Re: [OSPF] AD review of draft-ietf-ospf-encapsulation-cap-03

Xuxiaohu <xuxiaohu@huawei.com> Tue, 20 June 2017 01:19 UTC

Return-Path: <xuxiaohu@huawei.com>
X-Original-To: ospf@ietfa.amsl.com
Delivered-To: ospf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 864B8131871; Mon, 19 Jun 2017 18:19:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ATPcwOHBvrpq; Mon, 19 Jun 2017 18:19:14 -0700 (PDT)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D02F13187A; Mon, 19 Jun 2017 18:19:11 -0700 (PDT)
Received: from 172.18.7.190 (EHLO lhreml709-cah.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id DIV09683; Tue, 20 Jun 2017 01:19:10 +0000 (GMT)
Received: from NKGEML412-HUB.china.huawei.com (10.98.56.73) by lhreml709-cah.china.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.301.0; Tue, 20 Jun 2017 02:19:07 +0100
Received: from NKGEML515-MBX.china.huawei.com ([fe80::a54a:89d2:c471:ff]) by nkgeml412-hub.china.huawei.com ([10.98.56.73]) with mapi id 14.03.0235.001; Tue, 20 Jun 2017 09:19:00 +0800
From: Xuxiaohu <xuxiaohu@huawei.com>
To: Alia Atlas <akatlas@gmail.com>, OSPF List <ospf@ietf.org>, "draft-ietf-ospf-encapsulation-cap@ietf.org" <draft-ietf-ospf-encapsulation-cap@ietf.org>
Thread-Topic: AD review of draft-ietf-ospf-encapsulation-cap-03
Thread-Index: AQHS5WF+ivGCj9gSOUOIMMtroKuKN6Is98MA
Date: Tue, 20 Jun 2017 01:19:00 +0000
Message-ID: <1FEE3F8F5CCDE64C9A8E8F4AD27C19EE2BBC446D@NKGEML515-MBX.china.huawei.com>
References: <CAG4d1rfJPTyz-nENp2ViJYg14BCctGAAzt+TD3E9zEdejpqJaA@mail.gmail.com>
In-Reply-To: <CAG4d1rfJPTyz-nENp2ViJYg14BCctGAAzt+TD3E9zEdejpqJaA@mail.gmail.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.111.184.181]
Content-Type: multipart/alternative; boundary="_000_1FEE3F8F5CCDE64C9A8E8F4AD27C19EE2BBC446DNKGEML515MBXchi_"
MIME-Version: 1.0
X-CFilter-Loop: Reflected
X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020203.5948780E.0128, ss=1, re=0.000, recu=0.000, reip=0.000, cl=1, cld=1, fgs=0, ip=0.0.0.0, so=2013-06-18 04:22:30, dmn=2013-03-21 17:37:32
X-Mirapoint-Loop-Id: 0a6999049444c0372108b6a8517fed4c
Archived-At: <https://mailarchive.ietf.org/arch/msg/ospf/gGm8U3EVEXi7Zim6jQwu-9R3c6o>
Subject: Re: [OSPF] AD review of draft-ietf-ospf-encapsulation-cap-03
X-BeenThere: ospf@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: The Official IETF OSPG WG Mailing List <ospf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ospf>, <mailto:ospf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ospf/>
List-Post: <mailto:ospf@ietf.org>
List-Help: <mailto:ospf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ospf>, <mailto:ospf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Jun 2017 01:19:18 -0000

Hi Alia,

Thanks a lot for your AD review. Please see our response inline.

发件人: Alia Atlas [mailto:akatlas@gmail.com]
发送时间: 2017年6月15日 6:56
收件人: OSPF List; draft-ietf-ospf-encapsulation-cap@ietf.org<mailto:draft-ietf-ospf-encapsulation-cap@ietf.org>
主题: AD review of draft-ietf-ospf-encapsulation-cap-03

As is customary, I have done my AD review of draft-ietf-ospf-encapsulation-cap-03.
First, I would like to thank the authors - Xiaohu, Bruno, Robert, Luis, and Luay - for their work on this useful document.

I do have a few concerns that need addressing before the draft can progress.

[Bruno/Xiaohu] Many thanks for your useful comments.
Following your comments, we believe it would be simpler and better to not create a new IANA registry for ”IGP  Tunnel Encapsulation Attribute Types” but rather reuse the existing BGP one:
https://www.iana.org/assignments/bgp-parameters/bgp-parameters.xhtml#tunnel-types

[Bruno/Xiaohu] BTW when this OSPF extension has been defined, it has been modeled based on RFC 5512. However, as of today, the BGP extension is been redefined in draft-ietf-idr-tunnel-encaps, sometimes. Which normative reference should be use?
- as of today, RFC 5512 is probably the right one as draft-ietf-idr-tunnel-encaps has not passed WG LC and may never be published as RFC (IDR requires 2 implementations. I think RFC 5512 has not been implemented hence we may question whether draft-ietf-idr-tunnel-encaps will be…)
- in some hypothetical future, draft-ietf-idr-tunnel-encaps may obsolete RFC 5512

Major:


1)  First, the draft talks about what information is sent - but nothing about how it is to be understood or used.  That'd be ok if there were a clear reference to a document that discussed the related procedures.  A quick scan of draft-ietf-idr-tunnel-encaps-06 seems that it may be the right place to start - but it's procedures are BGP-focused and while there are many similarities, there may be interesting differences as well.


