Re: [OSPF] IETF OSPF YANG and BFD Configuration

Jeffrey Haas <> Tue, 20 June 2017 14:50 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 707421270B4; Tue, 20 Jun 2017 07:50:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.903
X-Spam-Status: No, score=-1.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id 2cFNL6Hm9sqL; Tue, 20 Jun 2017 07:50:05 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id A5EF612F9A8; Tue, 20 Jun 2017 07:50:05 -0700 (PDT)
Received: by (Postfix, from userid 1001) id 4E5031E37E; Tue, 20 Jun 2017 10:58:56 -0400 (EDT)
Date: Tue, 20 Jun 2017 10:58:56 -0400
From: Jeffrey Haas <>
To: "Les Ginsberg (ginsberg)" <>
Cc: Mahesh Jethanandani <>, Jeffrey Haas <>, "Reshad Rahman (rrahman)" <>, OSPF WG List <>, "" <>, "" <>, "" <>, "Acee Lindem (acee)" <>
Message-ID: <>
References: <> <> <> <> <> <> <> <>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <>
User-Agent: Mutt/1.5.21 (2010-09-15)
Archived-At: <>
Subject: Re: [OSPF] IETF OSPF YANG and BFD Configuration
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 20 Jun 2017 14:50:07 -0000


On Tue, Jun 20, 2017 at 02:25:12PM +0000, Les Ginsberg (ginsberg) wrote:
> > Different protocols have different survivability requirements.  An IGP may
> > very well want sub-second timers, potentially for repair behaviors.  BGP may
> > want fast failover, but may be fine with second level granularity.  This is
> > particularly true since the cost of too aggressively flapping BGP is of
> > significantly greater impact to the network and the router.
> > 
> [Les:] The real issues here are false failures and proper use of dampening. No protocol - not even an IGP - wants to flap unnecessarily. If timers are set so aggressively that false failures are reported this is BAD.
> Even worse is failure to dampen so that we get multiple false failures in a short period of time.
> Arguing that the right way to solve this problem is to increase the number of sessions using different timer granularity seems likely to make any problems worse as you have now increased the number of BFD sessions with the associated costs.

I'm mildly amused you seem to think I'm not considering the cost of
additional sessions in the scaling matrix. :-)

I do think you're conflating the survivability requirements vs. timer
granularity.  However, I agree that the most commonly deployed form is to go
for single session with the most stable aggressive timer.

Again, the reason I raise this is there has been discussion regarding
behavior for different client timing requirements.  There are a few options
for how this is likely to play out in terms of BFD protocol implementation.
However, configuration and operational models tend to evolve much more
slowly.  (And I certainly don't need to tell you that.)  Thus, I'm prodding
at this space a bit to attempt to do some future proofing.

As we noted earlier in thread, this likely at least encourages configuration
to be multi-instanced, even if the session instantiation is not currently.
Key changes aren't something we can readily do, so getting that part right
early is necessary.

The likely impact on current IGP module BFD configuration may be a later
augmentation.  Thus, as long as the likely implications are understood,
there may be no further action needed at this time.  Determining that is
partially what this thread is attempting to shake out.

-- Jeff