BFD session, the ingress BFD node SHOULD
   bootstrap a new BFD session using another FEC in BFD Reverse Path
   TLV.

There also seem to be some self-contradiction. This document says:

   LSP ping, defined in [RFC8029], uses BFD Discriminator TLV [RFC5884]
   to bootstrap a BFD session over an MPLS LSP.  This document defines a
   new TLV, BFD Reverse Path TLV, that MUST contain a single sub-TLV
   that can be used to carry information about the reverse path for the
   BFD session that is specified by value in BFD Discriminator TLV.

And then says:

   Reverse Path field contains a sub-TLV.

But then says:

   None, one or more sub-TLVs MAY be included in the BFD Reverse
   Path TLV.  If none sub-TLVs found in the BFD Reverse Path TLV, the
   egress BFD peer MUST revert to using the default, i.e., over IP
   network, reverse path.

So is it only one, or none/one/multiple?
GIM>> Thank you for pointing this. Below is the update in the working version of the draft:
OLD TEXT:
   This
   document defines a new TLV, BFD Reverse Path TLV, that MUST contain a
   single sub-TLV that can be used to carry information about the
   reverse path for the BFD session that is specified by the value in
   BFD Discriminator TLV.
NEW TEXT:
   This
   document defines a new TLV, BFD Reverse Path TLV, that MAY contain
   none, one or more sub-TLVs that can be used to carry information
   about the reverse path for the BFD session that is specified by the
   value in BFD Discriminator TLV.

and one more:
OLD TEXT:
Reverse Path field contains a sub-TLV
NEW TEXT:
Reverse Path field contains none, one or more sub-TLVs.

I believe it needs to be multiple since then a Tunnel can be specified. But the
document as-is seems self-contradicting.

Further, where has that "default" been defined as "over IP network"?
GIM>> The text was re-worked to avoid using "default":
   If no sub-TLVs are found in the BFD
   Reverse Path TLV, the egress BFD peer MUST revert to using the local
   policy based decision as described in Section 7 [RFC5884], i.e.,
   routed over IP network.

There's another contradiction here:

   If the egress LSR cannot find the path specified in the Reverse Path
   TLV it MUST send Echo Reply with the received Reverse Path TLV and
   set the Return Code to "Failed to establish the BFD session.  The
   specified reverse path was not found" Section 3.3.  The egress BFD
   peer MAY establish the BFD session over IP network as defined in
   [RFC5884].

So the response is "Failed to establish the BFD session." But then it MAY
establish the session?
GIM>> Echo Reply with the error code is to indicate that the reverse path is not available at the egress LSR. The local policy at the egress BFD system may command the transmission of a BFD control packet from egress to the ingress if the Reverse Path is not available.
And, again, what if the path is found at bootstrap but
lost afterwards?
GIM>> Section 5 includes text that provides information on handling such a scenario.

4.  Use Case Scenario

The fact that A-B-C-D-G-H works does not mean that the reverse, H-G-D-C-B-A,
will work.
GIM>> If the objective is to verify that the reverse path works, then detecting a defect fulfills the task.
6.  Security Considerations

   Security considerations discussed in [RFC5880], [RFC5884], [RFC7726],
   and [RFC8029], apply to this document.

There seem to be additional security considerations with returns taking
explicit paths, and should be expanded in here.
GIM>> That scenario is discussed in the Security Considerations section in RFC 7110. A reference to RFC 7110 was added:

   Security considerations discussed in [RFC5880], [RFC5884], [RFC7726],
   [RFC8029], and [RFC7110] apply to this document.

Net-net, I do have concerns about this document. I believe it is not ready to
advance, and could use more whiteboard time as well as a review by BFD experts.

Best,

Carlos Pignataro.