[Bruno/Xiaohu] We’ll clarify that the 3 sub-TLV (§5.1-§5.3) are normatively defined in RFC 5512, from a format, semantic and usage standpoint. And that there code point are allocated in respectively the following IANA registries: BGP Tunnel Encapsulation Attribute Tunnel Types, BGP Tunnel Encapsulation Attribute Sub-TLVs. As per you comment, we need to clarify the 5.4 color Sub-TLV. Proposed text:
The Color Sub-TLV value is a 4-octet unsigned integer. Its semantic and usage are the same as the Color Value, from the Color Sub-TLV defined in RFC 5512 section 4.3 (*)

For instance, for the Color sub-TLV, is the 4 byte color value expected to represent the same meaning in OSPF as in BGP?

[Bruno/Xiaohu]Yes.

  Can a BGP route with a particular color extended community then have the OSPF tunnel to use selected from only those tunnels with the same color?

  What does the Color TLV mean in a purely OSPF context?

[Bruno/Xiaohu] idem as in the IDR context.  It’s a color used to define policy. The application using those tunnels, may use this color as an input for its policy when choosing the tunnel to use (or not use).
We can add this text if needed.

  Sec 7 of draft-ietf-idr-tunnel-encaps-06 ("However, suppose that one of the TLVs in U2's Tunnel Encapsulation attribute contains the Color Sub-TLV.  In that case, packet P SHOULD
   NOT be sent through the tunnel identified in that TLV, unless U1 is
   carrying the Color Extended Community that is identified in U2's
   Color Sub-TLV.") doesn't seem to strictly apply.

[Bruno/Xiaohu] Would new clarification added above (*) be enough? If not, a priori, I’d rather improve the definition of section 5.4 defining this color sub-TLV, in order for it to generally apply to any text. (rather than trying to patch the specific above text from Sec 7)


Semantics and behavior need to be specified - not just the encodings, and that is all this draft currently has.



2)  Sec 5.1 and Sec 5.2 refer to the format of the Encapsulation Sub-TLV and Protocol Sub-TLV coming from draft-ietf-idr-tunnel-encaps-06 - but that draft defines not merely the format, but allocates an IANA registry for additional sub-types that can appear and defines the format and contents of the sub-TLV based upon the tunnel type.   I'm nearly certain that you mean that these sub-tlvs use not merely the same format (does variable length fields based upon the allocated type cause issues for OSPF sub-TLV parsing???) but can contain any values and sub-TLVs defined in the relevant IANA registry. As it is written now, there is no reference to the registry or ability to easily support more tunnel types in the future.

[Bruno/Xiaohu] Good point. Does the previous change address that point?

3) It is unfortunate that Geneve, which is the agreed encapsulation for NVO3, is not included in the set of tunnels but VXLAN-GPE, which is not going to be a standard, is.
I know this is duplicating what is in draft-ietf-idr-tunnel-encaps-06 but it emphasizes the need to assume additional Tunnel Types and related Encapsulation Sub-TLVs will be defined.

[Bruno/Xiaohu] I agree that this is unfortunate.
But as the this new change, this draft will just refer to the existing BGP tunnels types. No duplication, no new tunnel types.
I’d rather define new types in an independent document. Home of this document, and possibly additional WGs to cross-post, would already be a good question ;-) (candidates could be OSPF, IS-IS, IDR, NVO3, RTGWG, softwires, possibly BESS…)

4) Sec 4: Is there a reason to create a new IGP Tunnel Encapsulation Types registry instead of reusing BGP Tunnel Encapsulation Attribute Tunnel Types (https://www.iana.org/assignments/bgp-parameters/bgp-parameters.xhtml#tunnel-types)?  The latter is FCFS and the proposed registry is Standards Action.   There are already differences and collisions between the two (i.e. value 15).
What would happen if an Encapsulation Sub-TLV needed to include a Tunnel Type? Which registry would it pull from? Would the value used depend on the protocol it was signaled in?

[Bruno/Xiaohu] Not anymore. (in early version of the OSPF draft, the code point was 1 octet, while IDR was 2). As indicated above, we’ll change to use the BGP one.

5) I-D.ietf-idr-tunnel-encaps has to be a normative reference.

[Bruno/Xiaohu] see the above.

6) Given that some of the references are to in progress documents for the tunnel types, is it expected that the values will correspond to future versions or are they nailed to this particular version or something else?

[Bruno/Xiaohu] I think the reference to existing “BGP”/IANA registry address this point



Nits:

a) Sec 1:"Partial deployment of IPv6 in IPv4 networks or IPv6 in IPv4
      networks as described in [RFC5565]"
s/IPv6 in IPv4/IPv4 in IPv6 for one of the two

[Bruno/Xiaohu] will fix it. Thanks again for your detailed AD review of this doc.

Regards,
Alia


Best regards,
Xiaohu/Bruno